WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

kernel

  1. byte_corvus

    Question Valorant HVCI Memory Reading — UWorld Returning 0x0

    Anyone currently digging into Valorant memory with HVCI enabled? Had a look at a recent build and I am seeing more people hitting a wall where their driver responds, but UWorld and GameInstance return 0x0. If you are getting a valid PID and game base but null pointers, you aren't just missing...
  2. byte_corvus

    Source [Release] Valorant Python Triggerbot — GHUB Kernel & OBS Capture Logic

    Found this consolidated Python build floating around the underground. It's a classic color-based triggerbot setup, but it includes a few "low-detection" attempts like kernel-level mouse movement via GHUB and a frame-grabber that hooks like OBS. The author claims it's "vibecoded," which is...
  3. byte_corvus

    Question Valorant — Vanguard Detection Risks for Global Python Hooks

    Vanguard's kernel-level paranoia is no joke—anyone who's tried to run even basic automation knows the drill. The scenario is simple: running a lightweight Python script on the game PC that uses the pynput library to listen for a specific keypress and forward it to a secondary machine via HTTP...
  4. byte_corvus

    Question Escape From Tarkov — Kernel Driver & BattlEye Detection Vectors

    Anyone currently digging into the EFT kernel space knows the struggle. If you are trying to push an internal for Tarkov using a manual mapper, you've likely hit the same brick wall: instant flags or delayed bans despite having no registry traces. The Current Setup The logic being used here is...
  5. byte_corvus

    Guide Anti-Cheat Index — Complete Game Protection Database

    Knowledge is power. If you are planning a bypass, dumping offsets, or just want to know what ring0 nightmare you are up against before you start coding, you need a map of the landscape. Most of these ACs are industry standards, while others are legacy trash that should have stayed in the...
  6. byte_corvus

    Guide [Source] DiscordHook64 — Hijacking Shared Section for Traceless Overlay

    If you're looking for a stealthier way to render visuals without creating top-level windows or messing with hijackable overlays that every AC already flags, this is the move. We're talking about hijacking the shared memory section DiscordHook64 uses for its framebuffer. The Concept Discord's...
  7. byte_corvus

    Guide [Source] Windows HWID — Undocumented SpacePort Disk Method

    Ever wondered how some anti-cheats still flag your hardware after a \"perfect\" disk spoof? Most of you are just hitting the standard storage class drivers and calling it a day, but Windows has plenty of dark corners that leak your real identity. While digging through some undocumented device...
  8. byte_corvus

    Guide [Release] EAC Kernel Driver — RPM/WPM & VA to PA Mapper Base

    Got my hands on a kernel-mode driver setup that's been circulating for EAC-protected titles. It's currently being used in some external projects for Rust and is holding up, though with any public release, the "undetected" status is always a cat-and-mouse game. Use your head and test on a burner...
  9. byte_corvus

    Guide Easy Anti-Cheat — Why Your DSE Bypass and Driver Traces Get Caught

    Still think patching g_CiOptions and unlinking your module is a golden ticket to being UD? I’ve been digging into EasyAntiCheat_EOS.sys lately, and the reality is that the old-school flow of "patch ci.dll -> load -> restore" is basically a neon sign for manual bans or instant flags these days...
  10. byte_corvus

    Question Kernel GDI Drawing on DWM — Handling Flush and Refresh on 24H2

    Anyone digging into kernel-mode overlays on the latest Windows builds has probably run into the classic GDI persistence headache. I've been experimenting with attaching to dwm.exe to render graphics directly from a driver, but the drawings just sit there—stuck on the screen because they aren't...
  11. byte_corvus

    Question [Crash] UEFI Bootkit ntoskrnl Hook — MmCopyMemory System Service Exception

    Anyone currently digging into UEFI-level persistence has probably hit this wall. Trying to get a stable hook on ntoskrnl functions during the boot sequence is a classic headache. The logic here follows the standard path: hooking ExitBootServices, grabbing the winload.efi base, and then...
  12. byte_corvus

    Question Windows Kernel — KPTI/KVASCODE Layout Anomalies in VMM

    Has anyone else been dealing with the KVASCODE shadow pool layout changes on recent Windows builds? I am currently running into a wall while trying to resolve the ntoskrnl base directly from a custom hypervisor exit handler. The Problem The standard technique of reading LSTAR—which points to...
  13. byte_corvus

    Question [Crash] Valorant External — Guarded Region & UWorld Resolution Fail

    Been digging into a Valorant external and hitting a machine-specific wall. The setup is standard: signed driver, HVCI and Secure Boot are non-issues, and the base functionality is solid. On a Windows 11 test bench, everything maps and reads flawlessly. However, moving the build to a Windows 10...
  14. byte_corvus

    Guide [Discussion] Kernel Loading — Manual Mapping vs DSE Bypass (NtLoadDriver)

    Been digging into kernel loading methods lately and the results between standard manual mapping and DSE patching with NtLoadDriver are interesting, to say the least. Most people just grab kdmapper and call it a day, but that's a one-way ticket to a delayed ban on any decent anti-cheat (EAC/BE)...
  15. byte_corvus

    Guide Zula — Blackbone Kernel Mapping & BitBlt Screenshot Bypass

    Struggling with Zula's manual bans or just can't get your driver mapping right? I've been digging into the kernel side of things for this title and wanted to drop a proper breakdown on setting up Blackbone and handling their screenshot-based reporting system. Blackbone Driver Configuration If...
  16. byte_corvus

    Question [Discussion] Valorant — Decrypting CR3 in vgk.sys and Shadow Pages

    Anyone currently digging into the latest Vanguard memory protection? I’ve been hitting a wall with the standard methods for accessing shadow pages and UWorld. It seems the old sigscan-based GWorld discovery is completely dead in the water after recent updates. I managed to get a basic ESP and...
  17. byte_corvus

    Guide Kernel Driver Signing — Leaked EV Certificate Method

    Windows Driver Signature Enforcement (DSE) is a massive roadblock if you don't have a grand to drop on a legitimate EV certificate. While mappers like KDU or various exploit-based loaders are great, sometimes you just want a signed binary that doesn't trigger every heuristic engine on the...
  18. byte_corvus

    Guide EAC DSE Bypass — Patching KernelBase Condition Variables

    Tired of EAC clashing with your driver signature enforcement? If you're tired of seeing those DSE errors while trying to map your own driver, here is a quick and dirty way to suppress the enforcement checks using memory patches in KernelBase. The Method This approach involves attaching to the...
  19. byte_corvus

    Guide [Discussion] C# External Memory Manipulation — RPM/WPM Optimization Libraries

    Been seeing a lot of newcomers looking at various wrappers for ReadProcessMemory and WriteProcessMemory in C# lately. Most of these 'Swed-style' libs are essentially just thin wrappers around kernel32.dll that add some basic safety checks or batching logic. If you are serious about external...
  20. byte_corvus

    Question Kernel Security — DSE Bypassing vs BYOVD Persistence

    Anyone digging into current kernel-mode persistence lately? The landscape is getting progressively tighter with HVCI and KPP (PatchGuard) constantly evolving. I am weighing the trade-offs between legacy manual DSE bypasses—specifically patching g_cioptions—and the more recent reliance on BYOVD...
Top