Resident Evil 3 Cheats + Debugger bypass

Resident Evil 3 Cheats + Debugger bypass 2020-07-27

Login to enable download
Hexui Undetected CSGO Cheats Sinkicheat PUBG Cheat
Resident Evil 3 Cheats

1595884155859.png


Features
  • Kill Integrity Checks
  • GetPlayer
  • pPlayer
  • Health Base
  • Health
  • Health Max
  • Engine God Mode
  • Item Anmount Editor
  • Last Moved Item - Anmount
  • No Reload (proper)
  • Clip Size
Cheat Scripts
bypass debugger detection:
[ENABLE]
aobscanmodule(_KillIntegrityCHeck,re3.exe,48 8B 41 50 48 83 78 18 00 75 3D 8B) // should be unique
registersymbol(_KillIntegrityCHeck)

_KillIntegrityCHeck:
  db C3 90 90 90

[DISABLE]

_KillIntegrityCHeck:
  db 48 8B 41 50

unregistersymbol(_KillIntegrityCHeck)


{
// ORIGINAL CODE - INJECTION POINT: "re3.exe"+A75740

"re3.exe"+A7571C: B3 01                    -  mov bl,01
"re3.exe"+A7571E: 48 8D 4C 24 40           -  lea rcx,[rsp+40]
"re3.exe"+A75723: E8 48 BD 5E FF           -  call re3.exe+61470
"re3.exe"+A75728: 4C 8D 9C 24 80 00 00 00  -  lea r11,[rsp+00000080]
"re3.exe"+A75730: 0F B6 C3                 -  movzx eax,bl
"re3.exe"+A75733: 49 8B 5B 10              -  mov rbx,[r11+10]
"re3.exe"+A75737: 49 8B 73 18              -  mov rsi,[r11+18]
"re3.exe"+A7573B: 49 8B E3                 -  mov rsp,r11
"re3.exe"+A7573E: 5F                       -  pop rdi
"re3.exe"+A7573F: C3                       -  ret
// ---------- INJECTING HERE ----------
"re3.exe"+A75740: 48 8B 41 50              -  mov rax,[rcx+50]
"re3.exe"+A75744: 48 83 78 18 00           -  cmp qword ptr [rax+18],00
// ---------- DONE INJECTING  ----------
"re3.exe"+A75749: 75 3D                    -  jne re3.exe+A75788
"re3.exe"+A7574B: 8B 15 03 80 30 08        -  mov edx,[re3.exe+8D7D754]
"re3.exe"+A75751: FF CA                    -  dec edx
Get Player Address:
[ENABLE]
aobscanmodule(_PlayerBase,re3.exe,48 8B 03 48 8B 15 24 8F 88 08) // should be unique
alloc(newmem,$1000,"re3.exe"+468502)
alloc(_pPlayer,8)
registersymbol(_pPlayer)
registersymbol(_PlayerBase)
label(code)
label(return)

newmem:
code:
  mov [_pPlayer],rbx
  mov rax,[rbx]
  mov rdx,[re3.exe+8CF1430]
  jmp return

_PlayerBase:
  jmp newmem
  nop 5
return:


[DISABLE]

_PlayerBase:
  db 48 8B 03 48 8B 15 24 8F 88 08

unregistersymbol(_PlayerBase)
unregistersymbol(_pPlayer)
dealloc(_pPlayer)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "re3.exe"+468502

