Resource icon

Kholat Cheat Table 2020-07-23

Hexui Undetected CSGO Cheats Sinkicheat PUBG Cheat
Kholat Cheat Table
1595532532490.png


Features
  • Infinite stamina
  • speed hack
  • freeze enemy movement
Cheat Scripts
Infinite Stamina Cheat:
[ENABLE]

aobscanmodule(stamina,Kholat-Win64-Shipping.exe,F3 0F 5C CE 0F 2F C8 F3 0F 11 8B) // should be unique
alloc(newmem,$1000,"Kholat-Win64-Shipping.exe"+108ACA)

label(code)
label(return)
label(stam)
registersymbol(stam)

newmem:

code:
mov [stam],rbx
  //subss xmm1,xmm6
  comiss xmm1,xmm0
  jmp return

stam:
dq 0

stamina:
  jmp newmem
  nop
  nop
return:
registersymbol(stamina)

[DISABLE]

stamina:
  db F3 0F 5C CE 0F 2F C8

unregistersymbol(stamina)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "Kholat-Win64-Shipping.exe"+108ACA

"Kholat-Win64-Shipping.exe"+108A98: 48 85 C9                       -  test rcx,rcx
"Kholat-Win64-Shipping.exe"+108A9B: 0F 84 E7 00 00 00              -  je Kholat-Win64-Shipping.exe+108B88
"Kholat-Win64-Shipping.exe"+108AA1: E8 AA 3D 00 00                 -  call Kholat-Win64-Shipping.exe+10C850
"Kholat-Win64-Shipping.exe"+108AA6: 84 C0                          -  test al,al
"Kholat-Win64-Shipping.exe"+108AA8: 0F 85 DA 00 00 00              -  jne Kholat-Win64-Shipping.exe+108B88
"Kholat-Win64-Shipping.exe"+108AAE: F6 83 BC 05 00 00 02           -  test byte ptr [rbx+000005BC],02
"Kholat-Win64-Shipping.exe"+108AB5: 74 57                          -  je Kholat-Win64-Shipping.exe+108B0E
"Kholat-Win64-Shipping.exe"+108AB7: F3 0F 10 8B C8 05 00 00        -  movss xmm1,[rbx+000005C8]
"Kholat-Win64-Shipping.exe"+108ABF: F3 0F 59 B3 8C 05 00 00        -  mulss xmm6,[rbx+0000058C]
"Kholat-Win64-Shipping.exe"+108AC7: 0F 57 C0                       -  xorps xmm0,xmm0
// ---------- INJECTING HERE ----------
"Kholat-Win64-Shipping.exe"+108ACA: F3 0F 5C CE                    -  subss xmm1,xmm6
"Kholat-Win64-Shipping.exe"+108ACE: 0F 2F C8                       -  comiss xmm1,xmm0
// ---------- DONE INJECTING  ----------
"Kholat-Win64-Shipping.exe"+108AD1: F3 0F 11 8B C8 05 00 00        -  movss [rbx+000005C8],xmm1
"Kholat-Win64-Shipping.exe"+108AD9: 0F 87 BC 00 00 00              -  ja Kholat-Win64-Shipping.exe+108B9B
"Kholat-Win64-Shipping.exe"+108ADF: 33 D2                          -  xor edx,edx
"Kholat-Win64-Shipping.exe"+108AE1: 48 8B CB                       -  mov rcx,rbx
"Kholat-Win64-Shipping.exe"+108AE4: C7 83 C8 05 00 00 00 00 00 00  -  mov [rbx+000005C8],00000000
"Kholat-Win64-Shipping.exe"+108AEE: C6 83 C4 05 00 00 01           -  mov byte ptr [rbx+000005C4],01
"Kholat-Win64-Shipping.exe"+108AF5: E8 86 E6 FF FF                 -  call Kholat-Win64-Shipping.exe+107180
"Kholat-Win64-Shipping.exe"+108AFA: B2 01                          -  mov dl,01
"Kholat-Win64-Shipping.exe"+108AFC: 48 8B CB                       -  mov rcx,rbx
"Kholat-Win64-Shipping.exe"+108AFF: 0F 28 74 24 20                 -  movaps xmm6,[rsp+20]
}
Freeze Enemy Movement:
{ Game   : Kholat-Win64-Shipping.exe
  Version:
  Date   : 2019-02-03
  Author : ChrisFaytePC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(enemy_movement,Kholat-Win64-Shipping.exe,DC EB 15 0F 28 89 C0 00 00 00) // should be unique
alloc(newmem,$1000,"Kholat-Win64-Shipping.exe"+9D7726)

