WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

Guide FiveM MatrixSpoofer — Open Source HWID Spoofer & Syscall Hooking Base

byte_corvus

Newbie
Newbie
Newbie
Newbie
Status
Offline
Joined
Mar 3, 2026
Messages
706
Reaction score
457
FiveM is still aggressively hunting for identifiers, but it's nothing a clean driver-level block can't handle. This project, MatrixSpoofer, is an open-source base designed to bypass the standard HWID ban flags by nuking the paths FiveM uses to fingerprint your machine. It's essentially a playground for anyone looking into syscall hooking and identifier masking.

You cant view this link please login.


The FiveM Fingerprint Strategy
FiveM traditionally pulls data from three main vectors to cage your hardware:

  1. NVIDIA Interfaces: They scan the kernel driver (nvlddmkm.sys) and user-mode libs (nvapi64.dll, nvml.dll). They are looking for that specific UUID you see in nvidia-smi. If you're running AMD, this part isn't your problem.
  2. clipc.dll (Licensing Platform): Located in System32, this is Microsoft's Client Licensing Platform Client. It mixes multiple hardware IDs into a unique device serial. MatrixSpoofer just blocks the handle entirely—no data, no ban.
  3. NtQueryEaFile: They query Extended Attributes via NTFS metadata to grab disk serials and volume IDs. This is where the real work happens.

Implementation: Spoofing Extended Attributes
Instead of just blocking NtQueryEaFile, the project walks the FILE_FULL_EA_INFORMATION linked list and randomizes the buffer using an xorshift-based pseudorandom generator. This ensures that every time they try to read your disk metadata, they get a handful of garbage bytes instead of your real traces.

Code:
void FakeEaBuffer(const PVOID buffer, const ULONG length, const ULONG64 seed)
{
    auto entry = static_cast<PFILE_FULL_EA_INFORMATION>(buffer);
    ULONG offset = 0;
    ULONG64 entrySeed = seed;
    while (offset < length)
    {
        if (entry->EaValueLength > 0)
        {
            const PCHAR valuePtr = entry->EaName + entry->EaNameLength + 1;
            for (USHORT i = 0; i < entry->EaValueLength; i++)
            {
                entrySeed ^= (entrySeed << 13);
                entrySeed ^= (entrySeed >> 7);
                entrySeed ^= (entrySeed << 17);
                valuePtr[i] = static_cast<UCHAR>(entrySeed & 0xFF);
            }
        }
        if (entry->NextEntryOffset == 0)
            break;
        offset += entry->NextEntryOffset;
        entry = reinterpret_cast<PFILE_FULL_EA_INFORMATION>(
            static_cast<PUCHAR>(buffer) + offset);
    }
}

  1. The seed for the spoofing logic is derived from a hash of the file handle, providing consistent fake data for specific files.
  2. The driver base uses syscall hooking to intercept calls. Check the headers if you plan on modifying the hook logic.
  3. Ensure your build environment handles kernel-mode projects correctly before trying to compile the driver.
  4. Noad Link:
    You cant view this link please login.

This is a solid base, but if you're lazy, don't just paste it and expect a permanent bypass. Use it to learn how they're tracking you and expand on the masking.

Anyone tested this on the latest build yet?
 
Top