WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

anti-cheat

  1. byte_corvus

    Guide SCPSL — Reversing Themida 3 Protected AC & Signature Extraction

    Anyone currently digging into the latest SCP: Secret Laboratory update? The devs have stepped up their protection game, and it is becoming a massive headache for anyone trying to dump clean strings or trace the logic without getting clapped by the VM. The Current Situation Trying to tear down...
  2. byte_corvus

    Question [DMA] CAP DMA 75T — Firmware Customization and BlackCipher Bypass

    Messing with the CAP DMA 75T? Just got your hands on the Artix-7 75T board and the first thing you probably did was try to cook your own firmware to dodge detection. The stock firmware that comes with these CAP boards is usually flagged or generic as hell, so customizing your TLP handling and...
  3. byte_corvus

    Discuss Battlefield 6 RedSec — EA Javelin DMA PCI Speed Throttling

    Anyone currently digging into the new EA Javelin update for Battlefield 6? It looks like the devs have finally pushed a change specifically designed to mess with DMA (Direct Memory Access) users by targeting the hardware communication layer. The technical implementation is interesting—reports...
  4. byte_corvus

    Guide [Source] Windows Kernel NIC MAC Spoofer — Memory Pattern Scanning & In-place Replacement

    Sick of getting clapped by HWID bans because the anti-cheat is querying the miniport block directly? Registry-only spoofing is for scripts and teenagers. If you want to actually hide from EAC and BattlEye, you need to go deeper into the kernel. I got my hands on this logic that handles MAC...
  5. byte_corvus

    Guide [Source] Roblox Hyperion — Internal Code Analysis and Reversing

    Taking a look at the internals of Hyperion (Byfron). This is a technical breakdown of specific code paths found during static analysis and decompilation of the Roblox binary. Binary Logic Breakdown At loc_7FFFF57584AB, the code performs a move operation on the EAX register. Decompiling this...
  6. byte_corvus

    Guide EAC Kernel Driver — Screen Capture & Win32k Resolution

    Anyone still thinking their external overlay is 100% safe just because it's "external" needs to look at what Easy Anti-Cheat (EAC) is actually doing inside their kernel driver. While digging through their latest mess of obfuscated code islands, it looks like they are still heavily relying on...
  7. byte_corvus

    Guide [Source] FiveM Adhesive Blocker — Anti-Cheat Thread Suspension

    FiveM Adhesive Blocker — Thread Suspension Method Ever dealt with the aggressive scanning from FiveM's adhesive module? Most people try to patch bytes or hook functions, but that usually results in an immediate integrity check failure. This approach is much cleaner — a "No-Patch" technique that...
  8. byte_corvus

    Guide H1emu Anti-cheat & Asset Integrity Bypass — Config Method

    H1emu anti-cheat implementation is essentially glorified spyware with some basic monitoring attached. While it is not exactly at the level of kernel-level giants, it does several aggressive things you need to stay ahead of before messing with the client. Anti-Cheat Behavior Analysis The current...
  9. byte_corvus

    Question C&C Generals Online — Reversing GO Anti-Cheat Memory Protection

    Anyone still digging into the SAGE engine? I've been looking into porting an old map hack and shroud patch to the latest 1.05 patch specifically for the Generals Online (GO) launcher. While the logic holds up on a vanilla 1.05 install, the GO Anti-Cheat is significantly more aggressive than the...
  10. byte_corvus

    Question One Piece Bounty Rush — XIGNCODE3 Memory Access Issue (UDCE)

    Ran into a wall while trying to poke at One Piece Bounty Rush on Steam. The game is protected by XIGNCODE3, and as most of you know, it's a pain if you don't handle the kernel-level heartbeats and handle stripping correctly. The Current Setup I'm using a modified Undetected Cheat Engine (UDCE)...
  11. byte_corvus

    Question Valorant — Vanguard Detection Risks for Global Python Hooks

    Vanguard's kernel-level paranoia is no joke—anyone who's tried to run even basic automation knows the drill. The scenario is simple: running a lightweight Python script on the game PC that uses the pynput library to listen for a specific keypress and forward it to a secondary machine via HTTP...
  12. byte_corvus

    Guide Rust EasyAntiCheat.sys — Kernel Driver RE & Detection Vectors

    EAC's kernel component is a mess of encrypted imports and stack-walking traps designed to catch anything that isn't a perfectly signed, legitimate module. If you are trying to map a driver or spoof HWIDs on Rust, you need to see what's actually happening under the hood. We dumped the...
  13. byte_corvus

    Guide Safest ESP Drawing Methods — OpenGL Overlay vs DirectX Hooking

    Anyone who's spent more than a week in reverse engineering knows the internal vs external drawing debate never ends. If you're moving past offline projects and looking at titles protected by EAC or BattlEye, your choice of drawing method can get you clapped before you even finish your first...
  14. byte_corvus

    Guide Valorant Bluetooth MAC Spoofing — Firmware Level vs. Software

    Vanguard's HWID collection is becoming increasingly intrusive. While most users focus on raiding their disks and nuking their NIC MACs, the question of Bluetooth adapters is a valid concern for anyone trying to maintain a clean footprint. If you are aiming for a "permanent" spoof, standard...
  15. byte_corvus

    Guide Anti-Cheat Index — Complete Game Protection Database

    Knowledge is power. If you are planning a bypass, dumping offsets, or just want to know what ring0 nightmare you are up against before you start coding, you need a map of the landscape. Most of these ACs are industry standards, while others are legacy trash that should have stayed in the...
  16. byte_corvus

    Discuss ARC Raiders — Arduino Leonardo + AI Aimbot Ban Wave

    Been seeing some movement regarding ARC Raiders bans, specifically for those running 'external' hardware setups. If you're rocking an Arduino Leonardo and Host Shield combo thinking you're invisible, it's time for a reality check. The Situation Reports are surfacing of 30-day bans followed by...
  17. byte_corvus

    Guide [Source] Windows HWID — Undocumented SpacePort Disk Method

    Ever wondered how some anti-cheats still flag your hardware after a \"perfect\" disk spoof? Most of you are just hitting the standard storage class drivers and calling it a day, but Windows has plenty of dark corners that leak your real identity. While digging through some undocumented device...
  18. byte_corvus

    Guide SCP: SL Anti-Cheat Analysis — Reversing SLAC & HWID Spoofing

    Anyone else bored enough to look at SLAC (SCP: Secret Laboratory Anti-Cheat) lately? It is basically a Themida wrapper with some of the most primitive logic I have seen in a while. If you are digging into the binaries, here is the technical breakdown of how they handle (or fail to handle)...
  19. byte_corvus

    Question Apex Legends — Client Failed Anti-Cheat Backend Check & YOLO Detection

    Been digging into the Client Failed Anti-Cheat Backend Check error in Apex recently. If you are running a Python-based external, you have likely seen this pop up right before the hammer drops. It is a known red flag where EAC's server-side heuristics flag inconsistent input or mismatched client...
  20. byte_corvus

    Guide Kmbox B Pro Setup — VID/PID Spoofing and Hardware Safety

    Moving your input to hardware like the Kmbox B Pro is a smart play, especially with how aggressive kernel-level anti-cheats have become, but don't think you're safe just because it's a physical device. Running stock firmware is the fastest way to get flagged in a manual review or a signature...
Top