Tales of Zestiria Cheat Table - God Mode +16

Tales of Zestiria Cheat Table - God Mode +16 2020-07-22

Login to enable download
Hexui Undetected CSGO Cheats Sinkicheat PUBG Cheat
Tales of Zestiria Cheat Table
1595459395696.png


Features

  • God Mode
  • Infinite Magic
  • Experience
  • Attribute Points
  • One Hit Kills
  • Fast Level Ups
  • Attack points
  • Armor Defense
  • Sorey Magic
  • Sorey Magic Defense
  • Focus points
  • One Hit Kills
  • Gold hack
Scripts
Hero Stats:
[ENABLE]

aobscanmodule(health1,Tales of Zestiria.exe,8B 43 0C 52 50 56) // should be unique
alloc(newmem,$1000)
alloc(newmem,$1000)
alloc(sorey_stat,2048)
registersymbol(sorey_stat)

label(code)
label(hero)
label(return)

sorey_stat:

newmem:
cmp [ebx+1C],0
je code
cmp [ebx+2CCC],0
je hero


hero:
push ecx
mov [sorey_stat],ebx
mov ecx,[ebx+2BFC]
mov [ebx+0C],ecx
pop ecx
mov eax,[ebx+0C]
  push edx
  push eax
  jmp return

code:
  mov eax,[ebx+0C]
  push edx
  push eax
  jmp return

health1:
  jmp newmem
return:
registersymbol(health1)

[DISABLE]

health1:
  db 8B 43 0C 52 50

unregistersymbol(health1)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "Tales of Zestiria.exe"+5C1D6

"Tales of Zestiria.exe"+5C1B1: C6 44 24 1C 00           -  mov byte ptr [esp+1C],00
"Tales of Zestiria.exe"+5C1B6: 74 05                    -  je "Tales of Zestiria.exe"+5C1BD
"Tales of Zestiria.exe"+5C1B8: C6 44 24 1C 01           -  mov byte ptr [esp+1C],01
"Tales of Zestiria.exe"+5C1BD: 8B 19                    -  mov ebx,[ecx]
"Tales of Zestiria.exe"+5C1BF: D9 80 A0 05 00 00        -  fld dword ptr [eax+000005A0]
"Tales of Zestiria.exe"+5C1C5: 8B 4C 24 1C              -  mov ecx,[esp+1C]
"Tales of Zestiria.exe"+5C1C9: 51                       -  push ecx
"Tales of Zestiria.exe"+5C1CA: E8 71 60 7B 00           -  call "Tales of Zestiria.exe"+812240
"Tales of Zestiria.exe"+5C1CF: 8B 93 FC 2B 00 00        -  mov edx,[ebx+00002BFC]
"Tales of Zestiria.exe"+5C1D5: 50                       -  push eax
// ---------- INJECTING HERE ----------
"Tales of Zestiria.exe"+5C1D6: 8B 43 0C                 -  mov eax,[ebx+0C]
"Tales of Zestiria.exe"+5C1D9: 52                       -  push edx
"Tales of Zestiria.exe"+5C1DA: 50                       -  push eax
// ---------- DONE INJECTING  ----------
"Tales of Zestiria.exe"+5C1DB: 56                       -  push esi
"Tales of Zestiria.exe"+5C1DC: E8 7F 8F FF FF           -  call "Tales of Zestiria.exe"+55160
"Tales of Zestiria.exe"+5C1E1: 8B 5C 24 20              -  mov ebx,[esp+20]
"Tales of Zestiria.exe"+5C1E5: C6 46 34 00              -  mov byte ptr [esi+34],00
"Tales of Zestiria.exe"+5C1E9: 8B 47 0C                 -  mov eax,[edi+0C]
"Tales of Zestiria.exe"+5C1EC: 8B 48 2C                 -  mov ecx,[eax+2C]
"Tales of Zestiria.exe"+5C1EF: D9 40 28                 -  fld dword ptr [eax+28]
"Tales of Zestiria.exe"+5C1F2: D9 59 28                 -  fstp dword ptr [ecx+28]
"Tales of Zestiria.exe"+5C1F5: 8B 48 20                 -  mov ecx,[eax+20]
"Tales of Zestiria.exe"+5C1F8: 8B 50 24                 -  mov edx,[eax+24]
}
One Hit Kills:
[ENABLE]

