definitional

What is a Kernel Cheat?

A kernel cheat is a video-game cheat that operates from Windows kernel mode (ring 0) rather than user mode (ring 3). The cheat is implemented as a signed or manually-mapped kernel driver that has direct access to all system memory, can bypass user-mode anti-cheat restrictions, and can intercept anti-cheat scans before they reach the cheat's data. Kernel cheats emerged as the response to kernel-level anti-cheats like Vanguard, EAC, and BattlEye, which themselves run in ring 0.

RawCheats Anti-Cheat Research Team — Anti-Cheat Research TeamUpdated May 12, 2026

A kernel cheat is the software-only equivalent of a DMA cheat — both seek to operate outside the reach of conventional anti-cheat scanning, but a kernel cheat does it through Windows itself rather than through a separate computer. Where DMA cheats use a second PC and a PCIe card, a kernel cheat runs as a Windows driver on the same machine and uses the kernel's privileges to hide from user-mode and even some kernel-mode anti-cheat scanning.

Why kernel cheats exist

The first generation of cheats ran entirely in user mode — DLLs injected into the game process, hooks installed in the game's API surface. Anti-cheats responded by adding kernel components (Easy Anti-Cheat's EasyAntiCheat_EOS.sys, BattlEye's BEDaisy.sys, Riot's vgk.sys) that ran with ring-0 privileges and could scan everything in user mode while remaining invisible to user-mode scanning. Cheat developers responded by going kernel-mode themselves so they would have the same privilege level as the anti-cheat and could hide their data from anti-cheat scanning the same way the anti-cheat hides its data from user-mode cheats.

How a kernel cheat works

A kernel cheat is implemented as a Windows kernel-mode driver (.sys file). It is loaded into the system via one of three paths:

  • Signed driver load — the cheat ships with a valid Microsoft-signed certificate (rare, expensive, and risky for the signer)
  • Manual mapping — the cheat exploits a vulnerability in an existing signed driver (a "BYOVD" — bring your own vulnerable driver — pattern) to load unsigned cheat code into the kernel
  • Test-signing mode — the user enables Windows test signing and loads a self-signed cheat driver; this trips Vanguard and several anti-cheats and is rarely used in 2026

Once loaded, the cheat driver can read and write the game's memory using kernel-mode APIs (MmCopyVirtualMemory, MmMapIoSpace), hide its own presence from anti-cheat scans by hooking the kernel-mode functions anti-cheats use to enumerate drivers and processes, and communicate with a user-mode component (the cheat menu) via secure IRP channels.

Common kernel-cheat capabilities

  • Read game memory without using user-mode ReadProcessMemory (which kernel anti-cheats monitor)
  • Hook the game process's threads from kernel mode to inject input
  • Hide the cheat driver from EnumDeviceDrivers, the loaded-module list, and PsActiveProcessList
  • Block anti-cheat scan IRPs targeting the cheat driver
  • Survive anti-cheat callbacks that try to terminate the cheat at boot

How anti-cheats detect kernel cheats

Kernel anti-cheats fight kernel cheats on the same playing field. The primary detection lanes are:

  • Driver signature scanning — Riot Vanguard, EAC, and BattlEye scan loaded drivers against vendor-curated blocklists. Known cheat driver signatures fail load instantly.
  • Vulnerable driver detection — Microsoft's vulnerable driver blocklist (managed by Vulnerable Driver Blocklist policy) is enforced by Vanguard and increasingly by EAC; loading a known BYOVD driver gets blocked at the OS level
  • HVCI / HyperGuard — Hypervisor-protected Code Integrity enforces that kernel code pages be signed and immutable, blocking many kernel cheat injection techniques
  • TPM 2.0 attestation — chip-level boot integrity reports any kernel modification; covered in Microsoft Remote Attestation

2026 detection landscape

Kernel cheats are still viable in 2026 but the bar has risen substantially. HVCI is enabled by default on most modern Windows 11 installs; Microsoft Pluton adds chip-level integrity for newer hardware; Vanguard's HyperGuard-style hypervisor approach is moving toward operating-system-level cheat protection. New cheat drivers require active BYOVD research to find vulnerable signed drivers that aren't yet on the blocklist. Many cheat vendors have abandoned the kernel-cheat lane entirely in favor of DMA hardware or behavioral-evasion strategies. RawCheats products use kernel components only where required for protection — the rest is user-mode with discipline. Pair with our HWID spoofer pillar for the underlying identity layer.

Sources

  1. HVCI / Device GuardMicrosoft Learn
  2. Vulnerable Driver BlocklistMicrosoft Learn
  3. Riot Competitive Integrity UpdateRiot Games

Related Questions

Internal vs External Cheats — Explained

Internal cheats run as code injected directly into the game process — typically a DLL loaded into the game's address space — and access game memory directly through pointer dereferences. External cheats run as a separate process (or on a separate machine) and access game memory via inter-process APIs like ReadProcessMemory or via DMA hardware. Internal cheats offer better performance and richer rendering options; external cheats offer better detection isolation. Modern paid cheats are mostly external with internal renderers for ESP.

What is a DMA Cheat?

A DMA (Direct Memory Access) cheat is a hardware-based video-game cheat that reads the gaming PC's RAM through a PCIe expansion card installed in a second computer. The two PCs are connected by a fiber optic link (typically USB-C to a Squirrel firmware FPGA card), and the second PC processes game memory to render ESP, drive aimbot input, and operate radar — entirely outside the gaming PC's operating system. DMA cheats avoid software anti-cheats because no cheat code runs on the gaming PC.

Why Do Anti-Cheats Need Kernel Access?

Anti-cheats need kernel access because cheat developers use kernel drivers. A user-mode anti-cheat cannot reliably detect a kernel-mode cheat — the kernel cheat operates at higher privilege than the user-mode AC and can hide from it. To level the playing field, modern AAA anti-cheats (EAC, BattlEye, Vanguard, NeacSafe, Ricochet) ship signed kernel drivers that run in ring 0 alongside Windows itself. This is the structural reason kernel anti-cheat became standard 2020-2026.

What Is a Kernel-Level Anti-Cheat?

A kernel-level anti-cheat is anti-cheat software that runs in ring 0 — the same privilege level as the Windows kernel — via a signed driver loaded into the OS. This gives it visibility into all processes, threads, drivers, kernel callbacks, and physical memory on the system. Examples: Easy Anti-Cheat (EAC), BattlEye (BEDaisy.sys), Riot Vanguard (vgk.sys), Activision Ricochet, NeacSafe, Zakynthos. Defense Matrix and VAC are NOT kernel-level — they run in user mode.

What Is Microsoft Remote Attestation?

Microsoft Remote Attestation is a Windows platform feature that lets a remote server cryptographically verify a client device''s identity, boot state, and configuration using the TPM 2.0 endorsement key (EK) certificate plus signed boot-log measurements. The TPM signs an attestation quote with a hardware-protected key, the server validates it against the TPM vendor''s CA, and the result is a non-spoofable answer to "is this machine in a trusted state?" Adopted by Call of Duty Black Ops 7 and increasingly by AAA anti-cheats in 2026.

Raw Fortnite
Live purchase·5m ago
dezz from US bought Raw Fortnite