OPEN SOURCE 0/70 VIRUSTOTAL FREE

HWID Spoofer That Actually Works

Built this after getting banned from various games for stupid reasons. Changes your HWID, MAC address, disk serials, and everything else anti-cheat uses to track you. Many open source modules on GitHub, but advanced evasion stays compiled because otherwise it gets detected instantly.

0/70 VirusTotal detections
15 open source modules
MITlicensed
~18MB
Tiny size
0/70
VirusTotal
100%
Offline
Win10+
Only

What This Thing Actually Does

Straight up: this spoofer changes your hardware identifiers so you can get past hardware bans. Whether you got banned unfairly or just want a clean slate, it handles the job. One time run in most cases, best to restart your PC after.

HWID Modification

Changes hardware ID at system level. Disk serials, motherboard UUIDs, SMBIOS data, everything. Anti-cheat won't recognize it's the same machine.

MAC Address Spoofing

Randomizes network adapter MAC addresses. Essential for games that log your network hardware on ban.

Component ID Spoofing

Modifies GPU device IDs, CPU identifiers, and other hardware fingerprints that modern anti-cheat checks.

Anti-Detection Methods

Proprietary evasion techniques to avoid anti-spoof detection. This is why advanced modules stay compiled and closed.

Game Compatibility

Tested on major titles with hardware ban systems. Works with EAC, BattlEye, Ricochet, and Vanguard.

Simple Execution

Run once, you're done. No complicated setup, no constant running in background. Just works.

Technical Implementation

For those who want to know how it actually works under the hood

Core Architecture

Written in Rust for memory safety and direct system access. No managed runtime overhead, no .NET bloat, just compiled machine code talking directly to Windows kernel.

Language Rust 1.75+ (unsafe bindings)
Target x86_64-pc-windows-msvc
Dependencies Static linking only
Binary Size ~1.8 MB (stripped)

System Requirements

Windows 10 and 11 only. Requires admin rights because we're literally modifying protected system identifiers at the driver level.

OS Windows 10 (1909+), Windows 11
Privileges Administrator (required)
Architecture 64-bit only
Runtime None (statically linked)

Low-Level Operations

Here's what actually happens when you run it:

01

WMI Injection

Modifies Windows Management Instrumentation objects that anti-cheat queries for hardware info. Uses COM automation to inject false data into Win32_DiskDrive, Win32_BaseBoard, Win32_BIOS classes.

02

Registry Manipulation

Direct HKEY_LOCAL_MACHINE writes to modify system identifiers. Targets HARDWARE\DESCRIPTION\System, SOFTWARE\Microsoft\Cryptography\MachineGuid, and device enumeration keys.

03

Driver Hooks

Kernel-mode driver installation for persistent disk serial modification. Intercepts IOCTL calls to storage drivers (SCSI, NVMe) and returns spoofed identifiers.

04

Network Stack Mods

NDIS layer manipulation for MAC address spoofing. Modifies NetworkAddress registry values and forces adapter reset through DevCon equivalent operations.

05

PCI Device Masking

Alters PCI device descriptors read by anti-cheat. Changes vendor/device IDs for GPU and other peripherals through SetupAPI and registry combo.

06

Evasion Layer

Proprietary anti-detection methods that stay compiled. Pattern randomization, timing analysis countermeasures, and signature obfuscation to avoid anti-spoof detection.

Download

Latest stable build, ready to use. One time run, done.

HWID Spoofer v1.4.2

STABLE

Released December 2025. Windows 10 and 11 supported. VirusTotal: 0/70 detections.

VirusTotal 0/70 detections
Open Source Core modules on GitHub
Usage One time run, done

SHA-256 Checksum

Verify file integrity after download

a3f7b9c2e1d8f4a6c9b2e5d1f8a3c6b9d2e5f1a4c7b0d3e6f9a2c5b8d1e4f7a0
Official release checksum

Real Talk About This Tool

No corporate speak, just straight facts

VirusTotal: 0/70 Detections (Clean)

Currently showing 0 out of 70 antivirus engines flagging the tool. This is unusual for system-level software because most HWID spoofers trigger heuristic analysis.

Why it's clean: Careful coding practices, proper API usage, no suspicious behavior patterns. The tool modifies registry and hardware IDs, but does so through legitimate Windows APIs without malware-like tactics.

However: Some aggressive AV software may still flag it due to the nature of what it does (modifying hardware IDs). This is expected for any tool that operates at system level.

  • Windows Defender: May flag as HackTool or PUA in some cases
  • What to do: Add exception if needed, or check VirusTotal yourself
  • Source code: Core modules available on GitHub for audit

Always verify downloads with the SHA-256 checksum provided. Never download from third-party sites.

Why Advanced Modules Stay Compiled

Core spoofing logic is on GitHub and you can audit it. But the advanced anti-detection stuff? That stays compiled and closed.

Reason: If I publish the evasion techniques, game devs patch them within days. Then the tool becomes useless. It's a constant cat and mouse game, and keeping methods private is how you stay ahead.

What's open: Core HWID spoofing, MAC randomization, registry mods, basic driver hooks

What's compiled: Pattern obfuscation, signature evasion, kernel-level tricks, timing analysis

I get that full open source would be ideal. But when you're fighting billion dollar anti-cheat teams, practical beats idealistic.

Why I Built This

Got hardware banned from various games over the years. Sometimes deserved, sometimes complete BS false positives. No appeal process, just permanent ban on hardware I paid for. That pissed me off enough to learn Windows internals and build this.

Now it's here, free, because I think you should be able to control your own hardware. Whether you got banned unfairly, want a clean slate, or just value your privacy, your PC should be yours to do what you want with.

Use it responsibly. Don't cheat and ruin games for others. But also don't let companies permanently brick your expensive hardware over automated ban systems.