Call of Duty WWII Cheat Table Trainer +17

Call of Duty WWII Cheat Table Trainer +17 1

Login to enable download
Hexui Undetected CSGO Cheats Sinkicheat PUBG Cheat
Call of Duty WWII Cheat Table Trainer +17

1595553222814.png


Features
  • God Mode
  • No Reload
  • Infinite Ammo
  • Infinite Grenades
  • Infinite Medi Kits
  • Player Size
  • Restore Palyer Size
  • Increase Player
  • Decrease Player Size
  • Teleporter
  • Save Position
  • Load Position
  • Undo teleport
  • Test/WIP
  • One Hit Kills
  • Infinite Health Vehicles
  • God Mode Hostages
  • Health
Cheat Scripts
Main Script:
[ENABLE]
aobscanmodule(_Teleport,CoD_SP.exe,F3 0F 10 80 90 00 00 00 F3 0F 10) // should be unique
aobscanmodule(_GodMode,CoD_SP.exe,8B 87 2C 02 00 00)
aobscanmodule(_NoReload,CoD_SP.exe,42 83 BC B6 A4 06 00 00 00)
aobscanmodule(_Ammo,CoD_SP.exe,8B 47 10 48 8B 5C 24 50 48 8B)
aobscanmodule(_MediKits,CoD_SP.exe,8B 48 04 03 4F 14)
aobscanmodule(_Grenades,CoD_SP.exe,45 8B AE A4 06 00 00)
alloc(newmemTP,$1000,CoD_SP.exe)
alloc(newmemGM,$1000,CoD_SP.exe)
alloc(newmemNR,$1000,CoD_SP.exe)
alloc(newmemUA,$1000,CoD_SP.exe)
alloc(newmemMK,$1000,CoD_SP.exe)
alloc(newmemUG,$1000,CoD_SP.exe)
alloc(_SavePosition,8)
alloc(_LoadPosition,8)
alloc(_UndoPosition,8)
alloc(_X_Coord,8)
alloc(_Y_Coord,8)
alloc(_Z_Coord,8)
alloc(_X_Coord_Undo,8)
alloc(_Y_Coord_Undo,8)
alloc(_Z_Coord_Undo,8)
alloc(_enableGodMode,8)
alloc(_enableNoReload,8)
alloc(_enableUnlAmmo,8)
alloc(_enableUnlMediKits,8)
alloc(_enableUnlGrenades,8)
registersymbol(_Teleport)
registersymbol(_SavePosition)
registersymbol(_LoadPosition)
registersymbol(_UndoPosition)
registersymbol(_X_Coord)
registersymbol(_Y_Coord)
registersymbol(_Z_Coord)
registersymbol(_X_Coord_Undo)
registersymbol(_Y_Coord_Undo)
registersymbol(_Z_Coord_Undo)
registersymbol(_GodMode)
registersymbol(_enableGodMode)
registersymbol(_NoReload)
registersymbol(_enableNoReload)
registersymbol(_enableUnlAmmo)
registersymbol(_Ammo)
registersymbol(_enableUnlMediKits)
registersymbol(_MediKits)
registersymbol(_enableUnlGrenades)
registersymbol(_Grenades)
label(codeTP)
label(returnTP)
label(Save)
label(Load)
label(Undo)
label(codeGM)
label(returnGM)
label(codeNR)
label(returnNR)
label(codeUA)
label(returnUA)
label(codeMK)
label(returnMK)
label(codeUG)
label(returnUG)



newmemTP:
cmp byte ptr [_SavePosition],1
je Save
cmp byte ptr [_LoadPosition],1
je Load
cmp byte ptr [_UndoPosition],1
je Undo
jmp codeTP

Save:
mov [_SavePosition],0
push rdx
mov rdx,[rax+00000090]
mov [_X_Coord],rdx
mov rdx,[rax+00000094]
mov [_Y_Coord],rdx
mov rdx,[rax+00000098]
mov [_Z_Coord],rdx
pop rdx
jmp codeTP

Load:
mov [_LoadPosition],0
push rbx
mov rbx,[rax+00000090]
mov [_X_Coord_Undo],rbx
mov rbx,[rax+00000094]
mov [_Y_Coord_Undo],rbx
mov rbx,[rax+00000098]
mov [_Z_Coord_Undo],rbx
pop rbx

push rdx
mov rdx,[_X_Coord]
mov [rax+00000090],rdx
mov rdx,[_Y_Coord]
mov [rax+00000094],rdx
mov rdx,[_Z_Coord]
mov [rax+00000098],rdx
pop rdx
jmp codeTP

