Shadow of the Tomb Raider Cheats

Shadow of the Tomb Raider Cheats 2020-07-23

Login to enable download
Hexui Undetected CSGO Cheats Sinkicheat PUBG Cheat
Shadow of the Tomb Raider Cheats

1595471158077.png


Features
  • God mode
  • infinite underwater breath
  • infinite ammo
  • no reload
  • skill points
  • Freeze skill points
Scripts
God Mode Cheat:
{$lua}
[ENABLE]

healthcp = readFloat('[[[[["SOTTR.exe"+0291ED30]+40]+198]+10]+880]+76C')

h_time = createTimer()
h_time.setInterval(10)
h_time.onTimer = function()
writeFloat('[[[[["SOTTR.exe"+0228EAE0]+298]+08]+08]+290]+2C',healthcp)

end


 
[DISABLE]

h_time.destroy()
Infinite Breath:
[ENABLE]

aobscanmodule(breath1,SOTTR.exe,F3 0F 11 89 D8 1B 00 00) // should be unique
alloc(newmem,$100,"SOTTR.exe"+DA070B1)
globalalloc(br_cap1,$100)

label(code)
label(return)
label(br_cap2)
registersymbol(br_cap2)


br_cap1:
dd 0



newmem:
push rbx
mov rbx,["SOTTR.exe"+02F6E418]
cmp rbx,0
je code
mov rbx,[rbx+128]
cmp rbx,0
je code
mov rbx,[rbx+208]
cmp rbx,0
je code
mov rbx,[rbx+20C]
cmp rbx,0
je code

mov [br_cap1],rbx
movss xmm1,[br_cap1]

code:
pop rbx
mov [br_cap2],rcx
  movss [rcx+00001BD8],xmm1
  jmp return

  br_cap2:
  dd 0

breath1:
  jmp newmem
  nop
  nop
  nop
return:
registersymbol(breath1)

[DISABLE]

breath1:
  db F3 0F 11 89 D8 1B 00 00

unregistersymbol(breath1)
unregistersymbol(br_cap2)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "SOTTR.exe"+DA070B1

"SOTTR.exe"+DA07087: 4D 89 D1                 -  mov r9,r10
"SOTTR.exe"+DA0708A: 4C 89 0C 24              -  mov [rsp],r9
"SOTTR.exe"+DA0708E: 4C 8D 15 E9 75 38 02     -  lea r10,[SOTTR.exe+FD8E67E]
"SOTTR.exe"+DA07095: 4C 87 14 24              -  xchg [rsp],r10
"SOTTR.exe"+DA07099: C3                       -  ret
"SOTTR.exe"+DA0709A: 68 0F 1F 44 00           -  push 00441F0F
"SOTTR.exe"+DA0709F: 00 53 48                 -  add [rbx+48],dl
"SOTTR.exe"+DA070A2: 83 EC 30                 -  sub esp,30
"SOTTR.exe"+DA070A5: 4C 8B 89 C8 33 00 00     -  mov r9,[rcx+000033C8]
"SOTTR.exe"+DA070AC: 4C 8D 44 24 48           -  lea r8,[rsp+48]
// ---------- INJECTING HERE ----------
"SOTTR.exe"+DA070B1: F3 0F 11 89 D8 1B 00 00  -  movss [rcx+00001BD8],xmm1
// ---------- DONE INJECTING  ----------
"SOTTR.exe"+DA070B9: 31 C0                    -  xor eax,eax
"SOTTR.exe"+DA070BB: 66 89 44 24 24           -  mov [rsp+24],ax
"SOTTR.exe"+DA070C0: 48 89 CB                 -  mov rbx,rcx
"SOTTR.exe"+DA070C3: 0F B7 05 1A F8 B1 F5     -  movzx eax,word ptr [SOTTR.exe+35268E4]
"SOTTR.exe"+DA070CA: 48 8D 4C 24 20           -  lea rcx,[rsp+20]
"SOTTR.exe"+DA070CF: 4D 8B 49 68              -  mov r9,[r9+68]
"SOTTR.exe"+DA070D3: BA 02 00 00 00           -  mov edx,00000002
"SOTTR.exe"+DA070D8: 66 89 44 24 48           -  mov [rsp+48],ax
"SOTTR.exe"+DA070DD: E8 4E E1 87 F2           -  call SOTTR.exe+285230
"SOTTR.exe"+DA070E2: F3 0F 10 8B D8 1B 00 00  -  movss xmm1,[rbx+00001BD8]
}
No reload cheat:
{ Game   : SOTTR.exe
  Version:
  Date   : 2018-10-04
  Author : ChrisFaytePC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(reload2,SOTTR.exe,8B 83 A0 05 00 00 89) // should be unique
alloc(newmem,$1000,"SOTTR.exe"+EBE559F)

