Sekiro Cheats - God mode, fast kills etc

Sekiro Cheats - God mode, fast kills etc 2020-07-22

Login to enable download
Hexui Undetected CSGO Cheats Sinkicheat PUBG Cheat
Sekiro Cheats - God mode, fast kills etc
1595461874261.png


Features

  • God mode
  • fast kills
  • skill points
  • spirit emblems
  • instant level ups
  • permanent stealth
  • infinite items
Scripts
Get player health address:
{ Game   : sekiro.exe
  Version:
  Date   : 2019-03-30
  Author : ChrisFaytePC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(health1,sekiro.exe,CC 8B 81 30 01 00 00) // should be unique
alloc(newmem,$1000,"sekiro.exe"+5A6DF0)
alloc(phealth,8)
label(code)
label(return)
registersymbol(phealth)

phealth:
dq 0

newmem:
cmp [rcx+50],0
jne code
mov [phealth],rcx
mov eax,[rcx+00000134]
mov [rcx+00000130],eax

code:
  mov eax,[rcx+00000130]
  jmp return

health1+01:
  jmp newmem
  nop
return:
registersymbol(health1)

[DISABLE]

health1+01:
  db 8B 81 30 01 00 00

unregistersymbol(health1)
unregistersymbol(phealth)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "sekiro.exe"+5A6DF0

"sekiro.exe"+5A6DE6: CC                          -  int 3
"sekiro.exe"+5A6DE7: CC                          -  int 3
"sekiro.exe"+5A6DE8: CC                          -  int 3
"sekiro.exe"+5A6DE9: CC                          -  int 3
"sekiro.exe"+5A6DEA: CC                          -  int 3
"sekiro.exe"+5A6DEB: CC                          -  int 3
"sekiro.exe"+5A6DEC: CC                          -  int 3
"sekiro.exe"+5A6DED: CC                          -  int 3
"sekiro.exe"+5A6DEE: CC                          -  int 3
"sekiro.exe"+5A6DEF: CC                          -  int 3
// ---------- INJECTING HERE ----------
"sekiro.exe"+5A6DF0: 8B 81 30 01 00 00           -  mov eax,[rcx+00000130]
// ---------- DONE INJECTING  ----------
"sekiro.exe"+5A6DF6: C3                          -  ret
"sekiro.exe"+5A6DF7: CC                          -  int 3
"sekiro.exe"+5A6DF8: CC                          -  int 3
"sekiro.exe"+5A6DF9: CC                          -  int 3
"sekiro.exe"+5A6DFA: CC                          -  int 3
"sekiro.exe"+5A6DFB: CC                          -  int 3
"sekiro.exe"+5A6DFC: CC                          -  int 3
"sekiro.exe"+5A6DFD: CC                          -  int 3
"sekiro.exe"+5A6DFE: CC                          -  int 3
"sekiro.exe"+5A6DFF: CC                          -  int 3
}
get coins, experience, money, skill points, emblems:
{ Game   : sekiro.exe
  Version:
  Date   : 2019-03-30
  Author : ChrisFaytePC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(coin1,sekiro.exe,8B 00 89 41 7C C3 CC) // should be unique
alloc(newmem,$1000,"sekiro.exe"+66B551)

label(code)
label(return)
label(coinb)
registersymbol(coinb)

newmem:
mov eax,[rax]

code:
mov [coinb],rcx
mov [rcx+7C],eax
  jmp return

  coinb:
  dq 0

coin1:
  jmp newmem
return:
registersymbol(coin1)

[DISABLE]

coin1:
  db 8B 00 89 41 7C

unregistersymbol(coin1)
unregistersymbol(coinb)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "sekiro.exe"+66B551

