Shantae Half-Genie Hero Cheat Table

Shantae Half-Genie Hero Cheat Table 2020-07-22

Hexui Undetected CSGO Cheats PUBG Accounts
A 2016 edition of Shantae Half-Genie Hero is the 4th one pushed into the list of Shantae series. The game has gained several extras in comparison to the last revealed one in a similar series. A notable example that can be taken of some add-ons is that a couple of expansions are offered to the player: Pirate’s queen quest and Friends to the End. Likewise, the addition of various other modes further diversifies the gaming experience. Shantae Half-Genie Hero does have a basic anticheat tho that prevents you from attaching Cheat Engine, but you can use our Cheat Table to disable it.

The artistic build up with imaginative ideas and higher sensitive rates and response time props up the game turnouts. The Player takes on the Shantae that holds enough capabilities to manage herself with the happenings all around. This half-genie makes use of her to trounce her rivals. Parallel to this, she has the potential to mutate herself as per the need. She can transform herself into a spider, rats, elephants, etc., to access and unlock certain areas. There’s a large map to go through with multiple levels to master by accomplishing the aims and objectives and picking out all those required to pursue the road towards success. Complete the game to resume with the “Hero mode” and the “Hardcore mode” with new powers annexed by your character. Get rewards and add to your bonus with exquisite skills.

Shantae Half-Genie Hero Cheat Table

Really overwhelmed by situations pricking you to take quick actions and be dynamic and animated to play it through. To get rewards and further boost yourself to achieve a bonus and keep carrying on with such performance, you need to hold tight to the Shantae Half-Genie Hero cheat table. There are too many in there for you to make it count. Chop chop! Type in: “Massive Damage with Hair” and see the magic. Uplift the power of your character. Next, Type in: “Super Jump” and zip through the areas while avoiding irregularities. Download the Cheat Table and do as recommended.

1595460967040.png


Cheat Features
  • remote antidebug
  • god mode
  • infinite magic
  • super jump
  • increase health capacity
  • massive damage cheat
  • increase gems on purchase
Shantae Half-Genie Hero Cheat Table Scripts

Patch isdebuggerPresent:
{ Game   : ShantaeHero64.exe
  Version:
  Date   : 2019-03-25
  Author : ChrisFaytePC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(debug,KERNELBASE.dll,65 48 8B 04 25 60 00 00 00 0F B6 40) // should be unique
alloc(newmem,$1000,"KERNELBASE.dll"+28C10)
alloc(dbg,8)

label(code)
label(return)
registersymbol(dbg)

dbg:
dq 0


newmem:

code:
  mov rax,gs:[00000060]
  mov [dbg],rax
  mov byte ptr [rax+02],00
  jmp return

debug:
  jmp newmem
  nop
  nop
  nop
  nop
return:
registersymbol(debug)

[DISABLE]

debug:
  db 65 48 8B 04 25 60 00 00 00

unregistersymbol(debug)
unregistersymbol(dbg)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "KERNELBASE.dll"+28C10

"KERNELBASE.dll"+28C00: 48 8D 05 89 34 1E 00        -  lea rax,[KERNELBASE.dll+20C090]
"KERNELBASE.dll"+28C07: C3                          -  ret
"KERNELBASE.dll"+28C08: CC                          -  int 3
"KERNELBASE.dll"+28C09: CC                          -  int 3
"KERNELBASE.dll"+28C0A: CC                          -  int 3
"KERNELBASE.dll"+28C0B: CC                          -  int 3
"KERNELBASE.dll"+28C0C: CC                          -  int 3
"KERNELBASE.dll"+28C0D: CC                          -  int 3
"KERNELBASE.dll"+28C0E: CC                          -  int 3
"KERNELBASE.dll"+28C0F: CC                          -  int 3
// ---------- INJECTING HERE ----------
"KERNELBASE.dll"+28C10: 65 48 8B 04 25 60 00 00 00  -  mov rax,gs:[00000060]
// ---------- DONE INJECTING  ----------
"KERNELBASE.dll"+28C19: 0F B6 40 02                 -  movzx eax,byte ptr [rax+02]
"KERNELBASE.dll"+28C1D: C3                          -  ret
"KERNELBASE.dll"+28C1E: CC                          -  int 3
"KERNELBASE.dll"+28C1F: CC                          -  int 3
"KERNELBASE.dll"+28C20: CC                          -  int 3
"KERNELBASE.dll"+28C21: CC                          -  int 3
"KERNELBASE.dll"+28C22: CC                          -  int 3
"KERNELBASE.dll"+28C23: CC                          -  int 3
"KERNELBASE.dll"+28C24: CC                          -  int 3
"KERNELBASE.dll"+28C25: CC                          -  int 3
}
god mode:
{ Game   : ShantaeHero64.exe
  Version:
  Date   : 2019-03-26
  Author : ChrisFaytePC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(health1,ShantaeHero64.exe,0F 2F 88 E8 02 00 00) // should be unique
alloc(newmem,$1000,"ShantaeHero64.exe"+170C8F)
alloc(hlth,8)
label(code)
label(return)
registersymbol(hlth)