aobscanmodule(att1,Tales of Zestiria.exe,8B 8E 08 2C 00 00)
alloc(newmem,$1000)
aobscanmodule(att2,Tales of Zestiria.exe,8B 80 08 2C 00 00)
alloc(newmema,$1000)

label(code)
label(return)
label(codea)
label(returna)

newmem:
cmp [esi+00002CCC],0 //EC 2/0
je code
mov [esi+00002C08],270F
mov [esi+00002C10],270F
mov ecx,[esi+00002C08]
  jmp return

code:
  mov ecx,[esi+00002C08]
  jmp return

att1:
  jmp newmem
  nop
return:
registersymbol(att1)

newmema:
cmp [eax+00002CCC],0 //EC 2/0
je codea
mov [eax+00002C08],270F
mov eax,[eax+00002C08]
  jmp returna

codea:
  mov eax,[eax+00002C08]
  jmp returna

att2:
  jmp newmema
  nop
returna:
registersymbol(att2)

[DISABLE]

att1:
  db 8B 8E 08 2C 00 00
att2:
  db 8B 80 08 2C 00 00

unregistersymbol(att2)
unregistersymbol(att1)
dealloc(newmem)
dealloc(newmema)

{
// ORIGINAL CODE - INJECTION POINT: "Tales of Zestiria.exe"+1202A3

"Tales of Zestiria.exe"+120298: CC                    -  int 3
"Tales of Zestiria.exe"+120299: CC                    -  int 3
"Tales of Zestiria.exe"+12029A: CC                    -  int 3
"Tales of Zestiria.exe"+12029B: CC                    -  int 3
"Tales of Zestiria.exe"+12029C: CC                    -  int 3
"Tales of Zestiria.exe"+12029D: CC                    -  int 3
"Tales of Zestiria.exe"+12029E: CC                    -  int 3
"Tales of Zestiria.exe"+12029F: CC                    -  int 3
"Tales of Zestiria.exe"+1202A0: 56                    -  push esi
"Tales of Zestiria.exe"+1202A1: 8B 30                 -  mov esi,[eax]
// ---------- INJECTING HERE ----------
"Tales of Zestiria.exe"+1202A3: 8B 8E 08 2C 00 00     -  mov ecx,[esi+00002C08]
// ---------- DONE INJECTING  ----------
"Tales of Zestiria.exe"+1202A9: B8 01 00 00 00        -  mov eax,00000001
"Tales of Zestiria.exe"+1202AE: 39 86 F8 42 00 00     -  cmp [esi+000042F8],eax
"Tales of Zestiria.exe"+1202B4: 75 1F                 -  jne "Tales of Zestiria.exe"+1202D5
"Tales of Zestiria.exe"+1202B6: 8B 15 E4 B2 12 02     -  mov edx,["Tales of Zestiria.exe"+1D2B2E4]
"Tales of Zestiria.exe"+1202BC: 8B 42 08              -  mov eax,[edx+08]
"Tales of Zestiria.exe"+1202BF: 8B 10                 -  mov edx,[eax]
"Tales of Zestiria.exe"+1202C1: 8B 14 95 B8 2C D5 00  -  mov edx,[edx*4+"Tales of Zestiria.exe"+952CB8]
"Tales of Zestiria.exe"+1202C8: 03 96 FC 42 00 00     -  add edx,[esi+000042FC]
"Tales of Zestiria.exe"+1202CE: B8 1F 85 EB 51        -  mov eax,51EB851F
"Tales of Zestiria.exe"+1202D3: EB 25                 -  jmp "Tales of Zestiria.exe"+1202FA
}
Fast Level Ups:
[ENABLE]

aobscanmodule(lvl3,Tales of Zestiria.exe,8B 46 1C 03 C1) // should be unique
alloc(newmem,$1000)

