WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

windows

  1. byte_corvus

    Guide [Discussion] Windows Kernel — Exploiting PnP Drivers via CMApi

    Anyone currently digging into kernel-level exploits knows the headache of dealing with Plug and Play (PnP) drivers. Trying to weaponize a vulnerable PnP driver usually requires the PnP manager to call AddDevice in a very specific state, and doing it through the standard Setup API is bloated...
  2. byte_corvus

    Question [Crash] Kernel Thread Hijacking — PsGetContextThread STATUS_UNSUCCESSFUL

    Anyone currently digging into thread hijacking from the kernel has probably hit this wall. You're trying to snag a thread from a usermode process, you call KeSuspendThread, everything looks green, and then PsGetContextThread spits back STATUS_UNSUCCESSFUL. The problem usually comes down to how...
  3. byte_corvus

    Guide [Source] Windows HWID — Undocumented SpacePort Disk Method

    Ever wondered how some anti-cheats still flag your hardware after a \"perfect\" disk spoof? Most of you are just hitting the standard storage class drivers and calling it a day, but Windows has plenty of dark corners that leak your real identity. While digging through some undocumented device...
  4. byte_corvus

    Question Windows Kernel — KPTI/KVASCODE Layout Anomalies in VMM

    Has anyone else been dealing with the KVASCODE shadow pool layout changes on recent Windows builds? I am currently running into a wall while trying to resolve the ntoskrnl base directly from a custom hypervisor exit handler. The Problem The standard technique of reading LSTAR—which points to...
  5. byte_corvus

    Guide Kernel Driver Signing — Leaked EV Certificate Method

    Windows Driver Signature Enforcement (DSE) is a massive roadblock if you don't have a grand to drop on a legitimate EV certificate. While mappers like KDU or various exploit-based loaders are great, sometimes you just want a signed binary that doesn't trigger every heuristic engine on the...
  6. byte_corvus

    Question Kernel Security — DSE Bypassing vs BYOVD Persistence

    Anyone digging into current kernel-mode persistence lately? The landscape is getting progressively tighter with HVCI and KPP (PatchGuard) constantly evolving. I am weighing the trade-offs between legacy manual DSE bypasses—specifically patching g_cioptions—and the more recent reliance on BYOVD...
  7. byte_corvus

    Source Simple Manual Map Injector — Handle and Thread Hijacking Logic

    Spent some time digging into this manual map injector today. It uses a fairly straightforward approach to handle and thread hijacking, which is a decent starting point if you are looking to understand how to bypass basic kernel callbacks without relying on the standard CreateRemoteThread or...
  8. byte_corvus

    Guide HWID Tracking — Technical Analysis of Windows Identifiers

    Anyone currently dealing with persistent bans or trying to understand how anti-cheats track your hardware? I've seen too many people rely on basic serial spoofers only to get nuked by ACs because they missed half the registry keys or cached identifiers. If you're building a spoofer or just...
  9. byte_corvus

    Guide Kernel HWID Spoofer — Bypassing Stornvme Cache and NDIS Virtual Leaks

    Working on a kernel-mode spoofer and hit the wall with native API leaks? You're not alone. The standard IOCTL path is solid for WMI/Win32_DiskDrive, but once you start digging into Get-PhysicalDisk and virtual adapter routing, the anti-cheat telemetry catches the real hardware signatures cached...
  10. byte_corvus

    Source Vanguard Restrictions Messenger Bypass & Logic

    Anyone else looking into this specific module? Had to dump this manually again to see how the restrictions messenger actually handles things. Found this build (v.1.17.18-11) floating around and decided to break down the logic behind the restrictions messenger. You can bypass it relatively...
  11. GetGud

    Sell BGBot - Shadowlands PvP Logic Bot

    BGBot - Shadowlands PVP Bot Windows/MacOS Supported INCLUDES Afk Random Battlegrounds Farming One of a kind with advanced movement and navigation system Fully auto will farm honor and conquest while you sleep Working close too professional rotations developer for the absolute best experience...
Top