label(code)
label(return)

newmem:

code:
  //movaps xmm1,[rcx+000000C0]
  jmp return

enemy_movement+03:
  jmp newmem
  nop
  nop
return:
registersymbol(enemy_movement)

[DISABLE]

enemy_movement+03:
  db 0F 28 89 C0 00 00 00

unregistersymbol(enemy_movement)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "Kholat-Win64-Shipping.exe"+9D7726

"Kholat-Win64-Shipping.exe"+9D76F7: F6 81 E0 00 00 00 01     -  test byte ptr [rcx+000000E0],01
"Kholat-Win64-Shipping.exe"+9D76FE: F3 0F 10 B1 FC 00 00 00  -  movss xmm6,[rcx+000000FC]
"Kholat-Win64-Shipping.exe"+9D7706: 74 1E                    -  je Kholat-Win64-Shipping.exe+9D7726
"Kholat-Win64-Shipping.exe"+9D7708: 48 8B 01                 -  mov rax,[rcx]
"Kholat-Win64-Shipping.exe"+9D770B: 48 8D 55 DC              -  lea rdx,[rbp-24]
"Kholat-Win64-Shipping.exe"+9D770F: FF 90 D0 03 00 00        -  call qword ptr [rax+000003D0]
"Kholat-Win64-Shipping.exe"+9D7715: F3 0F 10 45 E4           -  movss xmm0,[rbp-1C]
"Kholat-Win64-Shipping.exe"+9D771A: F3 0F 10 55 E0           -  movss xmm2,[rbp-20]
"Kholat-Win64-Shipping.exe"+9D771F: F3 0F 10 4D DC           -  movss xmm1,[rbp-24]
"Kholat-Win64-Shipping.exe"+9D7724: EB 15                    -  jmp Kholat-Win64-Shipping.exe+9D773B
// ---------- INJECTING HERE ----------
"Kholat-Win64-Shipping.exe"+9D7726: 0F 28 89 C0 00 00 00     -  movaps xmm1,[rcx+000000C0]
// ---------- DONE INJECTING  ----------
"Kholat-Win64-Shipping.exe"+9D772D: 0F 28 D1                 -  movaps xmm2,xmm1
"Kholat-Win64-Shipping.exe"+9D7730: 0F 28 C1                 -  movaps xmm0,xmm1
"Kholat-Win64-Shipping.exe"+9D7733: 0F C6 D1 55              -  shufps xmm2,xmm155
"Kholat-Win64-Shipping.exe"+9D7737: 0F C6 C1 AA              -  shufps xmm0,xmm1-56
"Kholat-Win64-Shipping.exe"+9D773B: F3 0F 5C C6              -  subss xmm0,xmm6
"Kholat-Win64-Shipping.exe"+9D773F: F3 0F 11 4D DC           -  movss [rbp-24],xmm1
"Kholat-Win64-Shipping.exe"+9D7744: F3 0F 11 55 E0           -  movss [rbp-20],xmm2
"Kholat-Win64-Shipping.exe"+9D7749: F3 0F 11 45 E4           -  movss [rbp-1C],xmm0
"Kholat-Win64-Shipping.exe"+9D774E: EB 08                    -  jmp Kholat-Win64-Shipping.exe+9D7758
"Kholat-Win64-Shipping.exe"+9D7750: F2 0F 11 4D DC           -  movsd [rbp-24],xmm1
}
  • Like
Reactions: Kleon742
Author
ChrisFayte
Downloads
1
Views
56
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from ChrisFayte

Community Mods