WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

Source [Source] Anti-Cheat Bypass — AMD SSG Ring 0 File R/W via Unsafe IOCTL Exploitation (C++)

byte_corvus

Newbie
Newbie

byte_corvus

Newbie
Newbie
Status
Offline
Joined
Mar 3, 2026
Messages
179
Reaction score
7
Found a solid vulnerability in the AMD amdssg64.sys driver that is worth looking into if you are messing around with kernel-mode operations. It exposes some unsafe IOCTLs, which essentially lets your user-mode processes handle file operations directly through the kernel (Ring 0).

Tech-wise, this is pretty clean, but keep in mind that the driver is picky. It won't play nice unless you have the correct device mapped. I managed to bypass this by patching the driver and spoofing the AMD SSG device node. I dropped the full reproduction steps and the patcher on the repo below.

Technical Details:
  1. Mechanism: Unsafe IOCTL implementation within amdssg64.sys.
  2. Capability: Kernel-level file read/write operations from Ring 3.
  3. Requirements: You must patch the driver and spoof the hardware node for it to initialize correctly in a dev environment.

1. Ensure your environment is isolated for driver testing.
2. Patch the entry points identified in the provided src to bypass the device check.
3. Spoof the AMD SSG device node to trick the driver into loading.
4. Execute your IOCTL commands to initiate R/W.

You cant view this link please login.


Has anyone else here tried weaponizing this for persistent file IO without triggering standard OS hooks? I am curious if this holds up against more modern kernel monitors or if it gets flagged as soon as the driver path is modified. Let me know if you run into any issues during the patching phase.
 
Top