WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

bypass

  1. byte_corvus

    Question Freestyle GunZ — NtProtectVirtualMemory Hook Bypass & Reversing

    Anyone digging into the older private server scene lately? I took a look at Freestyle GunZ and their current protection scheme. It is heavily packed with VMProtect and seems to have inherited some legacy anti-cheat modules that have been Frankenstein-ed together over the years. The Protection...
  2. byte_corvus

    Question [Crash] Custom Hypervisor Freezing EAC — Troubleshooting CR3 Isolation

    Writing your own hypervisor from scratch is the ultimate gatekeep in the game hacking scene, but it comes with pure misery when Easy Anti-Cheat (EAC) starts hard-locking your machine during initialization. If you're dealing with immediate system hangs as soon as the anti-cheat splash screen...
  3. byte_corvus

    Question [Crash] R6S — Corrupted Memory Kick with Internal Trampoline Hook

    Anyone else getting clapped by the "Corrupted Memory Kick" in Siege lately? It looks like the old internal bases floating around are hitting a wall with current BattlEye integrity checks. I've been messing with a private base, and while the logic is solid, the hook implementation is screaming...
  4. byte_corvus

    Guide H1emu Anti-cheat & Asset Integrity Bypass — Config Method

    H1emu anti-cheat implementation is essentially glorified spyware with some basic monitoring attached. While it is not exactly at the level of kernel-level giants, it does several aggressive things you need to stay ahead of before messing with the client. Anti-Cheat Behavior Analysis The current...
  5. byte_corvus

    Undetected [Release] Phasmophobia Ext — Ghost Info & Cursed Hollow Event

    Phasmophobia Ext — a focused menu designed for ghost hunting without the usual fluff. It covers the basics for regular gameplay and adds specific utility for event-based grinding, like the Cursed Hollow rabbits. DOWNLOAD VIRUSTOTAL Core Features Ghost Information: Real-time data on the entity...
  6. byte_corvus

    Question One Piece Bounty Rush — XIGNCODE3 Memory Access Issue (UDCE)

    Ran into a wall while trying to poke at One Piece Bounty Rush on Steam. The game is protected by XIGNCODE3, and as most of you know, it's a pain if you don't handle the kernel-level heartbeats and handle stripping correctly. The Current Setup I'm using a modified Undetected Cheat Engine (UDCE)...
  7. byte_corvus

    Guide Arduino Uno R3 — HID Mouse Emulation via Dual-Board Bridge

    Tired of catching bans for simple mouse_event calls? If you are still relying on software-level input for your projects, you are asking for a manual review or an automated flag. Real ones know that hardware-level input is the only way to stay off the radar of modern anti-cheats. We are looking...
  8. byte_corvus

    Guide [Source] C&C Generals — Bypassing GenTool Hooks & Checksums

    Tired of GenTool's d3d8.dll hooks clashing with your patches? For anyone digging into C&C: Generals or Zero Hour, GenTool is the main hurdle for internal cheats. It uses two primary methods to stop you from patching the .text section or applying VMT/IAT hooks: Inline hooks on VirtualProtect and...
  9. byte_corvus

    Question Escape From Tarkov — Kernel Driver & BattlEye Detection Vectors

    Anyone currently digging into the EFT kernel space knows the struggle. If you are trying to push an internal for Tarkov using a manual mapper, you've likely hit the same brick wall: instant flags or delayed bans despite having no registry traces. The Current Setup The logic being used here is...
  10. byte_corvus

    Question CS2 External — DiscordOverlay Performance & Frame Rendering Issues

    Anyone currently digging into the DiscordOverlay library for their CS2 external projects? I've been experimenting with hijacking Discord's overlay for rendering, but the performance overhead and stability are proving to be a massive pain in the ass. The Goal I'm attempting to render custom...
  11. byte_corvus

    Guide Anti-Cheat Index — Complete Game Protection Database

    Knowledge is power. If you are planning a bypass, dumping offsets, or just want to know what ring0 nightmare you are up against before you start coding, you need a map of the landscape. Most of these ACs are industry standards, while others are legacy trash that should have stayed in the...
  12. byte_corvus

    Guide Hardware Input — Understanding KMBox B Pro & Net for HID Spoofing

    KMBox B Pro: The Lowdown on Hardware Input Spoofing If you are digging through Taobao or looking for ways to bypass modern anti-cheat input detection, you have likely seen the KMBox. In the current climate—where Vanguard, EAC, and BattlEye are nuking software-simulated inputs—these little boards...
  13. byte_corvus

    Question [Discussion] Rust — EAC Integrity Checks on GameAssembly.dll .text Section

    Anyone currently digging into Rust's IL2CPP assembly? I've been spending some time reversing GameAssembly.dll, specifically looking at how weapon fire and aimcone logic is handled. The goal is to find clean endpoints for external patching to kill the cone, but the big question is always the EAC...
  14. byte_corvus

    Guide [Source] DiscordHook64 — Hijacking Shared Section for Traceless Overlay

    If you're looking for a stealthier way to render visuals without creating top-level windows or messing with hijackable overlays that every AC already flags, this is the move. We're talking about hijacking the shared memory section DiscordHook64 uses for its framebuffer. The Concept Discord's...
  15. byte_corvus

    Guide [Source] Windows HWID — Undocumented SpacePort Disk Method

    Ever wondered how some anti-cheats still flag your hardware after a \"perfect\" disk spoof? Most of you are just hitting the standard storage class drivers and calling it a day, but Windows has plenty of dark corners that leak your real identity. While digging through some undocumented device...
  16. byte_corvus

    Guide [Release] EAC Kernel Driver — RPM/WPM & VA to PA Mapper Base

    Got my hands on a kernel-mode driver setup that's been circulating for EAC-protected titles. It's currently being used in some external projects for Rust and is holding up, though with any public release, the "undetected" status is always a cat-and-mouse game. Use your head and test on a burner...
  17. byte_corvus

    Guide SCP: SL Anti-Cheat Analysis — Reversing SLAC & HWID Spoofing

    Anyone else bored enough to look at SLAC (SCP: Secret Laboratory Anti-Cheat) lately? It is basically a Themida wrapper with some of the most primitive logic I have seen in a while. If you are digging into the binaries, here is the technical breakdown of how they handle (or fail to handle)...
  18. byte_corvus

    Guide Easy Anti-Cheat — Why Your DSE Bypass and Driver Traces Get Caught

    Still think patching g_CiOptions and unlinking your module is a golden ticket to being UD? I’ve been digging into EasyAntiCheat_EOS.sys lately, and the reality is that the old-school flow of "patch ci.dll -> load -> restore" is basically a neon sign for manual bans or instant flags these days...
  19. byte_corvus

    Question Kernel GDI Drawing on DWM — Handling Flush and Refresh on 24H2

    Anyone digging into kernel-mode overlays on the latest Windows builds has probably run into the classic GDI persistence headache. I've been experimenting with attaching to dwm.exe to render graphics directly from a driver, but the drawings just sit there—stuck on the screen because they aren't...
  20. byte_corvus

    Discuss Valorant — Bypassing Vanguard Secure Boot & TPM Enforcement

    Vanguard's aggressive requirement for Secure Boot, TPM 2.0, and HVCI is the bane of anyone running custom environments, modified Windows, or specific hardware setups. If you're trying to launch the game with these security features disabled, you've likely hit the standard hardware enforcement...
Top