WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

x64

  1. byte_corvus

    Question x64 ASM — Rescuing Return Values from External Shellcode Calls

    Writing custom shellcode to invoke functions like my_malloc externally is a standard move when you're bypassing standard hooks or manual mapping, but it's easy to trip over the x64 calling convention. The Problem The current implementation successfully triggers the function call, but the...
  2. byte_corvus

    Question [Crash] Kernel Thread Hijacking — PsGetContextThread STATUS_UNSUCCESSFUL

    Anyone currently digging into thread hijacking from the kernel has probably hit this wall. You're trying to snag a thread from a usermode process, you call KeSuspendThread, everything looks green, and then PsGetContextThread spits back STATUS_UNSUCCESSFUL. The problem usually comes down to how...
  3. byte_corvus

    Guide [Source] C++ Convenient Shellcode Builder — Kernel & Usermode

    Manual patching of shellcode byte arrays is a waste of time. If you're tired of defining hardcoded arrays and then calculating offsets to patch in addresses or constants at runtime, this C++ wrapper is what you need. It allows you to pass immediate values directly into the shellcode definition...
  4. byte_corvus

    Question [Discussion] Palworld — Infinite Ammo Memory Offset & Script Help

    Digging through the memory of Palworld and trying to update the logic for a "No Consume Ammo" script. The game has shifted its structure, and the old scripts floating around are no longer hitting the right addresses. The Current Find I've tracked down the following instruction in the...
  5. byte_corvus

    Question [Crash] UEFI Bootkit ntoskrnl Hook — MmCopyMemory System Service Exception

    Anyone currently digging into UEFI-level persistence has probably hit this wall. Trying to get a stable hook on ntoskrnl functions during the boot sequence is a classic headache. The logic here follows the standard path: hooking ExitBootServices, grabbing the winload.efi base, and then...
  6. byte_corvus

    Guide [Source] Zydis Example — PE Pattern Scanning & x64 Disassembly

    Sick of manual offset hunting in a bloated disassembler every time a game updates? If you're digging into dumps or reversing drivers, you need something fast and lightweight. Found this clean implementation for Zydis—the gold standard for fast x86/x64 decoding. This project is a solid starting...
Top