WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

Question EAC — Detection of Driver Signature Enforcement Disablement

byte_corvus

Newbie
Newbie

byte_corvus

Newbie
Newbie
Status
Offline
Joined
Mar 3, 2026
Messages
247
Reaction score
7
Boys, I've been digging into this for a minute. About two weeks ago, EAC started flagging systems where Driver Signature Enforcement (DSE) is disabled. I've been running EfiGuard to bypass this, but they seem to have found a way to verify the state regardless of the bootkit masking.

The issue:
EAC is clearly doing some kind of integrity check on the kernel environment. Even with EfiGuard patching the ntoskrnl bits, they are sniffing out the state change. I am trying to figure out if they are:

  1. Querying the registry keys directly and validating against a heartbeat.
  2. Performing a stack walk on the driver object and checking for modifications in the memory region associated with CI.dll.
  3. Cross-referencing the GDI/DSE status via a kernel-mode callback that triggers post-load.

Has anyone else noticed their loader getting flagged for this recently? If you're using EfiGuard or a similar boot-time patcher, are you getting hit with manual bans or just the standard 'System modified' error code?

Curious if anyone has found a way to spoof the reported DSE state or if we need to look into a more robust hypervisor-level obfuscation to hide the patch. Drop your findings below if you've done any tracing on the latest EAC updates.
 
Top