Rise of the Tomb Raider Cheat Table

Rise of the Tomb Raider Cheat Table 2020-07-23

Login to enable download
Hexui Undetected CSGO Cheats Sinkicheat PUBG Cheat
Rise of the Tomb Raider Cheat Table
1595472002670.png


Features
  • God Mode
  • Infinite Ammo
  • Infinite Skill Points
Cheat Scripts
get health address:
[ENABLE]

aobscanmodule(health1,ROTTR.exe,F3 0F 11 70 2C 48 8B 8B A8) // should be unique
alloc(newmem,$100,"ROTTR.exe"+3356C18)

label(code)
label(return)
label(original)

globalalloc(_larah,8)
globalalloc(checkh,8)

newmem:

code:
  //movss [rax+2C],xmm6


pushf
cmp [rax+28],(int)450
jne original
popf
mov [_larah],rax
//movd xmm6,#450
  movss [rax+2C],xmm6
  mov [rax+2C],(float)9999
  jmp return

  original:
  popf
movss [rax+2C],xmm6
jmp return

health1:
  jmp code

return:
registersymbol(health1)

[DISABLE]

health1:
  db F3 0F 11 70 2C

unregistersymbol(health1)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "ROTTR.exe"+3356C18

"ROTTR.exe"+3356BF4: 48 8B 01                                      -  mov rax,[rcx]
"ROTTR.exe"+3356BF7: 0F 28 F1                                      -  movaps xmm6,xmm1
"ROTTR.exe"+3356BFA: FF 90 08 01 00 00                             -  call qword ptr [rax+00000108]
"ROTTR.exe"+3356C00: 84 C0                                         -  test al,al
"ROTTR.exe"+3356C02: 75 34                                         -  jne ROTTR.exe+3356C38
"ROTTR.exe"+3356C04: 48 8B 83 A8 02 00 00                          -  mov rax,[rbx+000002A8]
"ROTTR.exe"+3356C0B: 66 0F 6E 40 28                                -  movd xmm0,[rax+28]
"ROTTR.exe"+3356C10: 0F 5B C0                                      -  cvtdq2ps xmm0,xmm0
"ROTTR.exe"+3356C13: 0F 2E F0                                      -  ucomiss xmm6,xmm0
"ROTTR.exe"+3356C16: 74 20                                         -  je ROTTR.exe+3356C38
// ---------- INJECTING HERE ----------
"ROTTR.exe"+3356C18: F3 0F 11 70 2C                                -  movss [rax+2C],xmm6
// ---------- DONE INJECTING  ----------
"ROTTR.exe"+3356C1D: 48 8B 8B A8 02 00 00                          -  mov rcx,[rbx+000002A8]
"ROTTR.exe"+3356C24: F3 0F 2C 41 2C                                -  cvttss2si eax,[rcx+2C]
"ROTTR.exe"+3356C29: 89 41 28                                      -  mov [rcx+28],eax
"ROTTR.exe"+3356C2C: 48 8B 8B A8 02 00 00                          -  mov rcx,[rbx+000002A8]
"ROTTR.exe"+3356C33: E8 68 78 FC FF                                -  call ROTTR.exe+331E4A0
"ROTTR.exe"+3356C38: 0F 28 74 24 20                                -  movaps xmm6,[rsp+20]
"ROTTR.exe"+3356C3D: 48 83 C4 30                                   -  add rsp,30
"ROTTR.exe"+3356C41: 5B                                            -  pop rbx
"ROTTR.exe"+3356C42: C3                                            -  ret
"ROTTR.exe"+3356C43: CC                                            -  int 3
}
Infinite Ammo:
[ENABLE]

aobscanmodule(ammo2,ROTTR.exe,29 18 49 8B 86 70 03 00 00) // should be unique
alloc(newmem,$1000,"ROTTR.exe"+39396CC)

label(code)
label(return)

newmem:

code:
mov ebx,[r9-2338]
  mov [rax],ebx
  mov rax,[r14+00000370]
  jmp return

ammo2:
  jmp newmem
  nop
  nop
  nop
  nop
return:
registersymbol(ammo2)

[DISABLE]

ammo2:
  db 29 18 49 8B 86 70 03 00 00

unregistersymbol(ammo2)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "ROTTR.exe"+39396CC

