Ghost of a Tale Cheat Table

Ghost of a Tale Cheat Table 2020-07-23

Hexui Undetected CSGO Cheats PUBG Accounts
The Ghost of a Tale is a stealth game with amazing dynamic graphics. It's a power packed independent action video game. This 2019 role playing video game is developed by SeithCG. Amazingly this game is a one man project by Lionel "Seith" Gallat.

The game setting is in a dark fantasy world of the Middle Ages. Players are given control of the leading character named Tilo, who is a small mouse minstrel. The game begins as the War of the Green Flame destroys the land and burns down homes in once peaceful kingdoms. The mysterious ball of emerald fire gradually swallows more and more land and lives. And then, the lives it takes adds into the undead army.

At last, it is up to the mouse kingdom to stand up against the evil themselves. The brave creatures face the fire and make their way through immense hardships, and unveil many mysteries of the past regarding the origin of the green fire.

This Ghost of a Tale trainer has all the cheats you have been searching for. And yes, this hack actually works for this game. Ghost of a Tale is a very exciting game, but ever imagined making it even more exciting, like what if we take your excitement level all the way up? These cheat codes will help you in all the difficult parts of the gameplay too. Our Ghost of a Tale cheat table has a hack to enable ‘God Mode’ for the player, using this very hack you can become unstoppable in the game and make your victory inevitable. Plus, you can get permanent stealth and infinite stamina whenever you need it. The cheat table also features a money hack! And a very convenient infinite candle light too. Simply download our Ghost of a Tale hack and take advantage of them all.

1595537530223.png


Cheat Trainer Features
  • God mode
  • infinite stamina
  • permanent stealth
  • infinite candle light
  • money hack
Cheat Engine Scripts
infinite health cheat:
{ Game   : GoaT.exe
  Version:
  Date   : 2018-03-16
  Author : ChrisPC

  This script does blah blah blah
}

[ENABLE]

aobscan(health1,20 8B 05 * * * * D9 40 30 D9 9F F0 00 00 00)
alloc(newmem,$100)

label(code)
label(return)
label(health_base)
registersymbol(health_base)

newmem:
push rbx
mov ebx,[eax+28]
mov [eax+30],ebx
pop rbx

code:
mov [health_base],rax
  fld dword ptr [eax+30]
  fstp dword ptr [edi+000000F0]
  jmp return

health_base:
dd 0

health1+07:
  jmp newmem
  nop
  nop
  nop
  nop
return:
registersymbol(health1)

[DISABLE]

health1+07:
  db D9 40 30 D9 9F F0 00 00 00

unregistersymbol(health1)
unregistersymbol(health_base)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: 74CF3E1F

""+74CF3DF2: 8B 85 50 FF FF FF  -  mov eax,[ebp-000000B0]
""+74CF3DF8: 89 44 24 04        -  mov [esp+04],eax
""+74CF3DFC: 8B 85 54 FF FF FF  -  mov eax,[ebp-000000AC]
""+74CF3E02: 89 44 24 08        -  mov [esp+08],eax
""+74CF3E06: 8B 85 58 FF FF FF  -  mov eax,[ebp-000000A8]
""+74CF3E0C: 89 44 24 0C        -  mov [esp+0C],eax
""+74CF3E10: 57                 -  push edi
""+74CF3E11: E8 2A 09 00 00     -  call 74CF4740
""+74CF3E16: 83 C4 20           -  add esp,20
""+74CF3E19: 8B 05 C8 AC CD 0F  -  mov eax,[0FCDACC8]
// ---------- INJECTING HERE ----------
""+74CF3E1F: D9 40 30           -  fld dword ptr [eax+30]
""+74CF3E22: D9 9F F0 00 00 00  -  fstp dword ptr [edi+000000F0]
// ---------- DONE INJECTING  ----------
""+74CF3E28: D9 87 F0 00 00 00  -  fld dword ptr [edi+000000F0]
""+74CF3E2E: D9 05 50 14 A5 72  -  fld dword ptr [72A51450]
""+74CF3E34: DE C9              -  fmulp st(1),st(0)
""+74CF3E36: D9 9F F8 00 00 00  -  fstp dword ptr [edi+000000F8]
""+74CF3E3C: 8B 05 CC AC CD 0F  -  mov eax,[0FCDACCC]
""+74CF3E42: D9 40 38           -  fld dword ptr [eax+38]
""+74CF3E45: D9 9F F4 00 00 00  -  fstp dword ptr [edi+000000F4]
""+74CF3E4B: D9 87 F4 00 00 00  -  fld dword ptr [edi+000000F4]
""+74CF3E51: D9 05 58 14 A5 72  -  fld dword ptr [72A51458]
""+74CF3E57: DE C9              -  fmulp st(1),st(0)
}
infinite stamina:
[ENABLE]

aobscan(stamina1,D9 40 38 D9 9F F4 00 00 00) // should be unique
alloc(newmem,$1000)

label(code)
label(return)

newmem:

code:
push rbx
mov ebx,[eax+20]
mov [eax+38],ebx
pop rbx
  fld dword ptr [eax+38]
  fstp dword ptr [edi+000000F4]
  jmp return

stamina1:
  jmp newmem
  nop
  nop
  nop
  nop
return:
registersymbol(stamina1)

