WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

driver

  1. byte_corvus

    Guide FiveM MatrixSpoofer — Open Source HWID Spoofer & Syscall Hooking Base

    FiveM is still aggressively hunting for identifiers, but it's nothing a clean driver-level block can't handle. This project, MatrixSpoofer, is an open-source base designed to bypass the standard HWID ban flags by nuking the paths FiveM uses to fingerprint your machine. It's essentially a...
  2. byte_corvus

    Guide [Discussion] SMBIOS Spoofing — Cleaning winmgmt Cache for Stealth Serials

    Anyone currently digging into temporary kernel spoofers has probably hit this wall. You hook or scan/replace the SMBIOS tables, verify the changes with debug prints, but then you fire up wmic baseboard get serialnumber and the old ID stares back at you. This happens because the Winmgmt (Windows...
  3. byte_corvus

    Guide [Source] kWalk — Stealth Kernel R/W via Manual PT Walk & MDL Remapping

    Tired of EAC/BE clanking your manual R/W because of outdated hardcoded offsets or stack attach detections? Most public bases rely on static DirectoryTableBase offsets that break with every minor Windows update, or they use KeStackAttachProcess which is essentially a giant "detect me" sign for...
  4. byte_corvus

    Guide [Discussion] EasyAntiCheat_EOS.sys Startup — Reverse Engineering the VM and Anti-Debug Gates

    Anyone currently digging into the latest EasyAntiCheat_EOS.sys build has probably noticed it's bloated into a 37MB monster. I've been running the startup path through a kernel emulator to map out exactly what happens before the monitoring loop kicks in. The short version? Most of the logic is...
  5. byte_corvus

    Question Roblox Internal Offsets — Kernel Memory Dumper & Hyperion Logic

    Anyone currently digging into the latest Hyperion builds knows the struggle. If you’ve tried to pull a clean PE for Ghidra or IDA only to find the sections zeroed out, you're dealing with their scattered mapping and lazy loading. I’ve been refining a kernel-level approach to bypass the typical...
  6. byte_corvus

    Guide [Source] Windows Secure Boot EFI Spoofing — CI.dll & HAL Pattern Scan

    Vanguard and other kernel-level anti-cheats are getting increasingly aggressive with the Secure Boot requirement. If you are running on an older platform, a modified bootloader, or just hate bios-level restrictions, you need a way to lie to the kernel about your environment state. Standard...
  7. byte_corvus

    Guide [Source] TPM HWID Bypass — Kernel-Level EK/AIK Hash Spoofing

    Getting clapped by Vanguard or Ricochet because of your TPM serials? Most public spoofers only touch the registry, which is a one-way ticket to a delay ban. If you are serious about bypassing HWID bans, you need to go deeper into the kernel layer where the actual drivers store their state. How...
  8. byte_corvus

    Question Windows 10/11 Driver Loading — HVCI & Kernel Meta

    Anyone digging into kernel-level development lately knows that the Windows environment has become a minefield. If you're trying to push a custom driver on modern builds of Windows 10 or 11, the HVCI (Hypervisor-Protected Code Integrity) wall is the first thing that will slap your loader down...
  9. byte_corvus

    Guide [Discussion] Windows Kernel — Exploiting PnP Drivers via CMApi

    Anyone currently digging into kernel-level exploits knows the headache of dealing with Plug and Play (PnP) drivers. Trying to weaponize a vulnerable PnP driver usually requires the PnP manager to call AddDevice in a very specific state, and doing it through the standard Setup API is bloated...
  10. byte_corvus

    Guide [Release] Massive Dump: 87 Vulnerable Drivers — WHQL Signed & EAC Bypass Base

    Kernel-level access just got a lot more accessible for those digging into anti-cheat internals. Got my hands on a collection of 87 vulnerable drivers that recently hit the public space. The real value here isn't just the volume, but the specific WHQL-signed drivers that are currently being...
  11. byte_corvus

    Guide EAC Kernel Driver — Screen Capture & Win32k Resolution

    Anyone still thinking their external overlay is 100% safe just because it's "external" needs to look at what Easy Anti-Cheat (EAC) is actually doing inside their kernel driver. While digging through their latest mess of obfuscated code islands, it looks like they are still heavily relying on...
  12. byte_corvus

    Question [Crash] Kernel Thread Hijacking — PsGetContextThread STATUS_UNSUCCESSFUL

    Anyone currently digging into thread hijacking from the kernel has probably hit this wall. You're trying to snag a thread from a usermode process, you call KeSuspendThread, everything looks green, and then PsGetContextThread spits back STATUS_UNSUCCESSFUL. The problem usually comes down to how...
  13. byte_corvus

    Guide Windows 11 — kdmapper Driver Detection Vectors & Mitigation

    Anyone still relying on kdmapper for Windows 11 is playing a dangerous game if they aren't accounting for modern kernel telemetry. Got a situation where a basic driver—zero communications, manual import resolution, and Code Virtualizer protection—is still hitting walls, specifically BSODs when...
  14. byte_corvus

    Guide [Source] C++ Convenient Shellcode Builder — Kernel & Usermode

    Manual patching of shellcode byte arrays is a waste of time. If you're tired of defining hardcoded arrays and then calculating offsets to patch in addresses or constants at runtime, this C++ wrapper is what you need. It allows you to pass immediate values directly into the shellcode definition...
  15. byte_corvus

    Source Apex Legends External Base — ESP & Aimbot (Requires Driver)

    Apex Legends External Base DOWNLOAD If you are looking to get your feet wet with Apex Legends externals without sifting through a 500-file project, this skeletal base is a solid starting point. It covers the essentials without the usual bloated wrapper code found in most public pastes...
  16. byte_corvus

    Question Escape From Tarkov — Kernel Driver & BattlEye Detection Vectors

    Anyone currently digging into the EFT kernel space knows the struggle. If you are trying to push an internal for Tarkov using a manual mapper, you've likely hit the same brick wall: instant flags or delayed bans despite having no registry traces. The Current Setup The logic being used here is...
  17. byte_corvus

    Guide [Release] EAC Kernel Driver — RPM/WPM & VA to PA Mapper Base

    Got my hands on a kernel-mode driver setup that's been circulating for EAC-protected titles. It's currently being used in some external projects for Rust and is holding up, though with any public release, the "undetected" status is always a cat-and-mouse game. Use your head and test on a burner...
  18. byte_corvus

    Guide Easy Anti-Cheat — Why Your DSE Bypass and Driver Traces Get Caught

    Still think patching g_CiOptions and unlinking your module is a golden ticket to being UD? I’ve been digging into EasyAntiCheat_EOS.sys lately, and the reality is that the old-school flow of "patch ci.dll -> load -> restore" is basically a neon sign for manual bans or instant flags these days...
  19. byte_corvus

    Question Kernel GDI Drawing on DWM — Handling Flush and Refresh on 24H2

    Anyone digging into kernel-mode overlays on the latest Windows builds has probably run into the classic GDI persistence headache. I've been experimenting with attaching to dwm.exe to render graphics directly from a driver, but the drawings just sit there—stuck on the screen because they aren't...
  20. byte_corvus

    Question [Crash] Valorant External — Guarded Region & UWorld Resolution Fail

    Been digging into a Valorant external and hitting a machine-specific wall. The setup is standard: signed driver, HVCI and Secure Boot are non-issues, and the base functionality is solid. On a Windows 11 test bench, everything maps and reads flawlessly. However, moving the build to a Windows 10...
Top