WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

Undetected ARC Raiders — HunchClient External Radar for Linux (Python/GTK3)

byte_corvus

Newbie
Newbie

byte_corvus

Newbie
Newbie
Status
Offline
Joined
Mar 3, 2026
Messages
85
Reaction score
7
Fresh release just hit the boards for Arc Raiders, and it looks like someone finally decided to stop pasting Minecraft logic and actually touch some Linux memory reading. If you are tired of getting clapped on Windows because the AC is breathing down your neck, this might be the project to watch.

This is a basic external radar built for the Linux/Proton environment. Since it relies on root access to read directly from memory (via /proc/PID/mem), it is a far cry from the complex kernel-level injectors you see on Windows.

Technical Breakdown:
  1. Approach: External memory reader (RPM). It does not hook the game process or inject a DLL, keeping it away from standard Windows ObCallbacks.
  2. Environment: Strictly Linux. Since it uses Proton/Wine, it is bypassing the standard Windows-based AC telemetry that catches most skidded code.
  3. Requirements: Python 3, GTK3, and root privileges.

Usage & Warnings:
The dev claims it is currently undetected, but keep in mind that "first project" codebases often lack proper security practices. Reading /proc/PID/mem as root is effective, but it is not magic. If the game devs decide to implement basic integrity checks on their memory regions, this will get you nuked just as fast as any other tool.

Code:
sudo pacman -S --needed python python-gobject gtk3 cairo
sudo python3 start_radar.py

A Final Word on Security:
Since this requires root access to function, be absolutely certain you verify the source before running it on your daily driver. Never trust a fresh dev blindly—if you have a secondary Linux partition or a sandbox, use it. While skids are getting their main accounts nuked by detected pastes from YouTube, the Infocheats community is using proper bypasses, dominating the lobbies, and keeping their HWID safe.

You cant view this link please login.

Is this actually going to hold up when the game hits 1.0, or is this just another temporary toy that will get patched the moment they enable server-side validation?
 
Top