Undo:
mov [_UndoPosition],0
push rbx
mov rbx,[_X_Coord_Undo]
mov [rax+00000090],rbx
mov rbx,[_Y_Coord_Undo]
mov [rax+00000094],rbx
mov rbx,[_Z_Coord_Undo]
mov [rax+00000098],rbx
pop rbx
jmp codeTP


codeTP:
  movss xmm0,[rax+00000090]
  jmp returnTP

newmemGM:
cmp [_enableGodMode],1
jne codeGM
mov [rdi+0000022C],#999

codeGM:
  mov eax,[rdi+0000022C]
  jmp returnGM

newmemNR:
cmp [_enableNoReload],1
jne codeNR
mov [rsi+000006A4],#999
codeNR:
  cmp dword ptr [rsi+r14*4+000006A4],00
  jmp returnNR

newmemUA:
cmp [_enableUnlAmmo],1
jne codeUA
mov [rdi+10],#999
codeUA:
  mov eax,[rdi+10]
  mov rbx,[rsp+50]
  jmp returnUA

newmemMK:
cmp byte ptr [_enableUnlMediKits],1
jne codeMK
mov [rax+04],#100
codeMK:
  mov ecx,[rax+04]
  add ecx,[rdi+14]
  jmp returnMK

newmemUG:
cmp dword ptr [_enableUnlGrenades],1
jne codeUG
mov [r14+000006A4],#99
codeUG:
  mov r13d,[r14+000006A4]
  jmp returnUG

_Teleport:
  jmp newmemTP
  nop
  nop
  nop
returnTP:

_GodMode:
  jmp newmemGM
  nop
returnGM:

_NoReload:
  jmp newmemNR
  nop
  nop
  nop
  nop
returnNR:

_Ammo:
  jmp newmemUA
  nop
  nop
  nop
returnUA:

_MediKits:
  jmp newmemMK
  nop
returnMK:

_Grenades:
  jmp newmemUG
  nop
  nop
returnUG:

_SavePosition:
dd 0
_LoadPosition:
dd 0
_UndoPosition:
dd 0
_X_Coord:
dq 0
_Y_Coord:
dq 0
_Z_Coord:
dq 0
_X_Coord_Undo:
dq 0
_Y_Coord_Undo:
dq 0
_Z_Coord_Undo:
dq 0
_enableGodMode:
dd 0
_enableNoReload:
dd 0
_enableUnlAmmo:
dd 0
_enableUnlMediKits:
dd 0
_enableUnlGrenades:
dd 0




[DISABLE]
//code from here till the end of the code will be used to disable the cheat
_Teleport:
  db F3 0F 10 80 90 00 00 00
_GodMode:
  db 8B 87 2C 02 00 00
_NoReload:
  db 42 83 BC B6 A4 06 00 00 00
_Ammo:
  db 8B 47 10 48 8B 5C 24 50
_MediKits:
  db 8B 48 04 03 4F 14
_Grenades:
  db 45 8B AE A4 06 00 00



unregistersymbol(_Teleport)
unregistersymbol(_SavePosition)
unregistersymbol(_LoadPosition)
unregistersymbol(_UndoPosition)
unregistersymbol(_X_Coord)
unregistersymbol(_Y_Coord)
unregistersymbol(_Z_Coord)
unregistersymbol(_X_Coord_Undo)
unregistersymbol(_Y_Coord_Undo)
unregistersymbol(_Z_Coord_Undo)
unregistersymbol(_GodMode)
unregistersymbol(_enableGodMode)
unregistersymbol(_NoReload)
unregistersymbol(_enableNoReload)
unregistersymbol(_Ammo)
unregistersymbol(_enableUnlAmmo)
unregistersymbol(_MediKits)
unregistersymbol(_enableUnlMediKits)
unregistersymbol(_Grenades)
unregistersymbol(_enableUnlGrenades)
dealloc(_SavePosition)
dealloc(_LoadPosition)
dealloc(_UndoPosition)
dealloc(_X_Coord)
dealloc(_Y_Coord)
dealloc(_Z_Coord)
dealloc(_X_Coord_Undo)
dealloc(_Y_Coord_Undo)
dealloc(_Z_Coord_Undo)
dealloc(newmemTP)
dealloc(newmemGM)
dealloc(_enableGodMode)
dealloc(_enableNoReload)
dealloc(newmemNR)
dealloc(newmemUA)
dealloc(_enableUnlAmmo)
dealloc(_enableUnlMediKits)
dealloc(newmemMK)
dealloc(newmemUG)
dealloc(_enableUnlGrenades)

