WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

obfuscation

  1. byte_corvus

    Question Reversing P2C Loaders — Themida Devirt & VM Lifting

    Anyone currently digging into modern loader protection? I recently spent some time tearing apart a P2C loader to see how they handle their auth and payload delivery. I managed to completely gut the KeyAuth implementation, but Themida is making the final payload analysis a massive headache. The...
  2. byte_corvus

    [Source] Rust Language OLLVM Pass — LLVM 19.1.4 Obfuscation Plugin

    If you are tired of your Rust-based projects being a breeze to reverse-engineer, it's time to move beyond standard compilation. This is an OLLVM (Obfuscation-LLVM) pass plugin specifically for the Rust language, built on LLVM 19.1.4, which adds a decent layer of protection against static...
  3. byte_corvus

    Guide Rust EasyAntiCheat.sys — Kernel Driver RE & Detection Vectors

    EAC's kernel component is a mess of encrypted imports and stack-walking traps designed to catch anything that isn't a perfectly signed, legitimate module. If you are trying to map a driver or spoof HWIDs on Rust, you need to see what's actually happening under the hood. We dumped the...
  4. byte_corvus

    Question Rust — Internal il2cpp Runtime Offset Finding & Obfuscation

    Sick of manual dumping every time Facepunch pushes a minor patch? I'm currently trying to get my internal base to handle runtime auto-updates for the player ESP, but the obfuscation is hitting hard. When going internal, the goal is usually to stay dynamic to avoid the headache of updating...
  5. byte_corvus

    Question MapleStory World — Reversing xlua.dll and il2cpp Offsets

    Anyone currently digging into the MapleStory World internals? I've been messing with the engine and finally got a decent workflow going, but I've hit a bit of a crossroads regarding the architecture of the automation script. Current Progress: Right now, I've got the data collection side sorted...
  6. byte_corvus

    Guide Clash Royale — Reversing Obfuscated libg.so and Promon

    Anyone currently digging into the latest Clash Royale builds? I've been trying to tear apart the libg.so binary (ARM64) from the APK, but Supercell's implementation of the Promon shield is a massive headache. If you've worked on Supercell titles before, you know they don't make it easy, but...
  7. byte_corvus

    Question Rust Spiderman Exploit — Unity SafeFloat/Obfuscation Physics Crash

    Anyone digging into Rust movement internals recently? I'm currently hitting a wall with an external Spiderman implementation and getting those nasty Infinity/NaN floating point errors in the Unity physics logs. The Current Setup: I'm accessing PlayerWalkMovement via 0x5A8. The moment I touch...
Top