Kingdoms of Amalur Reckoning Cheat Table

Kingdoms of Amalur Reckoning Cheat Table 2020-07-23

Login to enable download
Hexui Undetected CSGO Cheats Sinkicheat PUBG Cheat
Kingdoms of Amalur Reckoning Cheat Table
1595472936083.png


Features
  • god mode
  • one hit kills
  • gold hack
  • unlimited ammo
  • infinite magic
  • instant fate
  • fast experience leveling
  • skill points
  • ability points
  • permanent stealth / undetected
  • no item damage
  • infinite status effects
  • backpack inventory editor

Cheat Scripts
god mode cheat:
[ENABLE]

aobscanmodule(health1,Reckoning.exe,8B 48 48 8B 40 4C 3B) // should be unique
alloc(newmem,$1000)

label(code)
label(return)

newmem:

code:
push ebx
mov ebx,[eax+4C]
mov [eax+48],ebx
pop ebx
  mov ecx,[eax+48]
  mov eax,[eax+4C]
  jmp return

health1:
  jmp newmem
  nop
return:
registersymbol(health1)

[DISABLE]

health1:
  db 8B 48 48 8B 40 4C

unregistersymbol(health1)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "Reckoning.exe"+63DF4E

"Reckoning.exe"+63DF31: 33 DB                 -  xor ebx,ebx
"Reckoning.exe"+63DF33: 50                    -  push eax
"Reckoning.exe"+63DF34: 8D 7B 01              -  lea edi,[ebx+01]
"Reckoning.exe"+63DF37: 8D 74 24 14           -  lea esi,[esp+14]
"Reckoning.exe"+63DF3B: E8 A0 31 9C FF        -  call Reckoning.exe+10E0
"Reckoning.exe"+63DF40: 8B 44 24 14           -  mov eax,[esp+14]
"Reckoning.exe"+63DF44: 85 C0                 -  test eax,eax
"Reckoning.exe"+63DF46: 74 42                 -  je Reckoning.exe+63DF8A
"Reckoning.exe"+63DF48: F6 40 20 01           -  test byte ptr [eax+20],01
"Reckoning.exe"+63DF4C: 74 3C                 -  je Reckoning.exe+63DF8A
// ---------- INJECTING HERE ----------
"Reckoning.exe"+63DF4E: 8B 48 48              -  mov ecx,[eax+48]
"Reckoning.exe"+63DF51: 8B 40 4C              -  mov eax,[eax+4C]
// ---------- DONE INJECTING  ----------
"Reckoning.exe"+63DF54: 3B C7                 -  cmp eax,edi
"Reckoning.exe"+63DF56: 7D 02                 -  jnl Reckoning.exe+63DF5A
"Reckoning.exe"+63DF58: 8B C7                 -  mov eax,edi
"Reckoning.exe"+63DF5A: 89 4C 24 20           -  mov [esp+20],ecx
"Reckoning.exe"+63DF5E: DB 44 24 20           -  fild dword ptr [esp+20]
"Reckoning.exe"+63DF62: 85 C9                 -  test ecx,ecx
"Reckoning.exe"+63DF64: 7D 06                 -  jnl Reckoning.exe+63DF6C
"Reckoning.exe"+63DF66: D8 05 A8 86 BA 00     -  fadd dword ptr [Reckoning.exe+7A86A8]
"Reckoning.exe"+63DF6C: 89 44 24 20           -  mov [esp+20],eax
"Reckoning.exe"+63DF70: DB 44 24 20           -  fild dword ptr [esp+20]
}
One hit kills cheat:
[ENABLE]

aobscanmodule(one_hit1,Reckoning.exe,89 4F 48 EB 03) // should be unique
alloc(newmem,$1000)

label(code)
label(return)

newmem:
cmp [edi+38],(float)0
jne code
cmp [edi+44],00
jne code
mov ecx,[edi+4C] // make available for inf health
mov [edi+48],ecx
jmp 007A1983
jmp return

code:

  mov [edi+48],0
  jmp 007A1983
  jmp return

one_hit1:
  jmp newmem
return:
registersymbol(one_hit1)

[DISABLE]

one_hit1:
  db 89 4F 48 EB 03

unregistersymbol(one_hit1)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "Reckoning.exe"+3A197B