label(code)
label(1vl19_inc)
label(lcl39_inc)
label(lvl60_inc)
//label(lvl_max)
label(return)

newmem:
//cmp [esi+2CCC],00 //enable for Sorey only
//je code
cmp [esi+1C],05F5E0FF
jge code
cmp [esi+08],13
jge 1vl19_inc
add [esi+1C],2525

code:
  mov eax,[esi+1C]
  add eax,ecx
  jmp return

1vl19_inc:
cmp [esi+08],27
jge lcl39_inc
add [esi+1C],4525
mov eax,[esi+1C]
  add eax,ecx
  jmp return

lcl39_inc:
cmp [esi+08],3C
jge lvl60_inc
add [esi+1C],6525
mov eax,[esi+1C]
  add eax,ecx
  jmp return

lvl60_inc:
{cmp [esi+08],6D
jge lvl_max}
add [esi+1C],1507C
mov eax,[esi+1C]
  add eax,ecx
  jmp return

{lvl_max:
cmp [esi+08],C8
jge code
add [esi+1C],17D783F
mov eax,[esi+1C]
  add eax,ecx
  jmp return}




lvl3:
  jmp newmem
return:
registersymbol(lvl3)

[DISABLE]

lvl3:
  db 8B 46 1C 03 C1

unregistersymbol(lvl3)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "Tales of Zestiria.exe"+11F1CE

"Tales of Zestiria.exe"+11F1BE: CC                    -  int 3
"Tales of Zestiria.exe"+11F1BF: CC                    -  int 3
"Tales of Zestiria.exe"+11F1C0: 55                    -  push ebp
"Tales of Zestiria.exe"+11F1C1: 8B EC                 -  mov ebp,esp
"Tales of Zestiria.exe"+11F1C3: 83 EC 34              -  sub esp,34
"Tales of Zestiria.exe"+11F1C6: 53                    -  push ebx
"Tales of Zestiria.exe"+11F1C7: 56                    -  push esi
"Tales of Zestiria.exe"+11F1C8: 57                    -  push edi
"Tales of Zestiria.exe"+11F1C9: 8B 7D 08              -  mov edi,[ebp+08]
"Tales of Zestiria.exe"+11F1CC: 8B 37                 -  mov esi,[edi]
// ---------- INJECTING HERE ----------
"Tales of Zestiria.exe"+11F1CE: 8B 46 1C              -  mov eax,[esi+1C]
"Tales of Zestiria.exe"+11F1D1: 03 C1                 -  add eax,ecx
// ---------- DONE INJECTING  ----------
"Tales of Zestiria.exe"+11F1D3: 89 45 CC              -  mov [ebp-34],eax
"Tales of Zestiria.exe"+11F1D6: 79 09                 -  jns "Tales of Zestiria.exe"+11F1E1
"Tales of Zestiria.exe"+11F1D8: C7 45 F0 00 00 00 00  -  mov [ebp-10],00000000
"Tales of Zestiria.exe"+11F1DF: EB 11                 -  jmp "Tales of Zestiria.exe"+11F1F2
"Tales of Zestiria.exe"+11F1E1: C7 45 F0 FF E0 F5 05  -  mov [ebp-10],05F5E0FF
"Tales of Zestiria.exe"+11F1E8: 3D FF E0 F5 05        -  cmp eax,05F5E0FF
"Tales of Zestiria.exe"+11F1ED: 7F 03                 -  jg "Tales of Zestiria.exe"+11F1F2
"Tales of Zestiria.exe"+11F1EF: 89 45 F0              -  mov [ebp-10],eax
"Tales of Zestiria.exe"+11F1F2: 8B 5E 08              -  mov ebx,[esi+08]
"Tales of Zestiria.exe"+11F1F5: 8B 15 AC D2 12 02     -  mov edx,["Tales of Zestiria.exe"+1D2D2AC]
}
  • Like
Reactions: Kleon742
Author
ChrisFayte
Downloads
0
Views
49
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from ChrisFayte

Community Mods