Shadow of Mordor Cheat Table

Shadow of Mordor Cheat Table 2020-07-22

Hexui Undetected CSGO Cheats Sinkicheat PUBG Cheat
Shadow of Mordor Cheat Table
1595461520806.png


Features

  • god mode
  • infinite arrows
  • experience
  • ability points
  • one hit kill executions
  • fast level up
  • fast power points
  • infinite ability points
  • infinite shadow of Acarh
  • infinite Flame of Azkhar
  • some lua examples

Sample of Scripts
God mode cheat:
//40 hero 0 660 hero 0
[ENABLE]

aobscanmodule(health1,ShadowOfMordor.exe,F3 41 0F 5C 48 50) // should be unique
alloc(newmem,$100,"ShadowOfMordor.exe"+C24734)

label(code)
label(return)

newmem:
cmp [r9+1A0],(int)0
jne code
movss xmm1,[r9+30]
jmp return

code:
  subss xmm1,[r8+50]
  jmp return

health1:
  jmp newmem
  nop
return:
registersymbol(health1)

[DISABLE]

health1:
  db F3 41 0F 5C 48 50

unregistersymbol(health1)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "ShadowOfMordor.exe"+C24734

"ShadowOfMordor.exe"+C2470F: 41 F6 41 48 02                 -  test byte ptr [r9+48],02
"ShadowOfMordor.exe"+C24714: 49 8B 40 58                    -  mov rax,[r8+58]
"ShadowOfMordor.exe"+C24718: 49 89 41 28                    -  mov [r9+28],rax
"ShadowOfMordor.exe"+C2471C: 75 0D                          -  jne ShadowOfMordor.exe+C2472B
"ShadowOfMordor.exe"+C2471E: 32 C0                          -  xor al,al
"ShadowOfMordor.exe"+C24720: C3                             -  ret
"ShadowOfMordor.exe"+C24721: 49 C7 41 20 00 00 00 00        -  mov [r9+20],00000000
"ShadowOfMordor.exe"+C24729: EB E4                          -  jmp ShadowOfMordor.exe+C2470F
"ShadowOfMordor.exe"+C2472B: F3 41 0F 10 49 34              -  movss xmm1,[r9+34]
"ShadowOfMordor.exe"+C24731: 0F 57 C0                       -  xorps xmm0,xmm0
// ---------- INJECTING HERE ----------
"ShadowOfMordor.exe"+C24734: F3 41 0F 5C 48 50              -  subss xmm1,[r8+50]
// ---------- DONE INJECTING  ----------
"ShadowOfMordor.exe"+C2473A: 0F 2F C1                       -  comiss xmm0,xmm1
"ShadowOfMordor.exe"+C2473D: F3 41 0F 11 49 34              -  movss [r9+34],xmm1
"ShadowOfMordor.exe"+C24743: 76 08                          -  jna ShadowOfMordor.exe+C2474D
"ShadowOfMordor.exe"+C24745: 41 C7 41 34 00 00 00 00        -  mov [r9+34],00000000
"ShadowOfMordor.exe"+C2474D: 41 0F B6 41 4A                 -  movzx eax,byte ptr [r9+4A]
"ShadowOfMordor.exe"+C24752: 84 C0                          -  test al,al
"ShadowOfMordor.exe"+C24754: 74 06                          -  je ShadowOfMordor.exe+C2475C
"ShadowOfMordor.exe"+C24756: FE C8                          -  dec al
"ShadowOfMordor.exe"+C24758: 41 88 41 4A                    -  mov [r9+4A],al
"ShadowOfMordor.exe"+C2475C: B0 01                          -  mov al,01
}
infinite focus:
{ Game   : ShadowOfMordor.exe
  Version:
  Date   : 2016-05-07
  Author : Chris Fayte

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(focus2,ShadowOfMordor.exe,F3 0F 11 7B 54 F3 0F 5C C7) // should be unique
alloc(newmem,$1000,"ShadowOfMordor.exe"+CC1FBC)

label(code)
label(return)

newmem:

code:
movss xmm7,[rbx+48]
  movss [rbx+54],xmm7
  jmp return

focus2:
  jmp code
return:
registersymbol(focus2)

[DISABLE]

focus2:
  db F3 0F 11 7B 54

unregistersymbol(focus2)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "ShadowOfMordor.exe"+CC1FBC

