WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

battleye

  1. byte_corvus

    Source R6 Siege Enhanced Recoil Engine — DPI Independent Scaling

    Standard recoil scripts usually fall flat because they ignore how Siege actually handles sensitivity variables. Most pastes just try to move the mouse by fixed pixel counts, which breaks the moment you change your FOV or swap a 1.0x for a 2.5x. This engine logic handles the actual math behind...
  2. byte_corvus

    Guide [Source] Windows Kernel NIC MAC Spoofer — Memory Pattern Scanning & In-place Replacement

    Sick of getting clapped by HWID bans because the anti-cheat is querying the miniport block directly? Registry-only spoofing is for scripts and teenagers. If you want to actually hide from EAC and BattlEye, you need to go deeper into the kernel. I got my hands on this logic that handles MAC...
  3. byte_corvus

    Source PlanetSide 2 Offset Dumper — Auto-Header Generation & Sigs

    Still manually digging through ReClass every time PlanetSide 2 pushes a minor update? Stop wasting your time. Found this dumper that automates the tedious part of maintaining an internal or external. It scans a game dump for patterns, prints the results, and spits out a clean C++ header file...
  4. byte_corvus

    Source Escape from Tarkov — DMA IL2CPP Metadata Dumper

    Escape from Tarkov — DMA IL2CPP Metadata Dumper Source Found a solid base for the DMA crowd digging into Tarkov. If you're tired of manual reversals after every minor patch, this project simplifies the process of pulling metadata from the second machine. This is a source-only release—no binaries...
  5. byte_corvus

    Source Rainbow Six Siege AI Aim — C++ DirectML & ONNX Implementation

    Anyone still trying to outrun BattlEye with pixel-based or AI methods knows the struggle—input lag, model inference times, and the constant battle with detection vectors. This is a complete C++ source for an AI-based aimbot utilizing DirectML, which is a solid alternative to the usual TensorRT...
  6. byte_corvus

    Question [Crash] R6S — Corrupted Memory Kick with Internal Trampoline Hook

    Anyone else getting clapped by the "Corrupted Memory Kick" in Siege lately? It looks like the old internal bases floating around are hitting a wall with current BattlEye integrity checks. I've been messing with a private base, and while the logic is solid, the hook implementation is screaming...
  7. byte_corvus

    Question Escape From Tarkov — Kernel Driver & BattlEye Detection Vectors

    Anyone currently digging into the EFT kernel space knows the struggle. If you are trying to push an internal for Tarkov using a manual mapper, you've likely hit the same brick wall: instant flags or delayed bans despite having no registry traces. The Current Setup The logic being used here is...
  8. byte_corvus

    Question PlanetSide 2 — Finding Offsets for DMA ESP (BattlEye Bypass & IDA)

    Been digging into PlanetSide 2 lately and hit the classic wall that most newcomers face when moving from simple memory scanning to actual development. If you're running a DMA setup with Metick's plugin for Cheat Engine, you've likely realized that scanning is the easy part—extracting clean...
  9. byte_corvus

    Guide Anti-Cheat Index — Complete Game Protection Database

    Knowledge is power. If you are planning a bypass, dumping offsets, or just want to know what ring0 nightmare you are up against before you start coding, you need a map of the landscape. Most of these ACs are industry standards, while others are legacy trash that should have stayed in the...
  10. byte_corvus

    Guide DMA Custom Firmware — Choosing Donor Hardware for Emulation

    Finally pulled the trigger on a DMA card and currently waiting for the hardware to arrive. In the meantime, I've been doing a deep dive into custom firmware (CFW) building. The consensus seems to be that emulating a donor device is the most reliable way to stay UD, but there's a lot of noise...
  11. byte_corvus

    Source EFT Aimbot — IL2CPP MovementContext Rotation Logic

    Tired of your internal EFT aimbot flicking 180 degrees into the ground or behaving like the scavs have a literal forcefield around them? I got my hands on a build that illustrates how to handle rotations via the MovementContext in the Unity engine, specifically for the IL2CPP Tarkov environment...
  12. byte_corvus

    Guide Kmbox B Pro Setup — VID/PID Spoofing and Hardware Safety

    Moving your input to hardware like the Kmbox B Pro is a smart play, especially with how aggressive kernel-level anti-cheats have become, but don't think you're safe just because it's a physical device. Running stock firmware is the fastest way to get flagged in a manual review or a signature...
  13. byte_corvus

    Guide [Discussion] Kernel Loading — Manual Mapping vs DSE Bypass (NtLoadDriver)

    Been digging into kernel loading methods lately and the results between standard manual mapping and DSE patching with NtLoadDriver are interesting, to say the least. Most people just grab kdmapper and call it a day, but that's a one-way ticket to a delayed ban on any decent anti-cheat (EAC/BE)...
  14. byte_corvus

    Guide KMBox B+ Pro — HID Descriptors, Input Security, and Humanization

    Anyone digging into the KMBox B+ Pro for their DMA setup has probably hit the wall of sparse documentation and the mess of translated Chinese manuals. If you are running a C++ based DMA project and relying on hardware mouse movement to bypass EAC or BattlEye, there are some technical nuances you...
  15. byte_corvus

    Question BattlEye — Methods for Undetected Mouse and Key Input Reading

    Anyone digging into external development for BE-protected titles eventually hits the wall with standard Windows API calls. Relying on GetAsyncKeyState or IsKeyDown is essentially asking for a manual flag. BattlEye loves to hook these common user-land functions to monitor for suspicious input...
Top