[DISABLE]

stamina1:
  db D9 40 38 D9 9F F4 00 00 00

unregistersymbol(stamina1)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: 74CF3E42

""+74CF3E1F: E9 DC C1 5D 91     -  jmp 062D0000
""+74CF3E24: 90                 -  nop
""+74CF3E25: 90                 -  nop
""+74CF3E26: 90                 -  nop
""+74CF3E27: 90                 -  nop
""+74CF3E28: D9 87 F0 00 00 00  -  fld dword ptr [edi+000000F0]
""+74CF3E2E: D9 05 50 14 A5 72  -  fld dword ptr [72A51450]
""+74CF3E34: DE C9              -  fmulp st(1),st(0)
""+74CF3E36: D9 9F F8 00 00 00  -  fstp dword ptr [edi+000000F8]
""+74CF3E3C: 8B 05 CC AC CD 0F  -  mov eax,[0FCDACCC]
// ---------- INJECTING HERE ----------
""+74CF3E42: D9 40 38           -  fld dword ptr [eax+38]
""+74CF3E45: D9 9F F4 00 00 00  -  fstp dword ptr [edi+000000F4]
// ---------- DONE INJECTING  ----------
""+74CF3E4B: D9 87 F4 00 00 00  -  fld dword ptr [edi+000000F4]
""+74CF3E51: D9 05 58 14 A5 72  -  fld dword ptr [72A51458]
""+74CF3E57: DE C9              -  fmulp st(1),st(0)
""+74CF3E59: D9 9F FC 00 00 00  -  fstp dword ptr [edi+000000FC]
""+74CF3E5F: D9 87 F0 00 00 00  -  fld dword ptr [edi+000000F0]
""+74CF3E65: D9 87 00 01 00 00  -  fld dword ptr [edi+00000100]
""+74CF3E6B: DF F1              -  fcomip st(0),st(1)
""+74CF3E6D: DD D8              -  fstp st(0)
""+74CF3E6F: 0F 85 82 00 00 00  -  jne 74CF3EF7
""+74CF3E75: 0F 8A 7C 00 00 00  -  jp 74CF3EF7
}
stealth hack:
{ Game   : GoaT.exe
  Version:
  Date   : 2018-03-16
  Author : ChrisPC

  This script does blah blah blah
}

[ENABLE]

aobscan(detection2,D9 40 68 8B 47 2C D9 40 64 DF F1 DD D8 0F 8A) // should be unique
alloc(newmem,$1000)

label(code)
label(return)

newmem:

code:
mov [eax+68],(float)0
  fld dword ptr [eax+68]
  mov eax,[edi+2C]
  jmp return

detection2:
  jmp newmem
  nop
return:
registersymbol(detection2)

[DISABLE]

detection2:
  db D9 40 68 8B 47 2C

unregistersymbol(detection2)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: 0624FF2D

""+624FF12: 85 C0                 -  test eax,eax
""+624FF14: 74 14                 -  je 0624FF2A
""+624FF16: 8B 47 18              -  mov eax,[edi+18]
""+624FF19: 83 EC 0C              -  sub esp,0C
""+624FF1C: 50                    -  push eax
""+624FF1D: 39 00                 -  cmp [eax],eax
""+624FF1F: E8 A4 D4 81 FF        -  call 05A6D3C8
""+624FF24: 83 C4 10              -  add esp,10
""+624FF27: 88 47 49              -  mov [edi+49],al
""+624FF2A: 8B 47 2C              -  mov eax,[edi+2C]
// ---------- INJECTING HERE ----------
""+624FF2D: D9 40 68              -  fld dword ptr [eax+68]
""+624FF30: 8B 47 2C              -  mov eax,[edi+2C]
// ---------- DONE INJECTING  ----------
""+624FF33: D9 40 64              -  fld dword ptr [eax+64]
""+624FF36: DF F1                 -  fcomip st(0),st(1)
""+624FF38: DD D8                 -  fstp st(0)
""+624FF3A: 0F 8A 67 02 00 00     -  jp 062501A7
""+624FF40: 0F 87 61 02 00 00     -  ja 062501A7
""+624FF46: 8B 47 2C              -  mov eax,[edi+2C]
""+624FF49: 0F B6 40 75           -  movzx eax,byte ptr [eax+75]
""+624FF4D: 85 C0                 -  test eax,eax
""+624FF4F: 0F 84 E8 06 00 00     -  je 0625063D
""+624FF55: 8B 47 30              -  mov eax,[edi+30]
}
Author
ChrisFayte
Downloads
7
Views
307
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from ChrisFayte

Community Mods