WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

hwid

  1. byte_corvus

    Undetected [DMA] CS2 Pro DMA — Aimbot, VPK Vischeck & Web Radar

    If you are running a DMA setup to stay under the radar in Premier, this project is worth a look. It is a solid implementation that goes beyond the basic RPM/WPM pastes, specifically using VPK parsing for visibility checks—a much cleaner approach than most public bases. Technical Overview This...
  2. byte_corvus

    Guide [Discussion] SMBIOS Spoofing — Cleaning winmgmt Cache for Stealth Serials

    Anyone currently digging into temporary kernel spoofers has probably hit this wall. You hook or scan/replace the SMBIOS tables, verify the changes with debug prints, but then you fire up wmic baseboard get serialnumber and the old ID stares back at you. This happens because the Winmgmt (Windows...
  3. byte_corvus

    Guide AM5 TPM Bypass — Infinite Identities via Microsoft Pluton

    Stop messing with Linux flashing methods or BIOS downgrades for a second. If you're on the AM5 platform, there's a much cleaner way to handle TPM-based hardware bans that seems to have flown under the radar. Most AM5 CPUs actually house two separate security processors: the standard AMD ASP...
  4. byte_corvus

    Guide [Discussion] EasyAntiCheat_EOS.sys Startup — Reverse Engineering the VM and Anti-Debug Gates

    Anyone currently digging into the latest EasyAntiCheat_EOS.sys build has probably noticed it's bloated into a 37MB monster. I've been running the startup path through a kernel emulator to map out exactly what happens before the monitoring loop kicks in. The short version? Most of the logic is...
  5. byte_corvus

    Guide [Source] TPM HWID Bypass — Kernel-Level EK/AIK Hash Spoofing

    Getting clapped by Vanguard or Ricochet because of your TPM serials? Most public spoofers only touch the registry, which is a one-way ticket to a delay ban. If you are serious about bypassing HWID bans, you need to go deeper into the kernel layer where the actual drivers store their state. How...
  6. byte_corvus

    Guide VALORANT — Manual Permanent HWID Spoof (VAN 152 Fix)

    Stop dumping money into third-party spoofers that are just wrappers for free tools. If you have been hit by a VAN 152 ban in League of Legends or any other Vanguard-protected title, you don't need a subscription. Most people get clapped because they don't understand that the tools required to...
  7. byte_corvus

    Discuss Valorant DMA Bans — MemProcFS Detection & Account Flagging

    Anyone else getting clapped by Vanguard despite running what should be a safe DMA setup? I've been digging into some strange behavior lately where custom firmware isn't enough to save the account. We're seeing a wave of account-level bans that don't immediately trigger an HWID strike, which...
  8. byte_corvus

    Guide Valorant Bluetooth MAC Spoofing — Firmware Level vs. Software

    Vanguard's HWID collection is becoming increasingly intrusive. While most users focus on raiding their disks and nuking their NIC MACs, the question of Bluetooth adapters is a valid concern for anyone trying to maintain a clean footprint. If you are aiming for a "permanent" spoof, standard...
  9. byte_corvus

    Guide [Source] Windows HWID — Undocumented SpacePort Disk Method

    Ever wondered how some anti-cheats still flag your hardware after a \"perfect\" disk spoof? Most of you are just hitting the standard storage class drivers and calling it a day, but Windows has plenty of dark corners that leak your real identity. While digging through some undocumented device...
  10. byte_corvus

    Discuss Valorant — Bypassing Vanguard Secure Boot & TPM Enforcement

    Vanguard's aggressive requirement for Secure Boot, TPM 2.0, and HVCI is the bane of anyone running custom environments, modified Windows, or specific hardware setups. If you're trying to launch the game with these security features disabled, you've likely hit the standard hardware enforcement...
  11. byte_corvus

    Guide Zula — Blackbone Kernel Mapping & BitBlt Screenshot Bypass

    Struggling with Zula's manual bans or just can't get your driver mapping right? I've been digging into the kernel side of things for this title and wanted to drop a proper breakdown on setting up Blackbone and handling their screenshot-based reporting system. Blackbone Driver Configuration If...
  12. byte_corvus

    Guide HWID Tracking — Technical Analysis of Windows Identifiers

    Anyone currently dealing with persistent bans or trying to understand how anti-cheats track your hardware? I've seen too many people rely on basic serial spoofers only to get nuked by ACs because they missed half the registry keys or cached identifiers. If you're building a spoofer or just...
  13. byte_corvus

    Guide Kernel HWID Spoofer — Bypassing Stornvme Cache and NDIS Virtual Leaks

    Working on a kernel-mode spoofer and hit the wall with native API leaks? You're not alone. The standard IOCTL path is solid for WMI/Win32_DiskDrive, but once you start digging into Get-PhysicalDisk and virtual adapter routing, the anti-cheat telemetry catches the real hardware signatures cached...
Top