{
// ORIGINAL CODE - INJECTION POINT: "CoD_SP.exe"+5D72C1

"CoD_SP.exe"+5D7294: 66 3B CA                 -  cmp cx,dx
"CoD_SP.exe"+5D7297: 74 28                    -  je CoD_SP.exe+5D72C1
"CoD_SP.exe"+5D7299: 48 0F BF C1              -  movsx rax,cx
"CoD_SP.exe"+5D729D: 48 8D 0D C4 54 CA 07     -  lea rcx,[CoD_SP.exe+827C768]
"CoD_SP.exe"+5D72A4: 48 C1 E0 0A              -  shl rax,0A
"CoD_SP.exe"+5D72A8: F3 0F 10 04 08           -  movss xmm0,[rax+rcx]
"CoD_SP.exe"+5D72AD: F3 0F 10 4C 08 04        -  movss xmm1,[rax+rcx+04]
"CoD_SP.exe"+5D72B3: F3 0F 11 44 24 20        -  movss [rsp+20],xmm0
"CoD_SP.exe"+5D72B9: F3 0F 10 44 08 08        -  movss xmm0,[rax+rcx+08]
"CoD_SP.exe"+5D72BF: EB 26                    -  jmp CoD_SP.exe+5D72E7
// ---------- INJECTING HERE ----------
"CoD_SP.exe"+5D72C1: F3 0F 10 80 90 00 00 00  -  movss xmm0,[rax+00000090]
// ---------- DONE INJECTING  ----------
"CoD_SP.exe"+5D72C9: F3 0F 10 88 94 00 00 00  -  movss xmm1,[rax+00000094]
"CoD_SP.exe"+5D72D1: F3 0F 11 44 24 20        -  movss [rsp+20],xmm0
"CoD_SP.exe"+5D72D7: F3 0F 10 80 98 00 00 00  -  movss xmm0,[rax+00000098]
"CoD_SP.exe"+5D72DF: F3 0F 58 80 C0 01 00 00  -  addss xmm0,[rax+000001C0]
"CoD_SP.exe"+5D72E7: F3 0F 11 44 24 28        -  movss [rsp+28],xmm0
"CoD_SP.exe"+5D72ED: BF 01 00 00 00           -  mov edi,00000001
"CoD_SP.exe"+5D72F2: F3 0F 11 4C 24 24        -  movss [rsp+24],xmm1
"CoD_SP.exe"+5D72F8: E8 F3 FD FF FF           -  call CoD_SP.exe+5D70F0
"CoD_SP.exe"+5D72FD: 8B F0                    -  mov esi,eax
"CoD_SP.exe"+5D72FF: 85 C0                    -  test eax,eax
}
Player Size:
[ENABLE]

aobscanmodule(_PlayerSize,CoD_SP.exe,F3 0F 10 83 C0 01 00 00 F3) // should be unique
aobscanmodule(_BypassPlayerSizeReset,CoD_SP.exe,F3 0F 11 83 C0 01 00 00 39)
alloc(newmemSize,$1000,CoD_SP.exe)

alloc(_ValueToAdd,8)
alloc(_IncPlayerSize,8)
alloc(_DecPlayerSize,8)
alloc(_ResPlayerSize,8)
registersymbol(_PlayerSize)
registersymbol(_IncPlayerSize)
registersymbol(_DecPlayerSize)
registersymbol(_ResPlayerSize)
registersymbol(_ValueToAdd)
registersymbol(_BypassPlayerSizeReset)
label(codeSize)
label(returnSize)
label(IncPlayer)
label(DecPlayer)
label(ResPlayer)

newmemSize:
cmp byte ptr [_IncPlayerSize],1
je IncPlayer
cmp byte ptr [_DecPlayerSize],1
je DecPlayer
cmp byte ptr [_ResPlayerSize],1
je ResPlayer
jmp codeSize