label(code)
label(return)
label(reload)
registersymbol(reload)

newmem:

code:
mov [reload],rbx
  mov eax,[rbx+000005A8]
  mov [rbx+000005A0],eax
  jmp return

  reload:
  dd 0

reload2:
  jmp newmem
  nop
return:
registersymbol(reload2)

[DISABLE]

reload2:
  db 8B 83 A0 05 00 00

unregistersymbol(reload2)
unregistersymbol(reload)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "SOTTR.exe"+EBE559F

"SOTTR.exe"+EBE556B: 89 8C 24 C0 00 00 00     -  mov [rsp+000000C0],ecx
"SOTTR.exe"+EBE5572: 48 8B 88 C8 33 00 00     -  mov rcx,[rax+000033C8]
"SOTTR.exe"+EBE5579: 8B 41 68                 -  mov eax,[rcx+68]
"SOTTR.exe"+EBE557C: 8B 0D E6 AA A3 F2        -  mov ecx,[SOTTR.exe+1620068]
"SOTTR.exe"+EBE5582: 48 8D 04 C0              -  lea rax,[rax+rax*8]
"SOTTR.exe"+EBE5586: 48 C1 E0 05              -  shl rax,05
"SOTTR.exe"+EBE558A: 4A 8B 84 38 58 01 00 00  -  mov rax,[rax+r15+00000158]
"SOTTR.exe"+EBE5592: 48 8B 0C C8              -  mov rcx,[rax+rcx*8]
"SOTTR.exe"+EBE5596: E8 85 F5 A7 F1           -  call SOTTR.exe+664B20
"SOTTR.exe"+EBE559B: 44 0F B7 E8              -  movzx r13d,ax
// ---------- INJECTING HERE ----------
"SOTTR.exe"+EBE559F: 8B 83 A0 05 00 00        -  mov eax,[rbx+000005A0]
// ---------- DONE INJECTING  ----------
"SOTTR.exe"+EBE55A5: 89 84 24 D8 00 00 00     -  mov [rsp+000000D8],eax
"SOTTR.exe"+EBE55AC: 44 39 E8                 -  cmp eax,r13d
"SOTTR.exe"+EBE55AF: 7E 07                    -  jle SOTTR.exe+EBE55B8
"SOTTR.exe"+EBE55B1: 44 89 AB A0 05 00 00     -  mov [rbx+000005A0],r13d
"SOTTR.exe"+EBE55B8: 45 31 C0                 -  xor r8d,r8d
"SOTTR.exe"+EBE55BB: 89 EA                    -  mov edx,ebp
"SOTTR.exe"+EBE55BD: 48 89 D9                 -  mov rcx,rbx
"SOTTR.exe"+EBE55C0: E8 BB 48 AE F1           -  call SOTTR.exe+6C9E80
"SOTTR.exe"+EBE55C5: 85 C0                    -  test eax,eax
"SOTTR.exe"+EBE55C7: 74 4D                    -  je SOTTR.exe+EBE5616
}
  • Like
Reactions: Kleon742
Author
ChrisFayte
Downloads
0
Views
38
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from ChrisFayte

Community Mods League of Legends Accounts