"ROTTR.exe"+39396A7: 40 0F B6 FF              -  movzx edi,dil
"ROTTR.exe"+39396AB: 84 C0                    -  test al,al
"ROTTR.exe"+39396AD: B8 01 00 00 00           -  mov eax,00000001
"ROTTR.exe"+39396B2: 0F 45 F8                 -  cmovne edi,eax
"ROTTR.exe"+39396B5: 48 8B 44 24 78           -  mov rax,[rsp+78]
"ROTTR.exe"+39396BA: 44 39 78 0C              -  cmp [rax+0C],r15d
"ROTTR.exe"+39396BE: 75 1D                    -  jne ROTTR.exe+39396DD
"ROTTR.exe"+39396C0: 40 84 FF                 -  test dil,dil
"ROTTR.exe"+39396C3: 75 18                    -  jne ROTTR.exe+39396DD
"ROTTR.exe"+39396C5: 49 8B 86 70 03 00 00     -  mov rax,[r14+00000370]
// ---------- INJECTING HERE ----------
"ROTTR.exe"+39396CC: 29 18                    -  sub [rax],ebx
"ROTTR.exe"+39396CE: 49 8B 86 70 03 00 00     -  mov rax,[r14+00000370]
// ---------- DONE INJECTING  ----------
"ROTTR.exe"+39396D5: 44 39 38                 -  cmp [rax],r15d
"ROTTR.exe"+39396D8: 7D 03                    -  jnl ROTTR.exe+39396DD
"ROTTR.exe"+39396DA: 44 89 38                 -  mov [rax],r15d
"ROTTR.exe"+39396DD: 49 8B 86 78 05 00 00     -  mov rax,[r14+00000578]
"ROTTR.exe"+39396E4: 48 85 C0                 -  test rax,rax
"ROTTR.exe"+39396E7: 74 1C                    -  je ROTTR.exe+3939705
"ROTTR.exe"+39396E9: 44 38 78 6D              -  cmp [rax+6D],r15l
"ROTTR.exe"+39396ED: 74 05                    -  je ROTTR.exe+39396F4
"ROTTR.exe"+39396EF: 8B 48 70                 -  mov ecx,[rax+70]
"ROTTR.exe"+39396F2: EB 1B                    -  jmp ROTTR.exe+393970F
}
Infinite Skill Points:
{ Game   : ROTTR.exe
  Version:
  Date   : 2016-08-10
  Author : Chris Fayte

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(skillp1,ROTTR.exe,29 E8 89 41 44) // should be unique
alloc(newmema,$100,"ROTTR.exe"+3A7A465)

label(codea)
label(returna)

globalalloc(sp1,8)



newmema:

codea:
mov [sp1],rcx
  mov eax,#99
  mov [rcx+44],eax
  jmp returna

skillp1:
  jmp codea
returna:
registersymbol(skillp1)

[DISABLE]

skillp1:
  db 29 E8 89 41 44

unregistersymbol(skillp1)
dealloc(newmem

{
// ORIGINAL CODE - INJECTION POINT: "ROTTR.exe"+3C2CAA8

"ROTTR.exe"+3C2CA85: E8 86 3C F0 FF           -  call ROTTR.exe+3B30710
"ROTTR.exe"+3C2CA8A: 41 FF C6                 -  inc r14d
"ROTTR.exe"+3C2CA8D: FF C7                    -  inc edi
"ROTTR.exe"+3C2CA8F: 48 83 C3 02              -  add rbx,02
"ROTTR.exe"+3C2CA93: 3B 7E 58                 -  cmp edi,[rsi+58]
"ROTTR.exe"+3C2CA96: 72 B0                    -  jb ROTTR.exe+3C2CA48
"ROTTR.exe"+3C2CA98: 48 8B 4C 24 40           -  mov rcx,[rsp+40]
"ROTTR.exe"+3C2CA9D: E8 1E CA E5 FF           -  call ROTTR.exe+3A894C0
"ROTTR.exe"+3C2CAA2: 8B 56 0C                 -  mov edx,[rsi+0C]
"ROTTR.exe"+3C2CAA5: 4C 89 E1                 -  mov rcx,r12
// ---------- INJECTING HERE ----------
"ROTTR.exe"+3C2CAA8: 44 8B 40 44              -  mov r8d,[rax+44]
"ROTTR.exe"+3C2CAAC: E8 8F D4 FC FF           -  call ROTTR.exe+3BF9F40
// ---------- DONE INJECTING  ----------
"ROTTR.exe"+3C2CAB1: 31 FF                    -  xor edi,edi
"ROTTR.exe"+3C2CAB3: 44 8D 7F 01              -  lea r15d,[rdi+01]
"ROTTR.exe"+3C2CAB7: EB 49                    -  jmp ROTTR.exe+3C2CB02
"ROTTR.exe"+3C2CAB9: 48 8D 15 A0 B4 11 FD     -  lea rdx,[ROTTR.exe+D47F60]
"ROTTR.exe"+3C2CAC0: 31 FF                    -  xor edi,edi
"ROTTR.exe"+3C2CAC2: 45 31 C9                 -  xor r9d,r9d
"ROTTR.exe"+3C2CAC5: 45 31 C0                 -  xor r8d,r8d
"ROTTR.exe"+3C2CAC8: 4C 89 E1                 -  mov rcx,r12
"ROTTR.exe"+3C2CACB: 89 7C 24 20              -  mov [rsp+20],edi
"ROTTR.exe"+3C2CACF: E8 3C 7F F5 FF           -  call ROTTR.exe+3B84A10
}
  • Like
Reactions: Kleon742
Author
ChrisFayte
Downloads
1
Views
79
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from ChrisFayte

Community Mods