"re3.exe"+4684DF: 48 8B 40 10           -  mov rax,[rax+10]
"re3.exe"+4684E3: 48 8B CB              -  mov rcx,rbx
"re3.exe"+4684E6: 48 8B 50 70           -  mov rdx,[rax+70]
"re3.exe"+4684EA: E8 C1 9B E3 01        -  call re3.exe+22A20B0
"re3.exe"+4684EF: 48 8B D8              -  mov rbx,rax
"re3.exe"+4684F2: 48 8B 47 50           -  mov rax,[rdi+50]
"re3.exe"+4684F6: 48 83 78 18 00        -  cmp qword ptr [rax+18],00
"re3.exe"+4684FB: 75 A4                 -  jne re3.exe+4684A1
"re3.exe"+4684FD: 48 85 DB              -  test rbx,rbx
"re3.exe"+468500: 74 16                 -  je re3.exe+468518
// ---------- INJECTING HERE ----------
"re3.exe"+468502: 48 8B 03              -  mov rax,[rbx]
"re3.exe"+468505: 48 8B 15 24 8F 88 08  -  mov rdx,[re3.exe+8CF1430]
// ---------- DONE INJECTING  ----------
"re3.exe"+46850C: 48 8B 08              -  mov rcx,[rax]
"re3.exe"+46850F: E8 FC D0 E0 01        -  call re3.exe+2275610
"re3.exe"+468514: 84 C0                 -  test al,al
"re3.exe"+468516: 75 02                 -  jne re3.exe+46851A
"re3.exe"+468518: 33 DB                 -  xor ebx,ebx
"re3.exe"+46851A: 48 8B C3              -  mov rax,rbx
"re3.exe"+46851D: 48 8B 5C 24 38        -  mov rbx,[rsp+38]
"re3.exe"+468522: 48 83 C4 20           -  add rsp,20
"re3.exe"+468526: 5F                    -  pop rdi
"re3.exe"+468527: C3                    -  ret
}
Item Editor:
[ENABLE]
aobscanmodule(_ItemCountEditor,re3.exe,8B 78 20 EB 02 33) // should be unique
alloc(newmemItemCountEditor,$1000,re3.exe)
alloc(_pItemCount,8)
registersymbol(_pItemCount)
registersymbol(_ItemCountEditor)


newmemItemCountEditor:
mov [_pItemCount],rax
codeItemCountEditor:
  mov edi,[rax+20]
  jmp _ItemCountEditor+7
  jmp returnItemCountEditor

_ItemCountEditor:
  jmp newmemItemCountEditor
returnItemCountEditor:

_pItemCount:
dd 0
[DISABLE]

_ItemCountEditor:
  db 8B 78 20 EB 02

unregistersymbol(_ItemCountEditor)
unregistersymbol(_pItemCount)
dealloc(_pItemCount)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "re3.exe"+A5E1C9

"re3.exe"+A5E1A1: E8 6A 48 8F 00        -  call re3.exe+1352A10
"re3.exe"+A5E1A6: 48 8B 43 50           -  mov rax,[rbx+50]
"re3.exe"+A5E1AA: 48 8B 48 18           -  mov rcx,[rax+18]
"re3.exe"+A5E1AE: 48 85 C9              -  test rcx,rcx
"re3.exe"+A5E1B1: 0F 85 AC 02 00 00     -  jne re3.exe+A5E463
"re3.exe"+A5E1B7: 40 84 FF              -  test dil,dil
"re3.exe"+A5E1BA: 0F 84 06 FE FF FF     -  je re3.exe+A5DFC6
"re3.exe"+A5E1C0: 49 8B 46 10           -  mov rax,[r14+10]
"re3.exe"+A5E1C4: 48 85 C0              -  test rax,rax
"re3.exe"+A5E1C7: 74 05                 -  je re3.exe+A5E1CE
// ---------- INJECTING HERE ----------
"re3.exe"+A5E1C9: 8B 78 20              -  mov edi,[rax+20]
"re3.exe"+A5E1CC: EB 02                 -  jmp re3.exe+A5E1D0
// ---------- DONE INJECTING  ----------
"re3.exe"+A5E1CE: 33 FF                 -  xor edi,edi
"re3.exe"+A5E1D0: 48 85 C9              -  test rcx,rcx
"re3.exe"+A5E1D3: 0F 85 8A 02 00 00     -  jne re3.exe+A5E463
"re3.exe"+A5E1D9: 49 8B D6              -  mov rdx,r14
"re3.exe"+A5E1DC: 48 8B CB              -  mov rcx,rbx
"re3.exe"+A5E1DF: E8 9C 5D B9 FF        -  call re3.exe+5F3F80
"re3.exe"+A5E1E4: 0F B6 D0              -  movzx edx,al
"re3.exe"+A5E1E7: 48 8B 43 50           -  mov rax,[rbx+50]
"re3.exe"+A5E1EB: 48 8B 48 18           -  mov rcx,[rax+18]
"re3.exe"+A5E1EF: 48 85 C9              -  test rcx,rcx
}
ite
Author
l0wb1t
Downloads
2
Views
120
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from l0wb1t

Community Mods