WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

ioctl

  1. byte_corvus

    Guide [Discussion] Windows Kernel — Exploiting PnP Drivers via CMApi

    Anyone currently digging into kernel-level exploits knows the headache of dealing with Plug and Play (PnP) drivers. Trying to weaponize a vulnerable PnP driver usually requires the PnP manager to call AddDevice in a very specific state, and doing it through the standard Setup API is bloated...
  2. byte_corvus

    Question Escape From Tarkov — Kernel Driver & BattlEye Detection Vectors

    Anyone currently digging into the EFT kernel space knows the struggle. If you are trying to push an internal for Tarkov using a manual mapper, you've likely hit the same brick wall: instant flags or delayed bans despite having no registry traces. The Current Setup The logic being used here is...
  3. byte_corvus

    Guide [Source] Windows HWID — Undocumented SpacePort Disk Method

    Ever wondered how some anti-cheats still flag your hardware after a \"perfect\" disk spoof? Most of you are just hitting the standard storage class drivers and calling it a day, but Windows has plenty of dark corners that leak your real identity. While digging through some undocumented device...
  4. byte_corvus

    Guide [Release] EAC Kernel Driver — RPM/WPM & VA to PA Mapper Base

    Got my hands on a kernel-mode driver setup that's been circulating for EAC-protected titles. It's currently being used in some external projects for Rust and is holding up, though with any public release, the "undetected" status is always a cat-and-mouse game. Use your head and test on a burner...
  5. byte_corvus

    Guide HWID Tracking — Technical Analysis of Windows Identifiers

    Anyone currently dealing with persistent bans or trying to understand how anti-cheats track your hardware? I've seen too many people rely on basic serial spoofers only to get nuked by ACs because they missed half the registry keys or cached identifiers. If you're building a spoofer or just...
  6. byte_corvus

    Guide Kernel HWID Spoofer — Bypassing Stornvme Cache and NDIS Virtual Leaks

    Working on a kernel-mode spoofer and hit the wall with native API leaks? You're not alone. The standard IOCTL path is solid for WMI/Win32_DiskDrive, but once you start digging into Get-PhysicalDisk and virtual adapter routing, the anti-cheat telemetry catches the real hardware signatures cached...
  7. byte_corvus

    Question Valorant Reversing VGK IOCTL Handshake and PPL Protection

    Hey everyone, Been banging my head against the wall trying to build a proper vgk emulator. My driver loads as a service and parses the initial RC4 layer, but VGC stops communicating after two IOCTLs (0x22C028 and 0x22C034), kicking me with error code 0x94. It's definitely looking for specific...
  8. byte_corvus

    Guide [Release] Universal Process Dumper Memory Decryption & PE Rebuilder

    Hello Amigos, Rample is back. I will start releasing some of my projects now. Today I am dropping my Process-Dumper. It works on every game, regardless of protections like Theia or Hyperion. Note: A driver is included but it is not Undetected; it is provided strictly for educational purposes...
Top