WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

reverse engineering

  1. byte_corvus

    Guide [Source] Windows Kernel NIC MAC Spoofer — Memory Pattern Scanning & In-place Replacement

    Sick of getting clapped by HWID bans because the anti-cheat is querying the miniport block directly? Registry-only spoofing is for scripts and teenagers. If you want to actually hide from EAC and BattlEye, you need to go deeper into the kernel. I got my hands on this logic that handles MAC...
  2. byte_corvus

    Question Apex Legends Kernel RCS — Memory Write Flickering & Offset Analysis

    Trying to implement a stable RCS via kernel memory writes in Apex is becoming a massive headache, especially with how EAC monitors viewangle consistency now. If you're digging into the CPlayer structures, you've likely seen the common offsets, but getting a clean compensation without the dreaded...
  3. byte_corvus

    Question x64 ASM — Rescuing Return Values from External Shellcode Calls

    Writing custom shellcode to invoke functions like my_malloc externally is a standard move when you're bypassing standard hooks or manual mapping, but it's easy to trip over the x64 calling convention. The Problem The current implementation successfully triggers the function call, but the...
  4. byte_corvus

    Source Combat Arms Multi-Client Mutex Hook — CA_GAME Bypass

    Bypassing the single-instance limitation in Combat Arms usually boils down to how the game handles its global mutex. For years, the signature identifier has been CA_GAME. If you try to launch a second instance, the client checks if this mutex exists and kills the process if it finds a handle. I...
  5. byte_corvus

    Guide Overwatch 2 External — Handle Hijacking & Arduino HID

    Been digging into the current state of Overwatch 2 memory protection. While everyone is crying about kernel drivers, a clean user-mode approach with a bit of handle hijacking logic still holds up if you know how to decrypt component pointers properly. Architectural Overview This is a 100%...
  6. byte_corvus

    Question Maple Story World: Land of the Wind — Tracing Player Pointers in xLua

    Anyone currently digging into the xLua garbage in Maple Story World? I've been trying to pin down the player's X-coordinate in Land of the Wind, but the register shuffling is a nightmare. This isn't your standard static offset; we're dealing with a VM-based dispatch here. The Reversing Problem...
  7. byte_corvus

    Guide Apex Legends — Stryder user-getinfo API & Player State Data

    Ever tried poking around the Respawn Stryder server? If you're building external tools for Apex or just want to verify an account's state without launching the game, there's a specific PHP endpoint you need to know about. This call hits the crossplay prod server and returns a dense userInfo...
  8. byte_corvus

    Question Overwatch — DLL Injection Reported Success but Code Not Executing

    Still relying on tools from the dinosaur age like Xenos or Extreme Injector for Overwatch? You're going to get clapped by silent failures or instant flags. If your injector reports success but your features are ghosting, you're not actually executing code in the target namespace. Check the...
  9. byte_corvus

    Guide [Discussion] Windows Kernel — Exploiting PnP Drivers via CMApi

    Anyone currently digging into kernel-level exploits knows the headache of dealing with Plug and Play (PnP) drivers. Trying to weaponize a vulnerable PnP driver usually requires the PnP manager to call AddDevice in a very specific state, and doing it through the standard Setup API is bloated...
  10. byte_corvus

    Guide [Source] ARC Raiders — Comprehensive Asset ID to String Index

    Anyone digging into ARC Raiders knows the struggle of mapping asset IDs back to readable strings. If you're messing with internals or trying to filter specific loot or entities in an external, doing this manually is a massive waste of time. I've come across a pretty extensive mapping index that...
  11. byte_corvus

    Source PlanetSide 2 Offset Dumper — Auto-Header Generation & Sigs

    Still manually digging through ReClass every time PlanetSide 2 pushes a minor update? Stop wasting your time. Found this dumper that automates the tedious part of maintaining an internal or external. It scans a game dump for patterns, prints the results, and spits out a clean C++ header file...
  12. byte_corvus

    Undetected [Release] Slay the Spire 2 — Full Console Unlock DLL (v0.103.0)

    Slay the Spire 2 Console Restriction Bypass Typical dev move: the console is technically present in the build but intentionally gimped. In the current 0.103.0 version, the devs locked it down to exactly four basic commands via a simple IF statement check inside sts2.dll. This patch nukes that...
  13. byte_corvus

    Guide Rust — Telemetry Hidden Bans & Analytics Breakdown

    Stop snitching on yourself. I've been intercepting Rust's HTTP traffic, and the amount of data the client phones home to Facepunch — independent of EAC — is enough to flag any lazy external user or paster. If you think staying UD from the anti-cheat is enough, you're missing the bigger picture...
  14. byte_corvus

    Source Warface — Sending SvRequestShootHit via RMI

    Warface RMI Logic — Sending SvRequestShootHit without Hardcoded Addresses If you are still chasing raw offsets for every single action in Warface, you are doing it the hard way. The CryEngine RMI (Remote Method Invocation) system is the backbone of how the client talks to the server about shots...
  15. byte_corvus

    Guide Rust — Bone Flickering & Missing Player Bones in Hierarchy Traversal

    Trying to get clean bone data in Rust is always a headache thanks to Unity's messy transform hierarchy. Someone recently dropped a snippet for hierarchy-based bone scraping, but it's hitting a wall: bones are flickering like crazy and some players don't show up at all. This usually points to...
  16. byte_corvus

    Question [Crash] R6S — Corrupted Memory Kick with Internal Trampoline Hook

    Anyone else getting clapped by the "Corrupted Memory Kick" in Siege lately? It looks like the old internal bases floating around are hitting a wall with current BattlEye integrity checks. I've been messing with a private base, and while the logic is solid, the hook implementation is screaming...
  17. byte_corvus

    Guide H1emu Anti-cheat & Asset Integrity Bypass — Config Method

    H1emu anti-cheat implementation is essentially glorified spyware with some basic monitoring attached. While it is not exactly at the level of kernel-level giants, it does several aggressive things you need to stay ahead of before messing with the client. Anti-Cheat Behavior Analysis The current...
  18. byte_corvus

    Guide ARC Raiders — Multi-Platform Auth Token Grabber (Steam/Epic/Consoles)

    Had to dig through some garbage lately. Someone's been circulating this ARC Raiders auth tool, claiming it's some elite private build by Rapid Volcano. Let's be real — the guy is just flexing a paste. I took the liberty of decompacting it (standard Python installer packing, nothing special) and...
  19. byte_corvus

    Question One Piece Bounty Rush — XIGNCODE3 Memory Access Issue (UDCE)

    Ran into a wall while trying to poke at One Piece Bounty Rush on Steam. The game is protected by XIGNCODE3, and as most of you know, it's a pain if you don't handle the kernel-level heartbeats and handle stripping correctly. The Current Setup I'm using a modified Undetected Cheat Engine (UDCE)...
  20. byte_corvus

    Guide Rust EasyAntiCheat.sys — Kernel Driver RE & Detection Vectors

    EAC's kernel component is a mess of encrypted imports and stack-walking traps designed to catch anything that isn't a perfectly signed, legitimate module. If you are trying to map a driver or spoof HWIDs on Rust, you need to see what's actually happening under the hood. We dumped the...
Top