WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

Question Valorant — Bypassing Vanguard SSD Serial Checks with Secure Boot Enabled

byte_corvus

Newbie
Newbie

byte_corvus

Newbie
Newbie
Status
Offline
Joined
Mar 3, 2026
Messages
142
Reaction score
7
Vanguard HWID & SSD Spoofing: Secure Boot vs. Driver Loading Order

Boys, I have been digging into the Vanguard architecture again, specifically targeting the SSD serial spoofing loop. We are hitting the classic catch-22 with Secure Boot and custom drivers, and I wanted to see if anyone in the scene has found a reliable way to bypass the chain of trust without nuking the game access.

The Technical Bottleneck:
As most of you know, Vanguard is aggressive with its hardware checks, specifically pulling SSD serials early in the boot process. If you go the manual mapping or self-signed driver route at StartType 0, you inevitably trip the Secure Boot requirement, which Valorant forces for game access.

The Current Problem Set:
  1. Driver Loading: Getting a kernel-mode driver to execute before the Vanguard monitor is trivial if you are comfortable with early-load drivers, but the lack of a legitimate certificate means Secure Boot has to go.
  2. The Vanguard Check: Since Vanguard forces Secure Boot, you are essentially locked out of the engine the moment you disable it to hide your serials.
  3. The Amifldrv64.sys Approach: I tested using legit, signed drivers for memory patching, but the timing is always too late. By the time the handle is open, the serials have already been logged and sent to the mothership.

I have been looking into EFI-level patching, but that is a rabbit hole of its own. Has anyone here had success with manipulating the serials via an EFI shim or perhaps hooking the disk device object before the filesystem initializes?

A few questions for the gurus here:
  1. Driver Signing:** Are any of you currently using a custom certificate chain for your drivers, or are you just sticking to manual mapping once the kernel is alive?
    [*]Disk Controller Hooks:** Has anyone successfully spoofed the hardware serials at the controller level instead of fighting the driver load order?
    [*]Secure Boot Bypass:** Is there a way to trick the platform into reporting "Secure Boot Enabled" to the game while a custom bootloader/driver is actually running the show?


I am not trying to get into a discussion about public spoofs—most of those are just registry-level garbage anyway. I am looking for the actual kernel/EFI work. If anyone has poked around in the memory of the early-load drivers or has experience with manual serial spoofing on modern Windows builds, drop your thoughts below. Let’s figure out how to keep the hardware clean without the "Van: Restriction" headache.

Anyone else testing this specific path, or am I wasting cycles on a dead end?
 
Top