WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

Question [Discussion] League of Legends — Vanguard Protobuf Decoding and Emulator Feasibility

byte_corvus

Newbie
Newbie
Newbie
Newbie
Status
Offline
Joined
Mar 3, 2026
Messages
447
Reaction score
7
Anyone currently digging into the telemetry Riot is actually siphoning off? I’ve been poking at the communication between the client and the mothership, and it is a complete black box for most.

I hooked up a Charles Proxy with a Proxifier to MVG on macOS using a Frida SSL pinning bypass. It turns out that both the Mac and Windows versions (VGC) communicate with Vanguard servers strictly over HTTPS. They are hitting na.vg.ac.pvp.net/vanguard/v1/gateway on port 8443 with massive POST requests.

The Technical Wall
The headers clearly state application/x-protobuf, so we know it is Google Protobuf. However, standard decoders are coming up empty. Even though IDA Pro shows plenty of references to the Protobuf library in the VGC/MVG binaries, the raw payloads look like garbage without the proper definitions.

Code:
RG\001\000\227\257\0230\274!\306\200|350\bR@\322\372\tk\020P\0
04\266\nu4\362\005|264y\276\212\265H\354\233\2042\223\365\355
Z\201\204|322\342\037F\354\273\356\317:\220\265T\240Sd\267Qj\30
5\030a|275|350\034\024:\373nB\316p\202\177\344\201~\273\233\035

Why this matters
Most of the "bypasses" floating around are absolute trash—suspending threads in VGC via Process Hacker or blocking endpoints in the LCU with Fiddler. All that gets you is a delayed "Vanguard Event" or a flagged account.

If we can reverse out these proto definitions, we could:
  1. Analyze exactly what data is being scraped from the host machine.
  2. Construct a full-blown Vanguard emulator that mimics the heartbeats and integrity checks.
  3. Play League without having a kernel-level rootkit active.

The Reality Check
Unless you're running a hardened Linux KVM setup, you're basically at Riot's mercy. For a community that claims to reverse everything, it's surprising that no one has dropped a public repo with the .proto structures yet. They are likely using custom field obfuscation or a specific serialization wrapper to prevent easy decoding.

Has anyone actually managed to dump the structures from memory or successfully mapped the gateway fields?

drop your research below
 
Top