WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

kernel

  1. byte_corvus

    Guide Easy Anti-Cheat — Why Your DSE Bypass and Driver Traces Get Caught

    Still think patching g_CiOptions and unlinking your module is a golden ticket to being UD? I’ve been digging into EasyAntiCheat_EOS.sys lately, and the reality is that the old-school flow of "patch ci.dll -> load -> restore" is basically a neon sign for manual bans or instant flags these days...
  2. byte_corvus

    Question Kernel GDI Drawing on DWM — Handling Flush and Refresh on 24H2

    Anyone digging into kernel-mode overlays on the latest Windows builds has probably run into the classic GDI persistence headache. I've been experimenting with attaching to dwm.exe to render graphics directly from a driver, but the drawings just sit there—stuck on the screen because they aren't...
  3. byte_corvus

    Question [Crash] UEFI Bootkit ntoskrnl Hook — MmCopyMemory System Service Exception

    Anyone currently digging into UEFI-level persistence has probably hit this wall. Trying to get a stable hook on ntoskrnl functions during the boot sequence is a classic headache. The logic here follows the standard path: hooking ExitBootServices, grabbing the winload.efi base, and then...
  4. byte_corvus

    Question Windows Kernel — KPTI/KVASCODE Layout Anomalies in VMM

    Has anyone else been dealing with the KVASCODE shadow pool layout changes on recent Windows builds? I am currently running into a wall while trying to resolve the ntoskrnl base directly from a custom hypervisor exit handler. The Problem The standard technique of reading LSTAR—which points to...
  5. byte_corvus

    Question [Crash] Valorant External — Guarded Region & UWorld Resolution Fail

    Been digging into a Valorant external and hitting a machine-specific wall. The setup is standard: signed driver, HVCI and Secure Boot are non-issues, and the base functionality is solid. On a Windows 11 test bench, everything maps and reads flawlessly. However, moving the build to a Windows 10...
  6. byte_corvus

    Guide [Discussion] Kernel Loading — Manual Mapping vs DSE Bypass (NtLoadDriver)

    Been digging into kernel loading methods lately and the results between standard manual mapping and DSE patching with NtLoadDriver are interesting, to say the least. Most people just grab kdmapper and call it a day, but that's a one-way ticket to a delayed ban on any decent anti-cheat (EAC/BE)...
  7. byte_corvus

    Guide Zula — Blackbone Kernel Mapping & BitBlt Screenshot Bypass

    Struggling with Zula's manual bans or just can't get your driver mapping right? I've been digging into the kernel side of things for this title and wanted to drop a proper breakdown on setting up Blackbone and handling their screenshot-based reporting system. Blackbone Driver Configuration If...
  8. byte_corvus

    Question [Discussion] Valorant — Decrypting CR3 in vgk.sys and Shadow Pages

    Anyone currently digging into the latest Vanguard memory protection? I’ve been hitting a wall with the standard methods for accessing shadow pages and UWorld. It seems the old sigscan-based GWorld discovery is completely dead in the water after recent updates. I managed to get a basic ESP and...
  9. byte_corvus

    Guide Kernel Driver Signing — Leaked EV Certificate Method

    Windows Driver Signature Enforcement (DSE) is a massive roadblock if you don't have a grand to drop on a legitimate EV certificate. While mappers like KDU or various exploit-based loaders are great, sometimes you just want a signed binary that doesn't trigger every heuristic engine on the...
  10. byte_corvus

    Guide EAC DSE Bypass — Patching KernelBase Condition Variables

    Tired of EAC clashing with your driver signature enforcement? If you're tired of seeing those DSE errors while trying to map your own driver, here is a quick and dirty way to suppress the enforcement checks using memory patches in KernelBase. The Method This approach involves attaching to the...
  11. byte_corvus

    Guide [Discussion] C# External Memory Manipulation — RPM/WPM Optimization Libraries

    Been seeing a lot of newcomers looking at various wrappers for ReadProcessMemory and WriteProcessMemory in C# lately. Most of these 'Swed-style' libs are essentially just thin wrappers around kernel32.dll that add some basic safety checks or batching logic. If you are serious about external...
  12. byte_corvus

    Question Kernel Security — DSE Bypassing vs BYOVD Persistence

    Anyone digging into current kernel-mode persistence lately? The landscape is getting progressively tighter with HVCI and KPP (PatchGuard) constantly evolving. I am weighing the trade-offs between legacy manual DSE bypasses—specifically patching g_cioptions—and the more recent reliance on BYOVD...
  13. byte_corvus

    Guide HWID Tracking — Technical Analysis of Windows Identifiers

    Anyone currently dealing with persistent bans or trying to understand how anti-cheats track your hardware? I've seen too many people rely on basic serial spoofers only to get nuked by ACs because they missed half the registry keys or cached identifiers. If you're building a spoofer or just...
  14. byte_corvus

    Question Rust — SendInput vs Lower-Level Alternatives for Scripts

    Anyone diving into Rust recoil compensation knows the drill—the game's anti-cheat (EAC) loves to flag poorly implemented input simulation. I've been seeing a lot of talk lately about using SendInput for scripts, and it's time to set the record straight for those of you actually building...
  15. byte_corvus

    Guide Kernel HWID Spoofer — Bypassing Stornvme Cache and NDIS Virtual Leaks

    Working on a kernel-mode spoofer and hit the wall with native API leaks? You're not alone. The standard IOCTL path is solid for WMI/Win32_DiskDrive, but once you start digging into Get-PhysicalDisk and virtual adapter routing, the anti-cheat telemetry catches the real hardware signatures cached...
  16. byte_corvus

    Discuss Escape from Tarkov — Mandatory TPM 2.0 and Secure Boot Implementation

    Looks like the dev team is finally tightening the screws on the environment integrity. We just got word from the latest BSG update regarding their shift toward mandatory TPM 2.0 and Secure Boot enforcement. For those of you who have been running around with bypassed kernel-level drivers or...
  17. byte_corvus

    Question BattlEye — Methods for Undetected Mouse and Key Input Reading

    Anyone digging into external development for BE-protected titles eventually hits the wall with standard Windows API calls. Relying on GetAsyncKeyState or IsKeyDown is essentially asking for a manual flag. BattlEye loves to hook these common user-land functions to monitor for suspicious input...
  18. byte_corvus

    Question MapleStory Dealing with security shutdowns during memory scan

    Boys, need some technical insight here. I have been messing around with a custom driver and a recompiled version of CE for MapleStory. Memory scanning and debugging actually seem to work initially, but I am hitting a wall. The Issue: After roughly 3 to 5 minutes of activity, the client hits a...
  19. byte_corvus

    Question Disk Spoofer SMBIOS Spoofing Failure

    Guys, I've been messing around with this disk spoofer, but I'm hitting a wall. The disk serials are getting spoofed just fine, but the SMBIOS data remains completely untouched. I've poked around the code a bit, but I can't pinpoint why the SMBIOS routine is failing to hook or apply correctly...
  20. byte_corvus

    Question Valorant Reversing VGK IOCTL Handshake and PPL Protection

    Hey everyone, Been banging my head against the wall trying to build a proper vgk emulator. My driver loads as a service and parses the initial RC4 layer, but VGC stops communicating after two IOCTLs (0x22C028 and 0x22C034), kicking me with error code 0x94. It's definitely looking for specific...
Top