hlth:
dq 0

newmem:

code:
mov [hlth],rax
//mov [rax+000002E4],(float)70
movss xmm1,[rax+000002E4]
movss [rax+000002E8],xmm1
xorps xmm1,xmm1
  comiss xmm1,[rax+000002E8]
  jmp return

health1:
  jmp newmem
  nop
  nop
return:
registersymbol(health1)

[DISABLE]

health1:
  db 0F 2F 88 E8 02 00 00

unregistersymbol(health1)
unregistersymbol(hlth)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "ShantaeHero64.exe"+170C8F

"ShantaeHero64.exe"+170C61: 48 8B 05 58 3E 51 00     -  mov rax,[ShantaeHero64.exe+684AC0]
"ShantaeHero64.exe"+170C68: 48 85 C0                 -  test rax,rax
"ShantaeHero64.exe"+170C6B: 74 09                    -  je ShantaeHero64.exe+170C76
"ShantaeHero64.exe"+170C6D: 80 B8 49 01 00 00 00     -  cmp byte ptr [rax+00000149],00
"ShantaeHero64.exe"+170C74: 75 49                    -  jne ShantaeHero64.exe+170CBF
"ShantaeHero64.exe"+170C76: 80 3D 2A 40 51 00 00     -  cmp byte ptr [ShantaeHero64.exe+684CA7],00
"ShantaeHero64.exe"+170C7D: 75 40                    -  jne ShantaeHero64.exe+170CBF
"ShantaeHero64.exe"+170C7F: 80 B9 68 10 00 00 00     -  cmp byte ptr [rcx+00001068],00
"ShantaeHero64.exe"+170C86: 75 37                    -  jne ShantaeHero64.exe+170CBF
"ShantaeHero64.exe"+170C88: 48 8B 81 B8 05 00 00     -  mov rax,[rcx+000005B8]
// ---------- INJECTING HERE ----------
"ShantaeHero64.exe"+170C8F: 0F 2F 88 E8 02 00 00     -  comiss xmm1,[rax+000002E8]
// ---------- DONE INJECTING  ----------
"ShantaeHero64.exe"+170C96: 73 27                    -  jae ShantaeHero64.exe+170CBF
"ShantaeHero64.exe"+170C98: 48 8B 05 A1 40 51 00     -  mov rax,[ShantaeHero64.exe+684D40]
"ShantaeHero64.exe"+170C9F: 48 85 C0                 -  test rax,rax
"ShantaeHero64.exe"+170CA2: 74 06                    -  je ShantaeHero64.exe+170CAA
"ShantaeHero64.exe"+170CA4: 80 78 30 00              -  cmp byte ptr [rax+30],00
"ShantaeHero64.exe"+170CA8: 74 15                    -  je ShantaeHero64.exe+170CBF
"ShantaeHero64.exe"+170CAA: 48 8B 82 60 0A 00 00     -  mov rax,[rdx+00000A60]
"ShantaeHero64.exe"+170CB1: 48 85 C0                 -  test rax,rax
"ShantaeHero64.exe"+170CB4: 74 06                    -  je ShantaeHero64.exe+170CBC
"ShantaeHero64.exe"+170CB6: 80 78 30 00              -  cmp byte ptr [rax+30],00
}
infinite mana:
{ Game   : ShantaeHero64.exe
  Version:
  Date   : 2019-03-27
  Author : ChrisFaytePC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(magic_subtract,ShantaeHero64.exe,F3 0F 5C C8 E8 6E 03 00 00)
aobscanmodule(magic2,ShantaeHero64.exe,F3 0F 5C CE 48 8B CF)
aobscanmodule(magic3,ShantaeHero64.exe,F3 0F 10 49 44 EB 03 0F 28)
alloc(newmem,$1000,"ShantaeHero64.exe"+10BE89)
alloc(newmema,$1000,"ShantaeHero64.exe"+A3BE7)

