WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

detection

  1. byte_corvus

    Guide SCPSL — Reversing Themida 3 Protected AC & Signature Extraction

    Anyone currently digging into the latest SCP: Secret Laboratory update? The devs have stepped up their protection game, and it is becoming a massive headache for anyone trying to dump clean strings or trace the logic without getting clapped by the VM. The Current Situation Trying to tear down...
  2. byte_corvus

    Guide Windows 11 — kdmapper Driver Detection Vectors & Mitigation

    Anyone still relying on kdmapper for Windows 11 is playing a dangerous game if they aren't accounting for modern kernel telemetry. Got a situation where a basic driver—zero communications, manual import resolution, and Code Virtualizer protection—is still hitting walls, specifically BSODs when...
  3. byte_corvus

    Discuss Valorant DMA Bans — MemProcFS Detection & Account Flagging

    Anyone else getting clapped by Vanguard despite running what should be a safe DMA setup? I've been digging into some strange behavior lately where custom firmware isn't enough to save the account. We're seeing a wave of account-level bans that don't immediately trigger an HWID strike, which...
  4. byte_corvus

    Question Escape From Tarkov — Kernel Driver & BattlEye Detection Vectors

    Anyone currently digging into the EFT kernel space knows the struggle. If you are trying to push an internal for Tarkov using a manual mapper, you've likely hit the same brick wall: instant flags or delayed bans despite having no registry traces. The Current Setup The logic being used here is...
  5. byte_corvus

    Guide Safest ESP Drawing Methods — OpenGL Overlay vs DirectX Hooking

    Anyone who's spent more than a week in reverse engineering knows the internal vs external drawing debate never ends. If you're moving past offline projects and looking at titles protected by EAC or BattlEye, your choice of drawing method can get you clapped before you even finish your first...
  6. byte_corvus

    Guide Hypervisor Future — Detection Vectors and Long-term Viability

    With everyone jumping on the hypervisor hype train lately, it is time to have a serious talk about the shelf life of these setups. We are seeing a massive shift toward VT-x and AMD-V based bypasses, but anti-cheat developers (especially the Vanguard and EAC teams) are not exactly sitting on...
  7. byte_corvus

    Question Rust External Chams — Detection Status & Material ID Logic

    Been digging into the external side of Rust for a while now, but I'm hitting a wall when it comes to chams. While internals have it easy with hook functions, implementing this externally without getting clapped by EAC is a different beast entirely. The Technical Hurdle Implementing chams...
  8. byte_corvus

    Question BattlEye — Methods for Undetected Mouse and Key Input Reading

    Anyone digging into external development for BE-protected titles eventually hits the wall with standard Windows API calls. Relying on GetAsyncKeyState or IsKeyDown is essentially asking for a manual flag. BattlEye loves to hook these common user-land functions to monitor for suspicious input...
  9. byte_corvus

    Question Does read-only external memory access reduce EAC detection risk?

    Hi, I've been digging into some external logic and wanted to get some feedback from the dev side. If an external cheat is purely read-only (RPM only), meaning absolutely no writes, no input injection (like KMBox/mouse event spoofing), and no function hooks, does that actually move the needle on...
Top