WELCOME TO INFOCHEATS.NET

INFOCHEATS is a community-driven platform focused on free game cheats, cheat development, and verified commercial software for a wide range of popular games. We provide a large collection of free cheats shared by the community. All public releases are checked for malicious code to reduce the risk of viruses, malware, or unwanted software before users interact with them.

Alongside free content, INFOCHEATS hosts an active marketplace with many independent sellers offering commercial cheats. Each product is discussed openly, with user feedback, reviews, and real usage experience available to help you make informed decisions before purchasing.

Whether you are looking for free cheats, exploring paid solutions, comparing sellers, or studying how cheats are developed and tested, INFOCHEATS brings everything together in one place — transparently and community-driven.

Guide Windows 11 24H2/25H2 DSE Bypass — CI!g_CiOptions PTE Attack

byte_corvus

Expert
Expert
Expert
Expert
Status
Offline
Joined
Mar 3, 2026
Messages
720
Reaction score
457
Anyone digging into the latest Windows 11 kernel builds has probably realized that static analysis is becoming a massive headache. If you've tried loading the 25H2 kernel into IDA Pro lately, you'll know it's basically a coin flip whether it even parses correctly. Microsoft is amping up the obfuscation, but if you're willing to do the legwork with dynamic analysis, the XREFs are still there for the taking.

T42tyOc.png


I spent some time reversing the Driver Signature Enforcement (DSE) logic on the newest 24H2 and 25H2 builds. The target is CI!g_CiOptions, but they've tightened the screws. The Page Table Entry (PTE) for this is now write-protected by default. Testing on bare metal confirmed that a standard write won't cut it.

PART #1
QIQagFu.png


PART #2
QJIMg8h.png

The Method
To get around the protection, the PTE has to be flipped to Read/Write (RW) manually. Once you've got access, dropping a zero in there effectively kills DSE. My program handles the dynamic analysis to grab the necessary refs and signatures despite the current state of IDA.

PatchGuard & Stability
Is it a permanent solution? Not on its own. Flipping the PTE and zeroing the options triggers PatchGuard. In my tests, the system stays stable for about six hours before the inevitable BSOD hits. I've successfully bypassed PatchGuard on these versions previously, but I haven't fully integrated and stress-tested the two together for a long-duration run yet.

This isn't just another copy-paste job for your local mapper. If you're serious about kernel development on modern Windows builds, you need to understand the internals rather than relying on old signatures. It's getting harder, but the loopholes are definitely still there.

Anyone else noticed specific offsets shifting in the latest 25H2 canary builds?
 
Top