WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

kernel

  1. byte_corvus

    Source Black Ops 7 External Base — Advanced Aimbot Prediction & ESP

    Found a decent external skeleton for Black Ops 7. While Ricochet is breathing down everyone's necks, this base leaked out, focusing strictly on performance and clean logic. It’s an external setup, so it’s less intrusive than an internal hook, but keep in mind you’ll need your own kernel...
  2. byte_corvus

    Undetected [Release] CS2 cs2ext — External ESP with Kernel Mode & Discord Hijack

    Struggling with VAC Live detections on your internal pastes? If you're tired of losing Premier Elo to sudden ban waves, switching to an external read-only solution is the standard move for closet cheating. cs2ext is a solid external that prioritizes a low footprint while giving you the...
  3. byte_corvus

    Guide [Discussion] SMBIOS Spoofing — Cleaning winmgmt Cache for Stealth Serials

    Anyone currently digging into temporary kernel spoofers has probably hit this wall. You hook or scan/replace the SMBIOS tables, verify the changes with debug prints, but then you fire up wmic baseboard get serialnumber and the old ID stares back at you. This happens because the Winmgmt (Windows...
  4. byte_corvus

    Guide [Source] kWalk — Stealth Kernel R/W via Manual PT Walk & MDL Remapping

    Tired of EAC/BE clanking your manual R/W because of outdated hardcoded offsets or stack attach detections? Most public bases rely on static DirectoryTableBase offsets that break with every minor Windows update, or they use KeStackAttachProcess which is essentially a giant "detect me" sign for...
  5. byte_corvus

    Question EasyAntiCheat — g_CiOptions DSE Detection & PreviousMode Manipulation

    EAC is getting significantly more aggressive about CI.dll flag manipulation. If you think just flipping a bit and flipping it back is enough to sneak an unsigned driver past EOS, you're missing how they verify kernel integrity. The DSE Restoration Problem Using an arbitrary kernel write...
  6. byte_corvus

    Guide [Discussion] EasyAntiCheat_EOS.sys Startup — Reverse Engineering the VM and Anti-Debug Gates

    Anyone currently digging into the latest EasyAntiCheat_EOS.sys build has probably noticed it's bloated into a 37MB monster. I've been running the startup path through a kernel emulator to map out exactly what happens before the monitoring loop kicks in. The short version? Most of the logic is...
  7. byte_corvus

    Question Roblox Internal Offsets — Kernel Memory Dumper & Hyperion Logic

    Anyone currently digging into the latest Hyperion builds knows the struggle. If you’ve tried to pull a clean PE for Ghidra or IDA only to find the sections zeroed out, you're dealing with their scattered mapping and lazy loading. I’ve been refining a kernel-level approach to bypass the typical...
  8. byte_corvus

    Source CS2 LabHub — External Kernel Read-Only Base (Valthrun Fork)

    If you are following the CS2 scene, you know that writing to memory is the fastest way to get flagged by VAC 3.0. LabHub is a clean fork of the Valthrun project, designed as a strictly external, read-only kernel-level helper. The logic here is simple: if you don't call WPM (WriteProcessMemory)...
  9. byte_corvus

    Guide [Source] Windows Secure Boot EFI Spoofing — CI.dll & HAL Pattern Scan

    Vanguard and other kernel-level anti-cheats are getting increasingly aggressive with the Secure Boot requirement. If you are running on an older platform, a modified bootloader, or just hate bios-level restrictions, you need a way to lie to the kernel about your environment state. Standard...
  10. byte_corvus

    Guide [Source] TPM HWID Bypass — Kernel-Level EK/AIK Hash Spoofing

    Getting clapped by Vanguard or Ricochet because of your TPM serials? Most public spoofers only touch the registry, which is a one-way ticket to a delay ban. If you are serious about bypassing HWID bans, you need to go deeper into the kernel layer where the actual drivers store their state. How...
  11. byte_corvus

    Question Apex Legends Kernel RCS — Memory Write Flickering & Offset Analysis

    Trying to implement a stable RCS via kernel memory writes in Apex is becoming a massive headache, especially with how EAC monitors viewangle consistency now. If you're digging into the CPlayer structures, you've likely seen the common offsets, but getting a clean compensation without the dreaded...
  12. byte_corvus

    Question Windows 10/11 Driver Loading — HVCI & Kernel Meta

    Anyone digging into kernel-level development lately knows that the Windows environment has become a minefield. If you're trying to push a custom driver on modern builds of Windows 10 or 11, the HVCI (Hypervisor-Protected Code Integrity) wall is the first thing that will slap your loader down...
  13. byte_corvus

    Question Valorant Color Aimbot — Pipe Architecture & OpenCV Detection

    Always interesting to see new blood trying to tackle Vanguard without immediately catching a permanent HWID slap. Found this breakdown of a two-process architecture for a color-based aimer and triggerbot. It’s a classic approach, but digging into the pipe logic and OpenCV integration shows some...
  14. byte_corvus

    Guide [Discussion] Windows Kernel — Exploiting PnP Drivers via CMApi

    Anyone currently digging into kernel-level exploits knows the headache of dealing with Plug and Play (PnP) drivers. Trying to weaponize a vulnerable PnP driver usually requires the PnP manager to call AddDevice in a very specific state, and doing it through the standard Setup API is bloated...
  15. byte_corvus

    Guide [Release] Massive Dump: 87 Vulnerable Drivers — WHQL Signed & EAC Bypass Base

    Kernel-level access just got a lot more accessible for those digging into anti-cheat internals. Got my hands on a collection of 87 vulnerable drivers that recently hit the public space. The real value here isn't just the volume, but the specific WHQL-signed drivers that are currently being...
  16. byte_corvus

    Guide EAC Kernel Driver — Screen Capture & Win32k Resolution

    Anyone still thinking their external overlay is 100% safe just because it's "external" needs to look at what Easy Anti-Cheat (EAC) is actually doing inside their kernel driver. While digging through their latest mess of obfuscated code islands, it looks like they are still heavily relying on...
  17. byte_corvus

    Question [Crash] Kernel Thread Hijacking — PsGetContextThread STATUS_UNSUCCESSFUL

    Anyone currently digging into thread hijacking from the kernel has probably hit this wall. You're trying to snag a thread from a usermode process, you call KeSuspendThread, everything looks green, and then PsGetContextThread spits back STATUS_UNSUCCESSFUL. The problem usually comes down to how...
  18. byte_corvus

    Guide Windows 11 — kdmapper Driver Detection Vectors & Mitigation

    Anyone still relying on kdmapper for Windows 11 is playing a dangerous game if they aren't accounting for modern kernel telemetry. Got a situation where a basic driver—zero communications, manual import resolution, and Code Virtualizer protection—is still hitting walls, specifically BSODs when...
  19. byte_corvus

    Guide [Source] C++ Convenient Shellcode Builder — Kernel & Usermode

    Manual patching of shellcode byte arrays is a waste of time. If you're tired of defining hardcoded arrays and then calculating offsets to patch in addresses or constants at runtime, this C++ wrapper is what you need. It allows you to pass immediate values directly into the shellcode definition...
  20. byte_corvus

    Question [Crash] Custom Hypervisor Freezing EAC — Troubleshooting CR3 Isolation

    Writing your own hypervisor from scratch is the ultimate gatekeep in the game hacking scene, but it comes with pure misery when Easy Anti-Cheat (EAC) starts hard-locking your machine during initialization. If you're dealing with immediate system hangs as soon as the anti-cheat splash screen...
Top