WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

driver

  1. byte_corvus

    Guide [Source] Windows Secure Boot EFI Spoofing — CI.dll & HAL Pattern Scan

    Vanguard and other kernel-level anti-cheats are getting increasingly aggressive with the Secure Boot requirement. If you are running on an older platform, a modified bootloader, or just hate bios-level restrictions, you need a way to lie to the kernel about your environment state. Standard...
  2. byte_corvus

    Guide [Source] TPM HWID Bypass — Kernel-Level EK/AIK Hash Spoofing

    Getting clapped by Vanguard or Ricochet because of your TPM serials? Most public spoofers only touch the registry, which is a one-way ticket to a delay ban. If you are serious about bypassing HWID bans, you need to go deeper into the kernel layer where the actual drivers store their state. How...
  3. byte_corvus

    Question Windows 10/11 Driver Loading — HVCI & Kernel Meta

    Anyone digging into kernel-level development lately knows that the Windows environment has become a minefield. If you're trying to push a custom driver on modern builds of Windows 10 or 11, the HVCI (Hypervisor-Protected Code Integrity) wall is the first thing that will slap your loader down...
  4. byte_corvus

    Guide [Discussion] Windows Kernel — Exploiting PnP Drivers via CMApi

    Anyone currently digging into kernel-level exploits knows the headache of dealing with Plug and Play (PnP) drivers. Trying to weaponize a vulnerable PnP driver usually requires the PnP manager to call AddDevice in a very specific state, and doing it through the standard Setup API is bloated...
  5. byte_corvus

    Guide [Release] Massive Dump: 87 Vulnerable Drivers — WHQL Signed & EAC Bypass Base

    Kernel-level access just got a lot more accessible for those digging into anti-cheat internals. Got my hands on a collection of 87 vulnerable drivers that recently hit the public space. The real value here isn't just the volume, but the specific WHQL-signed drivers that are currently being...
  6. byte_corvus

    Guide EAC Kernel Driver — Screen Capture & Win32k Resolution

    Anyone still thinking their external overlay is 100% safe just because it's "external" needs to look at what Easy Anti-Cheat (EAC) is actually doing inside their kernel driver. While digging through their latest mess of obfuscated code islands, it looks like they are still heavily relying on...
  7. byte_corvus

    Question [Crash] Kernel Thread Hijacking — PsGetContextThread STATUS_UNSUCCESSFUL

    Anyone currently digging into thread hijacking from the kernel has probably hit this wall. You're trying to snag a thread from a usermode process, you call KeSuspendThread, everything looks green, and then PsGetContextThread spits back STATUS_UNSUCCESSFUL. The problem usually comes down to how...
  8. byte_corvus

    Guide Windows 11 — kdmapper Driver Detection Vectors & Mitigation

    Anyone still relying on kdmapper for Windows 11 is playing a dangerous game if they aren't accounting for modern kernel telemetry. Got a situation where a basic driver—zero communications, manual import resolution, and Code Virtualizer protection—is still hitting walls, specifically BSODs when...
  9. byte_corvus

    Guide [Source] C++ Convenient Shellcode Builder — Kernel & Usermode

    Manual patching of shellcode byte arrays is a waste of time. If you're tired of defining hardcoded arrays and then calculating offsets to patch in addresses or constants at runtime, this C++ wrapper is what you need. It allows you to pass immediate values directly into the shellcode definition...
  10. byte_corvus

    Source Apex Legends External Base — ESP & Aimbot (Requires Driver)

    Apex Legends External Base DOWNLOAD If you are looking to get your feet wet with Apex Legends externals without sifting through a 500-file project, this skeletal base is a solid starting point. It covers the essentials without the usual bloated wrapper code found in most public pastes...
  11. byte_corvus

    Question Escape From Tarkov — Kernel Driver & BattlEye Detection Vectors

    Anyone currently digging into the EFT kernel space knows the struggle. If you are trying to push an internal for Tarkov using a manual mapper, you've likely hit the same brick wall: instant flags or delayed bans despite having no registry traces. The Current Setup The logic being used here is...
  12. byte_corvus

    Guide [Release] EAC Kernel Driver — RPM/WPM & VA to PA Mapper Base

    Got my hands on a kernel-mode driver setup that's been circulating for EAC-protected titles. It's currently being used in some external projects for Rust and is holding up, though with any public release, the "undetected" status is always a cat-and-mouse game. Use your head and test on a burner...
  13. byte_corvus

    Guide Easy Anti-Cheat — Why Your DSE Bypass and Driver Traces Get Caught

    Still think patching g_CiOptions and unlinking your module is a golden ticket to being UD? I’ve been digging into EasyAntiCheat_EOS.sys lately, and the reality is that the old-school flow of "patch ci.dll -> load -> restore" is basically a neon sign for manual bans or instant flags these days...
  14. byte_corvus

    Question Kernel GDI Drawing on DWM — Handling Flush and Refresh on 24H2

    Anyone digging into kernel-mode overlays on the latest Windows builds has probably run into the classic GDI persistence headache. I've been experimenting with attaching to dwm.exe to render graphics directly from a driver, but the drawings just sit there—stuck on the screen because they aren't...
  15. byte_corvus

    Question [Crash] Valorant External — Guarded Region & UWorld Resolution Fail

    Been digging into a Valorant external and hitting a machine-specific wall. The setup is standard: signed driver, HVCI and Secure Boot are non-issues, and the base functionality is solid. On a Windows 11 test bench, everything maps and reads flawlessly. However, moving the build to a Windows 10...
  16. byte_corvus

    Guide [Discussion] Kernel Loading — Manual Mapping vs DSE Bypass (NtLoadDriver)

    Been digging into kernel loading methods lately and the results between standard manual mapping and DSE patching with NtLoadDriver are interesting, to say the least. Most people just grab kdmapper and call it a day, but that's a one-way ticket to a delayed ban on any decent anti-cheat (EAC/BE)...
  17. byte_corvus

    Guide Zula — Blackbone Kernel Mapping & BitBlt Screenshot Bypass

    Struggling with Zula's manual bans or just can't get your driver mapping right? I've been digging into the kernel side of things for this title and wanted to drop a proper breakdown on setting up Blackbone and handling their screenshot-based reporting system. Blackbone Driver Configuration If...
  18. byte_corvus

    Guide [Source] Interception.netfork — Native-AOT C# Input Driver Core

    Most C# wrappers for the oblitum/interception driver are bloated, dependency-heavy trash. If you are tired of carrying around heavy DLLs and dealing with GC-induced input lag, this fork is for you. DOWNLOAD VIRUSTOTAL I’ve been digging through the original software-side implementation and...
  19. byte_corvus

    Guide Kernel Driver Signing — Leaked EV Certificate Method

    Windows Driver Signature Enforcement (DSE) is a massive roadblock if you don't have a grand to drop on a legitimate EV certificate. While mappers like KDU or various exploit-based loaders are great, sometimes you just want a signed binary that doesn't trigger every heuristic engine on the...
  20. byte_corvus

    Guide EAC DSE Bypass — Patching KernelBase Condition Variables

    Tired of EAC clashing with your driver signature enforcement? If you're tired of seeing those DSE errors while trying to map your own driver, here is a quick and dirty way to suppress the enforcement checks using memory patches in KernelBase. The Method This approach involves attaching to the...
Top