Death end re;Quest Cheat Table - God Mode, edit attributes

Death end re;Quest Cheat Table - God Mode, edit attributes 2020-07-22

Login to enable download
Hexui Undetected CSGO Cheats Sinkicheat PUBG Cheat
Death end re;Quest Cheat Table

1595432997493.png


Features

  • God Mode
  • Edit attributes
  • modify health
  • modify XP
  • modify SP
  • modify att
  • modify mat
  • modify defense
  • modify MDF
  • modify agility

Sample Scripts
Player address lookup:
{ Game   : Application.exe
  Version:
  Date   : 2019-05-19
  Author : ChrisFaytePC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(health_locate,Application.exe,0E 48 8B 00 48 8B 5C 24 30) // should be unique
alloc(newmem,$1000,"Application.exe"+4B838C)

label(code)
label(return)
label(player_health)
registersymbol(player_health)


newmem:
cmp [rax+3D0],0
je code
mov [player_health],rax

code:
  mov rax,[rax]
  mov rbx,[rsp+30]
  jmp return

  player_health:
  dq 0

health_locate+01:
  jmp newmem
  nop
  nop
  nop
return:
registersymbol(health_locate)

[DISABLE]

health_locate+01:
  db 48 8B 00 48 8B 5C 24 30

unregistersymbol(health_locate)
unregistersymbol(player_health)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "Application.exe"+4B838C

"Application.exe"+4B836E: E8 CD D4 01 00  -  call Application.exe+4D5840
"Application.exe"+4B8373: 33 C9           -  xor ecx,ecx
"Application.exe"+4B8375: 84 C0           -  test al,al
"Application.exe"+4B8377: 0F B6 C3        -  movzx eax,bl
"Application.exe"+4B837A: 0F 94 C1        -  sete cl
"Application.exe"+4B837D: 23 C8           -  and ecx,eax
"Application.exe"+4B837F: 0F AF CF        -  imul ecx,edi
"Application.exe"+4B8382: E8 D9 DC 00 00  -  call Application.exe+4C6060
"Application.exe"+4B8387: 48 85 C0        -  test rax,rax
"Application.exe"+4B838A: 74 0E           -  je Application.exe+4B839A
// ---------- INJECTING HERE ----------
"Application.exe"+4B838C: 48 8B 00        -  mov rax,[rax]
"Application.exe"+4B838F: 48 8B 5C 24 30  -  mov rbx,[rsp+30]
// ---------- DONE INJECTING  ----------
"Application.exe"+4B8394: 48 83 C4 20     -  add rsp,20
"Application.exe"+4B8398: 5F              -  pop rdi
"Application.exe"+4B8399: C3              -  ret
"Application.exe"+4B839A: 48 8B 5C 24 30  -  mov rbx,[rsp+30]
"Application.exe"+4B839F: 48 83 C4 20     -  add rsp,20
"Application.exe"+4B83A3: 5F              -  pop rdi
"Application.exe"+4B83A4: C3              -  ret
"Application.exe"+4B83A5: CC              -  int 3
"Application.exe"+4B83A6: CC              -  int 3
"Application.exe"+4B83A7: CC              -  int 3
}
god mode cheat:
{ Game   : Application.exe
  Version:
  Date   : 2019-05-19
  Author : ChrisFaytePC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(health_write,Application.exe,48 89 11 0F 95 C0 C3 CC) // should be unique
alloc(newmem,$1000,"Application.exe"+4B6E0B)

label(code)
label(return)

newmem:
cmp [rcx+EC],0
je code
mov rdx,r8

code:
  mov [rcx],rdx
  setne al
  jmp return

health_write:
  jmp newmem
  nop
return:
registersymbol(health_write)

[DISABLE]

health_write:
  db 48 89 11 0F 95 C0

unregistersymbol(health_write)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "Application.exe"+4B6E0B

"Application.exe"+4B6DF0: 48 85 D2                 -  test rdx,rdx
"Application.exe"+4B6DF3: 79 0C                    -  jns Application.exe+4B6E01
"Application.exe"+4B6DF5: 33 D2                    -  xor edx,edx
"Application.exe"+4B6DF7: 48 39 11                 -  cmp [rcx],rdx
"Application.exe"+4B6DFA: 48 89 11                 -  mov [rcx],rdx
"Application.exe"+4B6DFD: 0F 95 C0                 -  setne al
"Application.exe"+4B6E00: C3                       -  ret
"Application.exe"+4B6E01: 49 3B D0                 -  cmp rdx,r8
"Application.exe"+4B6E04: 49 0F 4F D0              -  cmovg rdx,r8
"Application.exe"+4B6E08: 48 39 11                 -  cmp [rcx],rdx
// ---------- INJECTING HERE ----------
"Application.exe"+4B6E0B: 48 89 11                 -  mov [rcx],rdx
"Application.exe"+4B6E0E: 0F 95 C0                 -  setne al
// ---------- DONE INJECTING  ----------
"Application.exe"+4B6E11: C3                       -  ret
"Application.exe"+4B6E12: CC                       -  int 3
"Application.exe"+4B6E13: CC                       -  int 3
"Application.exe"+4B6E14: CC                       -  int 3
"Application.exe"+4B6E15: CC                       -  int 3
"Application.exe"+4B6E16: CC                       -  int 3
"Application.exe"+4B6E17: CC                       -  int 3
"Application.exe"+4B6E18: CC                       -  int 3
"Application.exe"+4B6E19: CC                       -  int 3
"Application.exe"+4B6E1A: CC                       -  int 3
}
  • Love
Reactions: Kleon742
Author
ChrisFayte
Downloads
0
Views
30
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from ChrisFayte

Community Mods League of Legends Accounts