IncPlayer:
mov [_IncPlayerSize],0
fld [rbx+000001C0]
fld [_ValueToAdd]
faddp
fstp [rbx+000001C0]
jmp codeSize

DecPlayer:
mov [_DecPlayerSize],0
fld [rbx+000001C0]
fld [_ValueToAdd]
fsubp
fstp [rbx+000001C0]
jmp codeSize

ResPlayer:
mov [_ResPlayerSize],0
mov [rbx+000001C0],(float)60
jmp codeSize

codeSize:
  movss xmm0,[rbx+000001C0]
  jmp returnSize

_BypassPlayerSizeReset:
  db 90 90 90 90 90 90 90 90

_PlayerSize:
  jmp newmemSize
  nop
  nop
  nop
returnSize:



_ValueToAdd:
dq (float)50
_IncPlayerSize:
dd 0
_DecPlayerSize:
dd 0
_ResPlayerSize:
dd 0
[DISABLE]

_PlayerSize:
  db F3 0F 10 83 C0 01 00 00
_BypassPlayerSizeReset:
  db F3 0F 11 83 C0 01 00 00
unregistersymbol(_PlayerSize)
unregistersymbol(_IncPlayerSize)
unregistersymbol(_DecPlayerSize)
unregistersymbol(_ResPlayerSize)
unregistersymbol(_ValueToAdd)
unregistersymbol(_BypassPlayerSizeReset)
dealloc(newmemSize)
dealloc(_ValueToAdd)
dealloc(_IncPlayerSize)
dealloc(_DecPlayerSize)
dealloc(_ResPlayerSize)


{
// ORIGINAL CODE - INJECTION POINT: "CoD_SP.exe"+36182D

"CoD_SP.exe"+3617FC: 8B 83 90 00 00 00        -  mov eax,[rbx+00000090]
"CoD_SP.exe"+361802: 4C 8D 83 7C 03 00 00     -  lea r8,[rbx+0000037C]
"CoD_SP.exe"+361809: 89 07                    -  mov [rdi],eax
"CoD_SP.exe"+36180B: 48 8B CF                 -  mov rcx,rdi
"CoD_SP.exe"+36180E: 8B 83 94 00 00 00        -  mov eax,[rbx+00000094]
"CoD_SP.exe"+361814: 89 47 04                 -  mov [rdi+04],eax
"CoD_SP.exe"+361817: 8B 83 98 00 00 00        -  mov eax,[rbx+00000098]
"CoD_SP.exe"+36181D: 89 47 08                 -  mov [rdi+08],eax
"CoD_SP.exe"+361820: F3 0F 10 8B 90 01 00 00  -  movss xmm1,[rbx+00000190]
"CoD_SP.exe"+361828: E8 33 CF 1B 00           -  call CoD_SP.exe+51E760
// ---------- INJECTING HERE ----------
"CoD_SP.exe"+36182D: F3 0F 10 83 C0 01 00 00  -  movss xmm0,[rbx+000001C0]
// ---------- DONE INJECTING  ----------
"CoD_SP.exe"+361835: F3 0F 58 47 08           -  addss xmm0,[rdi+08]
"CoD_SP.exe"+36183A: F3 0F 11 47 08           -  movss [rdi+08],xmm0
"CoD_SP.exe"+36183F: F3 0F 58 83 D4 01 00 00  -  addss xmm0,[rbx+000001D4]
"CoD_SP.exe"+361847: F3 0F 11 47 08           -  movss [rdi+08],xmm0
"CoD_SP.exe"+36184C: E9 5C FF FF FF           -  jmp CoD_SP.exe+3617AD
"CoD_SP.exe"+361851: 81 FA 54 B5 43 D1        -  cmp edx,D143B554
"CoD_SP.exe"+361857: E9 34 68 14 00           -  jmp CoD_SP.exe+4A8090
"CoD_SP.exe"+36185C: 90                       -  nop
"CoD_SP.exe"+36185D: 3E 5D                    -  pop rbp
"CoD_SP.exe"+36185F: 62 48 83                 -  bound ecx,[rax-7D]
}
One Hit Kills WIP:
{ Game   : CoD_SP.exe
  Version:
  Date   : 2017-11-05
  Author : Schr4nzi

