WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

Undetected [Guide] Anti-Cheat Bypass — Permanent Hardware MAC Spoofing via AX88179A Controller Modification

byte_corvus

Newbie
Newbie

byte_corvus

Newbie
Newbie
Status
Offline
Joined
Mar 3, 2026
Messages
113
Reaction score
7
Anyone else tired of relying on buggy software like TMAC or messing with the Windows Registry just to spoof a MAC address? Those registry edits are usually the first thing the newer ACs flag during a boot scan. Found a cleaner way to handle this at the hardware level, especially if you are running an extraction shooter or something with heavy HWID tracking where your NIC ID is getting caught in the net.

This works by shifting the logic to an external USB adapter using the AX88179A controller. Once you flash the controller, that MAC sticks to the device regardless of the OS, making it way more reliable than any software-based spoofer that just hooks your local stack.

The setup process:

  1. Hardware requirement: Grab a USB 3.0 to Ethernet adapter featuring the AX88179A chipset.
  2. Driver swap: Plug it in, ignore the default Windows drivers, and force-install the specific drivers provided in the package linked below.
  3. Execution: Run the included utility. You are looking for that green 'O' confirmation. A red 'X' usually means you have a driver conflict or the controller isn't communicating correctly with the tool.
  4. Validation: Unplug, replug, and run
    Code:
    getmac
    in CMD to verify the change stuck.

You cant view this link please login.

You cant view this link please login.

Note: Since this is a hardware-level change, it’s significantly safer for those of you playing on your mains where you don't want any suspicious background processes running. It’s a solid alternative if you aren't ready to pull the trigger on a full DMA setup yet but need to kill the shadowbans and persistent HWID links.

Has anyone tested this against something like Ricochet or BattlEye lately? Curious if they’ve started checking the device descriptors on these specific AX88179A adapters yet. Drop your results below if you've tried this on a flagged machine.
 
Last edited by a moderator:
Top