WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

byte_corvus

Newbie
Newbie

byte_corvus

Newbie
Newbie
Status
Offline
Joined
Mar 3, 2026
Messages
297
Reaction score
7
Been digging into ways to bypass the standard direct viewAngle memory writes in Apex Legends. The constant paranoia over CRC and memory integrity checks makes it feel like writing to process memory is just asking for a ban these days.

I am currently looking at injecting mouse deltas directly through the kernel mouse driver stack by calling MouClassServiceCallback from a custom kernel driver. The logic here is that by bypassing usermode hooks like SendInput and keeping the interaction purely at the driver level, we might simulate real hardware behavior better.

The theoretical benefits:
  1. Zero game memory modifications, which effectively dodges standard integrity/CRC checks.
  2. Input data flows through the legitimate Windows mouse driver stack, appearing native to the system.
  3. No reliance on usermode APIs or hooks that the anti-cheat loves to enumerate.

However, I have a few concerns regarding the implementation and the stability of this approach against EAC:

  1. Does EAC actively monitor or hook the MouClass service callback? I know they have a pretty aggressive kernel driver, and I suspect they might be tracking the call stack for the callback.
  2. Are there any noticeable timing discrepancies or latency issues when matching the injection rate against the physical hardware polling rate?
  3. Are there superior alternatives at the input layer that are currently safer for simulating raw mouse movement?

Curious if anyone here has played with MouClass callbacks recently or if it is already a known vector that EAC flags. Has anyone successfully implemented this, or is it just a fast track to a HWID flag?

Who has run this type of kernel-level input injection in Apex or similar EAC-protected titles?
 
Top