WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

bypass

  1. byte_corvus

    Question Genshin Impact — Bypassing mhyprot2 to Attach x64dbg/CE

    Dealing with the mhyprot2 kernel driver in certain anime-centric RPGs is always a tedious game of cat and mouse. While the driver is basically a textbook implementation of kernel-level protection, it still effectively bricks most standard debugging attempts. I’ve been reversing the OS version...
  2. byte_corvus

    Guide [Source] Phasmophobia — BepInEx IL2CPP Crash Bypass & Modding

    Phasmophobia’s attempt at an 'anti-cheat' is essentially just the game triggering internal routines to force-close or crash the process if it detects unauthorized loaders like BepInEx or MelonLoader. If you have been trying to run mods and getting nuked on startup, here is the technical...
  3. byte_corvus

    Guide Aimbot Detection Bypass — Mouse Input Quantization

    Tired of getting clapped by server-side sanity checks while your memory aimbot is supposedly "UD"? Most paster-tier internal and external cheats compute target angles and slam them into the view rotation without a second thought. What gets missed is that legitimate mouse input is quantized...
  4. byte_corvus

    Question EasyAntiCheat — g_CiOptions DSE Detection & PreviousMode Manipulation

    EAC is getting significantly more aggressive about CI.dll flag manipulation. If you think just flipping a bit and flipping it back is enough to sneak an unsigned driver past EOS, you're missing how they verify kernel integrity. The DSE Restoration Problem Using an arbitrary kernel write...
  5. byte_corvus

    Undetected [Release] Dragonica Origin — No Cooldown, Speed & Vac Exploits

    Found this one making the rounds in certain private circles lately. It’s already been widely spotted on the servers, and apparently, the owners haven't lifted a finger to patch it despite reports. Since they don't seem to care about the integrity of the game or active moderation, might as well...
  6. byte_corvus

    Guide AM5 TPM Bypass — Infinite Identities via Microsoft Pluton

    Stop messing with Linux flashing methods or BIOS downgrades for a second. If you're on the AM5 platform, there's a much cleaner way to handle TPM-based hardware bans that seems to have flown under the radar. Most AM5 CPUs actually house two separate security processors: the standard AMD ASP...
  7. byte_corvus

    Discuss Battlefield 6 Javelin Anti-Cheat — DMA Hardware & Setup Guide

    Getting clapped by Javelin in Battlefield 6? If you're still running externals and wondering why your accounts are dropping like flies, it's time to wake up. Between TPM 2.0 requirements and Secure Boot enforcement, the cat-and-mouse game for external providers has reached a breaking point. If...
  8. byte_corvus

    Question Valorant — Solving VAL 5 Kicks in Custom VGC Emulator

    Anyone currently digging into VGC/VGK internals? Vanguard's handshake is a real headache once you move past the basics. I've been building a custom VGC emulator from scratch, and while I've managed to dump the service and clear the first hurdle, there's always a second wall waiting. The Current...
  9. byte_corvus

    Undetected [Release] Silkroad Online Multi-Client — iSRO Instance Loader

    Running a single instance in iSRO is a massive waste of time. If you are looking to scale your farm or run multiple characters without the Joymax client throwing a fit, this multi-client loader for iSRO is the standard way to go. It patches the client-side check that prevents multiple instances...
  10. byte_corvus

    Guide [Source] C# Discord Overlay Hijack — SkiaSharp Rendering Base

    Looking for a stealthy way to render external visuals? Hijacking the Discord overlay is a veteran tactic. It allows you to draw your ESP and menus on a legitimately injected surface that is already part of the game's swapchain, making your overlay significantly harder to detect than a standard...
  11. byte_corvus

    Guide [Source] Windows Secure Boot EFI Spoofing — CI.dll & HAL Pattern Scan

    Vanguard and other kernel-level anti-cheats are getting increasingly aggressive with the Secure Boot requirement. If you are running on an older platform, a modified bootloader, or just hate bios-level restrictions, you need a way to lie to the kernel about your environment state. Standard...
  12. byte_corvus

    Guide [Source] TPM HWID Bypass — Kernel-Level EK/AIK Hash Spoofing

    Getting clapped by Vanguard or Ricochet because of your TPM serials? Most public spoofers only touch the registry, which is a one-way ticket to a delay ban. If you are serious about bypassing HWID bans, you need to go deeper into the kernel layer where the actual drivers store their state. How...
  13. byte_corvus

    Source Combat Arms Multi-Client Mutex Hook — CA_GAME Bypass

    Bypassing the single-instance limitation in Combat Arms usually boils down to how the game handles its global mutex. For years, the signature identifier has been CA_GAME. If you try to launch a second instance, the client checks if this mutex exists and kills the process if it finds a handle. I...
  14. byte_corvus

    Undetected [Release] My Hero Ultra Rumble — Damage Multi & Revive Hacks

    My Hero Ultra Rumble Internal — Damage Multi & Global Revive Exploit Digging back into the MHA universe with a solid internal build. It covers the basic visuals but the real value is in the game-breaking exploits like damage modifiers and the revive logic that manipulates the whole lobby...
  15. byte_corvus

    Guide Valorant — The Brutal Reality of Vanguard and Dual PC Detections

    Anyone currently digging into the Valorant scene knows it's a bloodbath right now. I've been messing with this game since the beta, and Vanguard is hitting a point where even "safe" setups are getting clapped faster than a silver in a Radiant lobby. If you're still running public internals or...
  16. byte_corvus

    Guide [Source] C# Traces Cleaner — Wiping Strings from Explorer & LSASS

    Manual SS (ScreenShare) checks are the bane of any closet cheater's existence. Even if your internal or external is undetected by the AC, a server admin with half a brain and Process Hacker can usually find strings left behind in system processes like explorer.exe, lsass.exe, or svchost.exe...
  17. byte_corvus

    Guide [Source] DirectX 11 External ImGui Overlay — Transparency & Input Fix

    Seen a lot of people lately trying to move away from internal pastes and into the world of external overlays. It makes sense—avoiding hooks in the game's own memory space is a solid first step toward staying under the radar of aggressive ACs like EAC or BattlEye. However, setting up a proper...
  18. byte_corvus

    Guide Paladins — Force Private Profile Status via Steam Depot Downgrade

    Tired of sweaty players checking your win rate and flaming you before the match even starts? Setting your Paladins profile to private used to be a standard option, but Hi-Rez has made it a headache to toggle. This method leverages a Steam depot downgrade to access a legacy client build where the...
  19. byte_corvus

    Guide [Discussion] Windows Kernel — Exploiting PnP Drivers via CMApi

    Anyone currently digging into kernel-level exploits knows the headache of dealing with Plug and Play (PnP) drivers. Trying to weaponize a vulnerable PnP driver usually requires the PnP manager to call AddDevice in a very specific state, and doing it through the standard Setup API is bloated...
  20. byte_corvus

    Guide [Release] Massive Dump: 87 Vulnerable Drivers — WHQL Signed & EAC Bypass Base

    Kernel-level access just got a lot more accessible for those digging into anti-cheat internals. Got my hands on a collection of 87 vulnerable drivers that recently hit the public space. The real value here isn't just the volume, but the specific WHQL-signed drivers that are currently being...
Top