"Reckoning.exe"+3A1957: 76 07                 -  jna Reckoning.exe+3A1960
"Reckoning.exe"+3A1959: 80 A7 DC 00 00 00 BF  -  and byte ptr [edi+000000DC],-41
"Reckoning.exe"+3A1960: 39 9F 84 00 00 00     -  cmp [edi+00000084],ebx
"Reckoning.exe"+3A1966: 0F 8D B6 00 00 00     -  jnl Reckoning.exe+3A1A22
"Reckoning.exe"+3A196C: E9 A5 00 00 00        -  jmp Reckoning.exe+3A1A16
"Reckoning.exe"+3A1971: 8B C6                 -  mov eax,esi
"Reckoning.exe"+3A1973: F7 D8                 -  neg eax
"Reckoning.exe"+3A1975: 3B C8                 -  cmp ecx,eax
"Reckoning.exe"+3A1977: 76 07                 -  jna Reckoning.exe+3A1980
"Reckoning.exe"+3A1979: 03 CE                 -  add ecx,esi
// ---------- INJECTING HERE ----------
"Reckoning.exe"+3A197B: 89 4F 48              -  mov [edi+48],ecx
"Reckoning.exe"+3A197E: EB 03                 -  jmp Reckoning.exe+3A1983
// ---------- DONE INJECTING  ----------
"Reckoning.exe"+3A1980: 89 5F 48              -  mov [edi+48],ebx
"Reckoning.exe"+3A1983: B1 40                 -  mov cl,40
"Reckoning.exe"+3A1985: 84 8F DC 00 00 00     -  test [edi+000000DC],cl
"Reckoning.exe"+3A198B: 0F 85 85 00 00 00     -  jne Reckoning.exe+3A1A16
"Reckoning.exe"+3A1991: 8B 47 4C              -  mov eax,[edi+4C]
"Reckoning.exe"+3A1994: 83 F8 01              -  cmp eax,01
"Reckoning.exe"+3A1997: 7D 05                 -  jnl Reckoning.exe+3A199E
"Reckoning.exe"+3A1999: B8 01 00 00 00        -  mov eax,00000001
"Reckoning.exe"+3A199E: 8B 15 E8 90 BF 00     -  mov edx,[Reckoning.exe+7F90E8]
"Reckoning.exe"+3A19A4: D9 82 64 30 00 00     -  fld dword ptr [edx+00003064]
}
Infinite Gold:
[ENABLE]

aobscanmodule(gold1,Reckoning.exe,8B 80 64 03 00 00 EB) // should be unique
alloc(newmem,$1000)

label(code)
label(return)

newmem:
cmp [eax+00000364],#99999
jg code
mov [eax+00000364],#99999

code:

  mov eax,[eax+00000364]
  jmp return

gold1:
  jmp newmem
  nop
return:
registersymbol(gold1)

[DISABLE]

gold1:
  db 8B 80 64 03 00 00

unregistersymbol(gold1)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "Reckoning.exe"+703E6C

"Reckoning.exe"+703E53: 83 E4 F8                 -  and esp,-08
"Reckoning.exe"+703E56: 8B 45 08                 -  mov eax,[ebp+08]
"Reckoning.exe"+703E59: 83 EC 28                 -  sub esp,28
"Reckoning.exe"+703E5C: 56                       -  push esi
"Reckoning.exe"+703E5D: 8B 70 50                 -  mov esi,[eax+50]
"Reckoning.exe"+703E60: 57                       -  push edi
"Reckoning.exe"+703E61: 33 FF                    -  xor edi,edi
"Reckoning.exe"+703E63: E8 38 91 F3 FF           -  call Reckoning.exe+63CFA0
"Reckoning.exe"+703E68: 85 C0                    -  test eax,eax
"Reckoning.exe"+703E6A: 74 08                    -  je Reckoning.exe+703E74
// ---------- INJECTING HERE ----------
"Reckoning.exe"+703E6C: 8B 80 64 03 00 00        -  mov eax,[eax+00000364]
// ---------- DONE INJECTING  ----------
"Reckoning.exe"+703E72: EB 02                    -  jmp Reckoning.exe+703E76
"Reckoning.exe"+703E74: 33 C0                    -  xor eax,eax
"Reckoning.exe"+703E76: 33 C9                    -  xor ecx,ecx
"Reckoning.exe"+703E78: 33 D2                    -  xor edx,edx
"Reckoning.exe"+703E7A: 89 44 24 20              -  mov [esp+20],eax
"Reckoning.exe"+703E7E: 8B 06                    -  mov eax,[esi]
"Reckoning.exe"+703E80: BF 1C 49 B7 00           -  mov edi,Reckoning.exe+77491C
"Reckoning.exe"+703E85: 66 89 54 24 16           -  mov [esp+16],dx
"Reckoning.exe"+703E8A: 89 7C 24 08              -  mov [esp+08],edi
"Reckoning.exe"+703E8E: C7 44 24 10 00 00 00 00  -  mov [esp+10],00000000
}
  • Like
Reactions: Kleon742
Author
ChrisFayte
Downloads
2
Views
198
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from ChrisFayte

Community Mods