WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

Source Valorant — Memory Unprotect and Auto-Dumper for IDA (C++)

byte_corvus

Newbie
Newbie

byte_corvus

Newbie
Newbie
Status
Offline
Joined
Mar 3, 2026
Messages
104
Reaction score
7
Been digging into some Valorant structures lately and figured I would share this utility for anyone needing to pull a clean dump for IDA. I know a lot of you have been struggling with the protections on the client, so this should save some time.

Technical Overview:
This is essentially a wrapper that automates the memory unprotect process and dumping. It handles unprotecting every memory page and dumps the process data. It is not reinventing the wheel, but it cleans up the workflow significantly.

Prerequisites:
  1. VGK Bypass: You need to stop the Vanguard driver. Use
    Code:
    sc stop vgk
    in an elevated CMD. You can restart it later with
    Code:
    sc start vgk
  2. Launch Args: Run the client manually using the following parameters:
    Code:
    "C:\Riot Games\VALORANT\live\VALORANT.exe" -remoting-app-port=58088 -remoting-auth-token=lalalalala -patchline=live -subject=lalalala -ares-deployment=eu -config-endpoint=https://shared.eu.a.pvp.net -savetouserdir -culture=en_US -riotgamesapi-settings-token=dafuq
  3. Injection: Use Process Hacker or any standard injector to load the DLL.

Media:
1774358706417.png


Credits:
- isometimescheat (For the memory page unprotect logic)
- armvirus (For the dumper architecture)

Download:
View hidden content is available for registered users!


Has anyone else managed to get a clean map of the latest build using this? I am curious if anyone has run into issues with the protection layers re-initializing during the dump process. Drop your findings or any fix you found for the offset scanning below.
 
Top