"ShadowOfMordor.exe"+CC1F96: 48 8B CB                 -  mov rcx,rbx
"ShadowOfMordor.exe"+CC1F99: F3 44 0F 11 43 44        -  movss [rbx+44],xmm8
"ShadowOfMordor.exe"+CC1F9F: E8 2C F9 FF FF           -  call ShadowOfMordor.exe+CC18D0
"ShadowOfMordor.exe"+CC1FA4: EB 45                    -  jmp ShadowOfMordor.exe+CC1FEB
"ShadowOfMordor.exe"+CC1FA6: F3 0F 10 4B 48           -  movss xmm1,[rbx+48]
"ShadowOfMordor.exe"+CC1FAB: 0F 2F F9                 -  comiss xmm7,xmm1
"ShadowOfMordor.exe"+CC1FAE: 76 07                    -  jna ShadowOfMordor.exe+CC1FB7
"ShadowOfMordor.exe"+CC1FB0: F3 0F 11 4B 54           -  movss [rbx+54],xmm1
"ShadowOfMordor.exe"+CC1FB5: EB 2C                    -  jmp ShadowOfMordor.exe+CC1FE3
"ShadowOfMordor.exe"+CC1FB7: F3 0F 10 43 44           -  movss xmm0,[rbx+44]
// ---------- INJECTING HERE ----------
"ShadowOfMordor.exe"+CC1FBC: F3 0F 11 7B 54           -  movss [rbx+54],xmm7
// ---------- DONE INJECTING  ----------
"ShadowOfMordor.exe"+CC1FC1: F3 0F 5C C7              -  subss xmm0,xmm7
"ShadowOfMordor.exe"+CC1FC5: 0F 14 C0                 -  unpcklps xmm0,xmm0
"ShadowOfMordor.exe"+CC1FC8: 0F 5A D0                 -  cvtps2pd xmm2,xmm0
"ShadowOfMordor.exe"+CC1FCB: 66 0F 54 15 FD 34 9D 00  -  andpd xmm2,[ShadowOfMordor.exe+16954D0]
"ShadowOfMordor.exe"+CC1FD3: F2 0F 5A C2              -  cvtsd2ss xmm0,xmm2
"ShadowOfMordor.exe"+CC1FD7: 0F 2F 05 5E 34 9D 00     -  comiss xmm0,[ShadowOfMordor.exe+169543C]
"ShadowOfMordor.exe"+CC1FDE: 76 0B                    -  jna ShadowOfMordor.exe+CC1FEB
"ShadowOfMordor.exe"+CC1FE0: 0F 28 CF                 -  movaps xmm1,xmm7
"ShadowOfMordor.exe"+CC1FE3: 48 8B CB                 -  mov rcx,rbx
"ShadowOfMordor.exe"+CC1FE6: E8 65 FB FF FF           -  call ShadowOfMordor.exe+CC1B50
}
Fast Leveling:
{ Game   : ShadowOfMordor.exe
  Version:
  Date   : 2016-05-07
  Author : Chris Fayte

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(xp1,ShadowOfMordor.exe,01 9F D4 04 00 00) // should be unique
alloc(newmem,$1000,"ShadowOfMordor.exe"+C0E51E)

label(code)
label(return)

newmem:

code:
mov ebx,270F
  add [rdi+000004D4],ebx
  jmp return

xp1:
  jmp code
  nop
return:
registersymbol(xp1)

[DISABLE]

xp1:
  db 01 9F D4 04 00 00

unregistersymbol(xp1)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "ShadowOfMordor.exe"+C0E51E

"ShadowOfMordor.exe"+C0E4EE: 8B D8                    -  mov ebx,eax
"ShadowOfMordor.exe"+C0E4F0: 85 C0                    -  test eax,eax
"ShadowOfMordor.exe"+C0E4F2: 0F 8E B7 00 00 00        -  jng ShadowOfMordor.exe+C0E5AF
"ShadowOfMordor.exe"+C0E4F8: 80 3D C5 ED D4 00 00     -  cmp byte ptr [ShadowOfMordor.exe+195D2C4],00
"ShadowOfMordor.exe"+C0E4FF: 74 1D                    -  je ShadowOfMordor.exe+C0E51E
"ShadowOfMordor.exe"+C0E501: 4C 8D 05 E8 F3 8E 00     -  lea r8,[ShadowOfMordor.exe+14FD8F0]
"ShadowOfMordor.exe"+C0E508: 48 8D 15 61 61 82 00     -  lea rdx,[ShadowOfMordor.exe+1434670]
"ShadowOfMordor.exe"+C0E50F: 48 8D 0D 5A 5B 82 00     -  lea rcx,[ShadowOfMordor.exe+1434070]
"ShadowOfMordor.exe"+C0E516: 44 8B C8                 -  mov r9d,eax
"ShadowOfMordor.exe"+C0E519: E8 72 41 26 00           -  call ShadowOfMordor.exe+E72690
// ---------- INJECTING HERE ----------
"ShadowOfMordor.exe"+C0E51E: 01 9F D4 04 00 00        -  add [rdi+000004D4],ebx
// ---------- DONE INJECTING  ----------
"ShadowOfMordor.exe"+C0E524: 48 8B CF                 -  mov rcx,rdi
"ShadowOfMordor.exe"+C0E527: E8 14 F0 FF FF           -  call ShadowOfMordor.exe+C0D540
"ShadowOfMordor.exe"+C0E52C: 4C 8B 5F 70              -  mov r11,[rdi+70]
"ShadowOfMordor.exe"+C0E530: 4D 85 DB                 -  test r11,r11
"ShadowOfMordor.exe"+C0E533: 74 1E                    -  je ShadowOfMordor.exe+C0E553
"ShadowOfMordor.exe"+C0E535: 49 8B 4B 40              -  mov rcx,[r11+40]
"ShadowOfMordor.exe"+C0E539: 48 85 C9                 -  test rcx,rcx
"ShadowOfMordor.exe"+C0E53C: 74 15                    -  je ShadowOfMordor.exe+C0E553
"ShadowOfMordor.exe"+C0E53E: E8 DD 15 FC FF           -  call ShadowOfMordor.exe+BCFB20
"ShadowOfMordor.exe"+C0E543: 48 85 C0                 -  test rax,rax
}
  • Love
Reactions: Kleon742
Author
ChrisFayte
Downloads
7
Views
112
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from ChrisFayte

Similar resources
Community Mods