Fairy Fencer F: Advent Dark Cheat Table

Fairy Fencer F: Advent Dark Cheat Table 2020-07-22

Login to enable download
Hexui Undetected CSGO Cheats Sinkicheat PUBG Cheat
Fairy Fencer F: Advent Dark Cheat Table

1595432178742.png


Features

  • God Mode
  • Experience points
  • attribute modifiers
  • gold cheat
  • modify strength, vitality, intelligence, agility

Sample Scripts
Get Health / Magic:
{ Game   : FairyFencerAD.exe
  Version:
  Date   : 2018-07-31
  Author : ChrisPC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(health2,FairyFencerAD.exe,8B 08 0B 48 04 74 0E) // should be unique
alloc(newmem,$1000)
alloc(newmema,2048)
label(returnhere)
label(originalcode)
label(exit)
label(attr)
registersymbol(attr)
label(code)
label(return)
label(stat)
registersymbol(stat)

newmem:
cmp [eax+10C],00 //110 0/
jne code
mov [stat],eax
mov [eax],#9999
mov [eax+10],#999

code:
  mov ecx,[eax]
  or ecx,[eax+04]
  jmp return

  stat:
  dd 0

health2:
  jmp newmem
return:
registersymbol(health2)

newmema:
originalcode:
mov [attr],esi
mov eax,[eax]
push edi
shr eax,02

exit:
jmp returnhere

attr:
dd 0

"FairyFencerAD.exe"+12C5D:
jmp newmema
nop
returnhere:

[DISABLE]

health2:
  db 8B 08 0B 48 04

"FairyFencerAD.exe"+12C5D:
mov eax,[eax]
push edi
shr eax,02
//Alt: db 8B 00 57 C1 E8 02

unregistersymbol(attr)
unregistersymbol(health2)
unregistersymbol(stat)
dealloc(newmem)
dealloc(newmema)

{
// ORIGINAL CODE - INJECTION POINT: "FairyFencerAD.exe"+18AF76

"FairyFencerAD.exe"+18AF55: B8 10 AD 20 02        -  mov eax,FairyFencerAD.exe+13DAD10
"FairyFencerAD.exe"+18AF5A: EB 0A                 -  jmp FairyFencerAD.exe+18AF66
"FairyFencerAD.exe"+18AF5C: B8 01 00 00 00        -  mov eax,00000001
"FairyFencerAD.exe"+18AF61: E8 CA F2 E9 FF        -  call FairyFencerAD.exe+2A230
"FairyFencerAD.exe"+18AF66: 89 46 34              -  mov [esi+34],eax
"FairyFencerAD.exe"+18AF69: 85 C0                 -  test eax,eax
"FairyFencerAD.exe"+18AF6B: 74 1E                 -  je FairyFencerAD.exe+18AF8B
"FairyFencerAD.exe"+18AF6D: E8 DE 36 00 00        -  call FairyFencerAD.exe+18E650
"FairyFencerAD.exe"+18AF72: 85 C0                 -  test eax,eax
"FairyFencerAD.exe"+18AF74: 74 07                 -  je FairyFencerAD.exe+18AF7D
// ---------- INJECTING HERE ----------
"FairyFencerAD.exe"+18AF76: 8B 08                 -  mov ecx,[eax]
"FairyFencerAD.exe"+18AF78: 0B 48 04              -  or ecx,[eax+04]
// ---------- DONE INJECTING  ----------
"FairyFencerAD.exe"+18AF7B: 74 0E                 -  je FairyFencerAD.exe+18AF8B
"FairyFencerAD.exe"+18AF7D: 8B 46 4C              -  mov eax,[esi+4C]
"FairyFencerAD.exe"+18AF80: 39 45 08              -  cmp [ebp+08],eax
"FairyFencerAD.exe"+18AF83: 7E 06                 -  jle FairyFencerAD.exe+18AF8B
"FairyFencerAD.exe"+18AF85: 89 45 08              -  mov [ebp+08],eax
"FairyFencerAD.exe"+18AF88: 89 75 FC              -  mov [ebp-04],esi
"FairyFencerAD.exe"+18AF8B: 8B 76 04              -  mov esi,[esi+04]
"FairyFencerAD.exe"+18AF8E: 85 F6                 -  test esi,esi
"FairyFencerAD.exe"+18AF90: 75 90                 -  jne FairyFencerAD.exe+18AF22
"FairyFencerAD.exe"+18AF92: 39 75 08              -  cmp [ebp+08],esi
}
Money Activate:
[ENABLE]

aobscanmodule(money1,FairyFencerAD.exe,8B 86 50 2E 00 00) // should be unique
alloc(newmem,$1000)

label(code)
label(return)
label(incr)
registersymbol(incr)

newmem:
cmp [incr],01
jne code
mov [incr],00
add [esi+00002E50],#500

code:
  mov eax,[esi+00002E50]
  jmp return

  incr:
  dd 0

money1:
  jmp newmem
  nop
return:
registersymbol(money1)

[DISABLE]

money1:
  db 8B 86 50 2E 00 00

unregistersymbol(money1)
unregistersymbol(incr)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "FairyFencerAD.exe"+12316B

"FairyFencerAD.exe"+123146: DC 0D C0 20 1E 02  -  fmul qword ptr [FairyFencerAD.exe+13B20C0]
"FairyFencerAD.exe"+12314C: DE E9              -  fsubp st(1),st(0)
"FairyFencerAD.exe"+12314E: D9 9D F8 F7 FF FF  -  fstp dword ptr [ebp-00000808]
"FairyFencerAD.exe"+123154: EB 02              -  jmp FairyFencerAD.exe+123158
"FairyFencerAD.exe"+123156: DD D8              -  fstp st(0)
"FairyFencerAD.exe"+123158: 68 00 08 00 00     -  push 00000800
"FairyFencerAD.exe"+12315D: 8D 95 FC F7 FF FF  -  lea edx,[ebp-00000804]
"FairyFencerAD.exe"+123163: 6A 00              -  push 00
"FairyFencerAD.exe"+123165: 52                 -  push edx
"FairyFencerAD.exe"+123166: E8 8B 87 19 00     -  call FairyFencerAD.exe+2BB8F6
// ---------- INJECTING HERE ----------
"FairyFencerAD.exe"+12316B: 8B 86 50 2E 00 00  -  mov eax,[esi+00002E50]
// ---------- DONE INJECTING  ----------
"FairyFencerAD.exe"+123171: 50                 -  push eax
"FairyFencerAD.exe"+123172: 68 48 2F 1D 02     -  push FairyFencerAD.exe+13A2F48
"FairyFencerAD.exe"+123177: 8D 8D FC F7 FF FF  -  lea ecx,[ebp-00000804]
"FairyFencerAD.exe"+12317D: 68 00 08 00 00     -  push 00000800
"FairyFencerAD.exe"+123182: 51                 -  push ecx
"FairyFencerAD.exe"+123183: FF 15 CC 23 1D 01  -  call dword ptr [FairyFencerAD.exe+3A23CC]
"FairyFencerAD.exe"+123189: 8B 47 14           -  mov eax,[edi+14]
"FairyFencerAD.exe"+12318C: 83 C4 1C           -  add esp,1C
"FairyFencerAD.exe"+12318F: 85 C0              -  test eax,eax
"FairyFencerAD.exe"+123191: 74 22              -  je FairyFencerAD.exe+1231B5
}
  • Love
Reactions: Kleon742
Author
ChrisFayte
Downloads
1
Views
55
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from ChrisFayte

Community Mods