label(code)
label(return)
label(magic)
label(codea)
label(returna)
registersymbol(magic)
registersymbol(magic2)

magic2:
db 90 90 90 90

newmem:

code:
  movss xmm1,[rcx+48]
  call ShantaeHero64.exe+10C200
  jmp return

  magic:
  dd 0

magic_subtract:
  jmp newmem
  nop
  nop
  nop
  nop
return:
registersymbol(magic_subtract)

newmema:

codea:
movss xmm1,[rcx+48]
movss [rcx+44],xmm1
  movss xmm1,[rcx+44]
  jmp returna

magic3:
  jmp newmema
returna:
registersymbol(magic3)

[DISABLE]

magic_subtract:
  db F3 0F 5C C8 E8 6E 03 00 00
magic2:
  db F3 0F 5C CE
  magic3:
  db F3 0F 10 49 44

unregistersymbol(magic3)
unregistersymbol(magic2)
unregistersymbol(magic_subtract)
dealloc(newmem)
dealloc(newmema)

{
// ORIGINAL CODE - INJECTION POINT: "ShantaeHero64.exe"+10BE89

"ShantaeHero64.exe"+10BE68: 0F 2F C1              -  comiss xmm0,xmm1
"ShantaeHero64.exe"+10BE6B: 72 1C                 -  jb ShantaeHero64.exe+10BE89
"ShantaeHero64.exe"+10BE6D: 0F 28 CA              -  movaps xmm1,xmm2
"ShantaeHero64.exe"+10BE70: E8 8B 03 00 00        -  call ShantaeHero64.exe+10C200
"ShantaeHero64.exe"+10BE75: 33 D2                 -  xor edx,edx
"ShantaeHero64.exe"+10BE77: 48 8B CF              -  mov rcx,rdi
"ShantaeHero64.exe"+10BE7A: 48 8B 5C 24 30        -  mov rbx,[rsp+30]
"ShantaeHero64.exe"+10BE7F: 48 83 C4 20           -  add rsp,20
"ShantaeHero64.exe"+10BE83: 5F                    -  pop rdi
"ShantaeHero64.exe"+10BE84: E9 07 FB FF FF        -  jmp ShantaeHero64.exe+10B990
// ---------- INJECTING HERE ----------
"ShantaeHero64.exe"+10BE89: F3 0F 5C C8           -  subss xmm1,xmm0
"ShantaeHero64.exe"+10BE8D: E8 6E 03 00 00        -  call ShantaeHero64.exe+10C200
// ---------- DONE INJECTING  ----------
"ShantaeHero64.exe"+10BE92: 48 8B 5C 24 30        -  mov rbx,[rsp+30]
"ShantaeHero64.exe"+10BE97: 48 83 C4 20           -  add rsp,20
"ShantaeHero64.exe"+10BE9B: 5F                    -  pop rdi
"ShantaeHero64.exe"+10BE9C: C3                    -  ret
"ShantaeHero64.exe"+10BE9D: CC                    -  int 3
"ShantaeHero64.exe"+10BE9E: CC                    -  int 3
"ShantaeHero64.exe"+10BE9F: CC                    -  int 3
"ShantaeHero64.exe"+10BEA0: 48 89 5C 24 08        -  mov [rsp+08],rbx
"ShantaeHero64.exe"+10BEA5: 48 89 74 24 10        -  mov [rsp+10],rsi
"ShantaeHero64.exe"+10BEAA: 57                    -  push rdi
}
  • Like
Reactions: Kleon742
Author
ChrisFayte
Downloads
0
Views
103
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from ChrisFayte

Community Mods