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(_OneHitKills,CoD_SP.exe,8B 90 2C 02 00 00) // should be unique
alloc(newmem,$1000,CoD_SP.exe)

label(code)
label(return)

newmem:
{
1f0 00015794 = enemys, 00015988 (HEX) = Crowlie
1f4 00015794 = enemys, 00015988 (HEX) = Crowlie
230 , 100 Enemys, 1000 = Crwlie
3e8, 774 = Enemys, 787 = Crrowlie
1174, 0 enemyies, 1124073472 = crowlie
1178, 0 enemyies 1109393408 = crowlie
117c, 0 enemyies, 1126694912 = crowlie
1a00, 0 enemies, 63266 = Crowlie
1e00, 0enemies, 63272 = crowlie
348, 0 = Zassman, Turner, Pierson, 1 nazi
970,0 = Zassman, Turner, Pierson,
20c, 22 = Pierson, Zassman, turner, 2 = nazis
}
//cmp dword ptr [rax+3e8],(int)787 //Crowlie
//je code
//cmp dword ptr [rax+3e8],(int)718 // Fischer
//je code
cmp dword ptr [rax+230],(int)1000 // Max Health // Buddys
je code
cmp dword ptr [rax+20c],(int)22 // Pierson, Zassman, Turner
je code
cmp dword ptr [rax+20c],(int)26 // Ressouce fighter
je code
//cmp dword ptr [rax+20c],(int)0 // RCrowlie again
//je code
mov [rax+0000022C],0
code:

  mov edx,[rax+0000022C]
  jmp return

_OneHitKills:
  jmp newmem
  nop
return:
registersymbol(_OneHitKills)

[DISABLE]

_OneHitKills:
  db 8B 90 2C 02 00 00

unregistersymbol(_OneHitKills)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "CoD_SP.exe"+310114

"CoD_SP.exe"+3100FD: 51                             -  push rcx
"CoD_SP.exe"+3100FE: EE                             -  out dx,al
"CoD_SP.exe"+3100FF: 6D                             -  insd
"CoD_SP.exe"+310100: 48 89 5C 24 08                 -  mov [rsp+08],rbx
"CoD_SP.exe"+310105: 57                             -  push rdi
"CoD_SP.exe"+310106: 48 83 EC 20                    -  sub rsp,20
"CoD_SP.exe"+31010A: 48 8B 01                       -  mov rax,[rcx]
"CoD_SP.exe"+31010D: 8B FA                          -  mov edi,edx
"CoD_SP.exe"+31010F: 33 DB                          -  xor ebx,ebx
"CoD_SP.exe"+310111: 4C 8B C9                       -  mov r9,rcx
// ---------- INJECTING HERE ----------
"CoD_SP.exe"+310114: 8B 90 2C 02 00 00              -  mov edx,[rax+0000022C]
// ---------- DONE INJECTING  ----------
"CoD_SP.exe"+31011A: 3B FA                          -  cmp edi,edx
"CoD_SP.exe"+31011C: 7C 4D                          -  jl CoD_SP.exe+31016B
"CoD_SP.exe"+31011E: 44 0F B6 91 78 26 00 00        -  movzx r10d,byte ptr [rcx+00002678]
"CoD_SP.exe"+310126: 41 F6 C2 02                    -  test r10l,02
"CoD_SP.exe"+31012A: 75 3F                          -  jne CoD_SP.exe+31016B
"CoD_SP.exe"+31012C: 38 99 C0 28 00 00              -  cmp [rcx+000028C0],bl
"CoD_SP.exe"+310132: 75 37                          -  jne CoD_SP.exe+31016B
"CoD_SP.exe"+310134: 8B CB                          -  mov ecx,ebx
"CoD_SP.exe"+310136: 66 66 0F 1F 84 00 00 00 00 00  -  nop [rax+rax+00000000]
"CoD_SP.exe"+310140: 8B C1                          -  mov eax,ecx
}
Author
l0wb1t
Downloads
0
Views
75
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from l0wb1t

Resource starter Similar resources Category Downloads Last update
L Call of Duty WWII Cheats - single player + zombies Cheat Engine Tables 0
Rake Call of Duty 4 Cheat Table Cheat Engine Tables 14
ChrisFayte Call of Cthulu Cheat Table Cheat Engine Tables 0
Community Mods League of Legends Accounts