"sekiro.exe"+66B52C: 85 D2                    -  test edx,edx
"sekiro.exe"+66B52E: 79 0B                    -  jns sekiro.exe+66B53B
"sekiro.exe"+66B530: 48 8D 44 24 08           -  lea rax,[rsp+08]
"sekiro.exe"+66B535: 8B 00                    -  mov eax,[rax]
"sekiro.exe"+66B537: 89 41 7C                 -  mov [rcx+7C],eax
"sekiro.exe"+66B53A: C3                       -  ret
"sekiro.exe"+66B53B: 3B 15 BF 58 20 02        -  cmp edx,[sekiro.exe+2870E00]
"sekiro.exe"+66B541: 4C 8D 05 B8 58 20 02     -  lea r8,[sekiro.exe+2870E00]
"sekiro.exe"+66B548: 48 8D 44 24 10           -  lea rax,[rsp+10]
"sekiro.exe"+66B54D: 49 0F 4F C0              -  cmovg rax,r8
// ---------- INJECTING HERE ----------
"sekiro.exe"+66B551: 8B 00                    -  mov eax,[rax]
"sekiro.exe"+66B553: 89 41 7C                 -  mov [rcx+7C],eax
// ---------- DONE INJECTING  ----------
"sekiro.exe"+66B556: C3                       -  ret
"sekiro.exe"+66B557: CC                       -  int 3
"sekiro.exe"+66B558: CC                       -  int 3
"sekiro.exe"+66B559: CC                       -  int 3
"sekiro.exe"+66B55A: CC                       -  int 3
"sekiro.exe"+66B55B: CC                       -  int 3
"sekiro.exe"+66B55C: CC                       -  int 3
"sekiro.exe"+66B55D: CC                       -  int 3
"sekiro.exe"+66B55E: CC                       -  int 3
"sekiro.exe"+66B55F: CC                       -  int 3
}
permanent stealth cheat:
{ Game   : sekiro.exe
  Version:
  Date   : 2019-04-01
  Author : Credit goes to Cielos

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(stealth1,sekiro.exe,74 0B 48 8B 01 F3) // should be unique
registersymbol(stealth1)

stealth1:
db EB 0B



[DISABLE]

stealth1:
  db 74 0B

unregistersymbol(stealth1)


{
// ORIGINAL CODE - INJECTION POINT: "sekiro.exe"+605CCB

"sekiro.exe"+605C9A: 48 3B C2              -  cmp rax,rdx
"sekiro.exe"+605C9D: 75 D1                 -  jne sekiro.exe+605C70
"sekiro.exe"+605C9F: 48 8D 8F 60 90 00 00  -  lea rcx,[rdi+00009060]
"sekiro.exe"+605CA6: F3 0F 10 4E 08        -  movss xmm1,[rsi+08]
"sekiro.exe"+605CAB: E8 40 73 FA FF        -  call sekiro.exe+5ACFF0
"sekiro.exe"+605CB0: 48 8D 8F 40 91 00 00  -  lea rcx,[rdi+00009140]
"sekiro.exe"+605CB7: F3 0F 10 4E 08        -  movss xmm1,[rsi+08]
"sekiro.exe"+605CBC: E8 FF 8F FA FF        -  call sekiro.exe+5AECC0
"sekiro.exe"+605CC1: 48 8B 8F 30 7B 00 00  -  mov rcx,[rdi+00007B30]
"sekiro.exe"+605CC8: 48 85 C9              -  test rcx,rcx
// ---------- INJECTING HERE ----------
"sekiro.exe"+605CCB: 74 0B                 -  je sekiro.exe+605CD8
"sekiro.exe"+605CCD: 48 8B 01              -  mov rax,[rcx]
// ---------- DONE INJECTING  ----------
"sekiro.exe"+605CD0: F3 0F 10 4E 08        -  movss xmm1,[rsi+08]
"sekiro.exe"+605CD5: FF 50 10              -  call qword ptr [rax+10]
"sekiro.exe"+605CD8: 48 8D 8F 50 7B 00 00  -  lea rcx,[rdi+00007B50]
"sekiro.exe"+605CDF: F3 0F 10 4E 08        -  movss xmm1,[rsi+08]
"sekiro.exe"+605CE4: E8 17 C6 FA FF        -  call sekiro.exe+5B2300
"sekiro.exe"+605CE9: 48 8D 8F 60 7D 00 00  -  lea rcx,[rdi+00007D60]
"sekiro.exe"+605CF0: F3 0F 10 4E 08        -  movss xmm1,[rsi+08]
"sekiro.exe"+605CF5: E8 06 C1 FA FF        -  call sekiro.exe+5B1E00
"sekiro.exe"+605CFA: 48 8B 05 EF 20 56 03  -  mov rax,[sekiro.exe+3B67DF0]
"sekiro.exe"+605D01: 48 85 C0              -  test rax,rax
}
  • Love
Reactions: Kleon742
Author
ChrisFayte
Downloads
0
Views
17
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from ChrisFayte

Community Mods League of Legends Accounts