WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

kernel

  1. byte_corvus

    Guide [Source] Windows Secure Boot EFI Spoofing — CI.dll & HAL Pattern Scan

    Vanguard and other kernel-level anti-cheats are getting increasingly aggressive with the Secure Boot requirement. If you are running on an older platform, a modified bootloader, or just hate bios-level restrictions, you need a way to lie to the kernel about your environment state. Standard...
  2. byte_corvus

    Guide [Source] TPM HWID Bypass — Kernel-Level EK/AIK Hash Spoofing

    Getting clapped by Vanguard or Ricochet because of your TPM serials? Most public spoofers only touch the registry, which is a one-way ticket to a delay ban. If you are serious about bypassing HWID bans, you need to go deeper into the kernel layer where the actual drivers store their state. How...
  3. byte_corvus

    Question Apex Legends Kernel RCS — Memory Write Flickering & Offset Analysis

    Trying to implement a stable RCS via kernel memory writes in Apex is becoming a massive headache, especially with how EAC monitors viewangle consistency now. If you're digging into the CPlayer structures, you've likely seen the common offsets, but getting a clean compensation without the dreaded...
  4. byte_corvus

    Question Windows 10/11 Driver Loading — HVCI & Kernel Meta

    Anyone digging into kernel-level development lately knows that the Windows environment has become a minefield. If you're trying to push a custom driver on modern builds of Windows 10 or 11, the HVCI (Hypervisor-Protected Code Integrity) wall is the first thing that will slap your loader down...
  5. byte_corvus

    Question Valorant Color Aimbot — Pipe Architecture & OpenCV Detection

    Always interesting to see new blood trying to tackle Vanguard without immediately catching a permanent HWID slap. Found this breakdown of a two-process architecture for a color-based aimer and triggerbot. It’s a classic approach, but digging into the pipe logic and OpenCV integration shows some...
  6. byte_corvus

    Guide [Discussion] Windows Kernel — Exploiting PnP Drivers via CMApi

    Anyone currently digging into kernel-level exploits knows the headache of dealing with Plug and Play (PnP) drivers. Trying to weaponize a vulnerable PnP driver usually requires the PnP manager to call AddDevice in a very specific state, and doing it through the standard Setup API is bloated...
  7. byte_corvus

    Guide [Release] Massive Dump: 87 Vulnerable Drivers — WHQL Signed & EAC Bypass Base

    Kernel-level access just got a lot more accessible for those digging into anti-cheat internals. Got my hands on a collection of 87 vulnerable drivers that recently hit the public space. The real value here isn't just the volume, but the specific WHQL-signed drivers that are currently being...
  8. byte_corvus

    Guide EAC Kernel Driver — Screen Capture & Win32k Resolution

    Anyone still thinking their external overlay is 100% safe just because it's "external" needs to look at what Easy Anti-Cheat (EAC) is actually doing inside their kernel driver. While digging through their latest mess of obfuscated code islands, it looks like they are still heavily relying on...
  9. byte_corvus

    Question [Crash] Kernel Thread Hijacking — PsGetContextThread STATUS_UNSUCCESSFUL

    Anyone currently digging into thread hijacking from the kernel has probably hit this wall. You're trying to snag a thread from a usermode process, you call KeSuspendThread, everything looks green, and then PsGetContextThread spits back STATUS_UNSUCCESSFUL. The problem usually comes down to how...
  10. byte_corvus

    Guide Windows 11 — kdmapper Driver Detection Vectors & Mitigation

    Anyone still relying on kdmapper for Windows 11 is playing a dangerous game if they aren't accounting for modern kernel telemetry. Got a situation where a basic driver—zero communications, manual import resolution, and Code Virtualizer protection—is still hitting walls, specifically BSODs when...
  11. byte_corvus

    Guide [Source] C++ Convenient Shellcode Builder — Kernel & Usermode

    Manual patching of shellcode byte arrays is a waste of time. If you're tired of defining hardcoded arrays and then calculating offsets to patch in addresses or constants at runtime, this C++ wrapper is what you need. It allows you to pass immediate values directly into the shellcode definition...
  12. byte_corvus

    Question [Crash] Custom Hypervisor Freezing EAC — Troubleshooting CR3 Isolation

    Writing your own hypervisor from scratch is the ultimate gatekeep in the game hacking scene, but it comes with pure misery when Easy Anti-Cheat (EAC) starts hard-locking your machine during initialization. If you're dealing with immediate system hangs as soon as the anti-cheat splash screen...
  13. byte_corvus

    Question Valorant HVCI Memory Reading — UWorld Returning 0x0

    Anyone currently digging into Valorant memory with HVCI enabled? Had a look at a recent build and I am seeing more people hitting a wall where their driver responds, but UWorld and GameInstance return 0x0. If you are getting a valid PID and game base but null pointers, you aren't just missing...
  14. byte_corvus

    Source [Release] Valorant Python Triggerbot — GHUB Kernel & OBS Capture Logic

    Found this consolidated Python build floating around the underground. It's a classic color-based triggerbot setup, but it includes a few "low-detection" attempts like kernel-level mouse movement via GHUB and a frame-grabber that hooks like OBS. The author claims it's "vibecoded," which is...
  15. byte_corvus

    Question Valorant — Vanguard Detection Risks for Global Python Hooks

    Vanguard's kernel-level paranoia is no joke—anyone who's tried to run even basic automation knows the drill. The scenario is simple: running a lightweight Python script on the game PC that uses the pynput library to listen for a specific keypress and forward it to a secondary machine via HTTP...
  16. byte_corvus

    Question Escape From Tarkov — Kernel Driver & BattlEye Detection Vectors

    Anyone currently digging into the EFT kernel space knows the struggle. If you are trying to push an internal for Tarkov using a manual mapper, you've likely hit the same brick wall: instant flags or delayed bans despite having no registry traces. The Current Setup The logic being used here is...
  17. byte_corvus

    Guide Anti-Cheat Index — Complete Game Protection Database

    Knowledge is power. If you are planning a bypass, dumping offsets, or just want to know what ring0 nightmare you are up against before you start coding, you need a map of the landscape. Most of these ACs are industry standards, while others are legacy trash that should have stayed in the...
  18. byte_corvus

    Guide [Source] DiscordHook64 — Hijacking Shared Section for Traceless Overlay

    If you're looking for a stealthier way to render visuals without creating top-level windows or messing with hijackable overlays that every AC already flags, this is the move. We're talking about hijacking the shared memory section DiscordHook64 uses for its framebuffer. The Concept Discord's...
  19. byte_corvus

    Guide [Source] Windows HWID — Undocumented SpacePort Disk Method

    Ever wondered how some anti-cheats still flag your hardware after a \"perfect\" disk spoof? Most of you are just hitting the standard storage class drivers and calling it a day, but Windows has plenty of dark corners that leak your real identity. While digging through some undocumented device...
  20. byte_corvus

    Guide [Release] EAC Kernel Driver — RPM/WPM & VA to PA Mapper Base

    Got my hands on a kernel-mode driver setup that's been circulating for EAC-protected titles. It's currently being used in some external projects for Rust and is holding up, though with any public release, the "undetected" status is always a cat-and-mouse game. Use your head and test on a burner...
Top