 |
Cheat Engine The Official Site of Cheat Engine
|
| View previous topic :: View next topic |
| Author |
Message |
CassiOwOpeia Newbie cheater
Reputation: 0
Joined: 29 Nov 2018 Posts: 18 Location: France
|
Posted: Mon Dec 17, 2018 10:55 am Post subject: Cheat Engine Tutorial - My cheat table |
|
|
Create by G2
Scripts by me
64 bits and 64 bits scripts create by Aqua
| Code: | <?xml version="1.0" encoding="utf-8"?>
<CheatTable CheatEngineTableVersion="27">
<CheatEntries>
<CheatEntry>
<ID>0</ID>
<Description>"32 bits ("Tutorial-i386.exe")"</Description>
<Options moHideChildren="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>FF00FF</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>1</ID>
<Description>"Script"</Description>
<Options moHideChildren="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>FF0000</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>6</ID>
<Description>"Step 2: Exact Value scanning (PW=090453)"</Description>
<Options moHideChildren="1" moDeactivateChildrenAsWell="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>000080</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>8</ID>
<Description>"Health"</Description>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>define(address,"Tutorial-i386.exe"+23E20)
define(bytes,89 83 80 04 00 00)
[ENABLE]
assert(address,bytes)
alloc(newmem,$1000)
label(code)
label(return)
newmem:
code:
mov [ebx+00000480],#1000
jmp return
address:
jmp newmem
nop
return:
[DISABLE]
address:
db bytes
dealloc(newmem)
</AssemblerScript>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>9</ID>
<Description>"Step 3: Unknown initial value (PW=419482)"</Description>
<Options moHideChildren="1" moDeactivateChildrenAsWell="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>008000</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>14</ID>
<Description>"Health"</Description>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>define(address,"Tutorial-i386.exe"+24306)
define(bytes,29 9E 84 04 00 00)
[ENABLE]
assert(address,bytes)
alloc(newmem,$1000)
label(code)
label(return)
newmem:
code:
mov [esi+00000484],#5000
jmp return
address:
jmp newmem
nop
return:
[DISABLE]
address:
db bytes
dealloc(newmem)
</AssemblerScript>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>19</ID>
<Description>"Step 4: Floating points (PW=890124)"</Description>
<Options moHideChildren="1" moDeactivateChildrenAsWell="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>008080</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>21</ID>
<Description>"Health"</Description>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>define(address,"Tutorial-i386.exe"+24B3F)
define(bytes,D9 9E 94 04 00 00)
[ENABLE]
assert(address,bytes)
alloc(newmem,$1000)
label(code)
label(return)
newmem:
code:
mov [esi+00000494],(float)5000
jmp return
address:
jmp newmem
nop
return:
[DISABLE]
address:
db bytes
dealloc(newmem)
</AssemblerScript>
</CheatEntry>
<CheatEntry>
<ID>22</ID>
<Description>"Ammo"</Description>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>define(address,"Tutorial-i386.exe"+24963)
define(bytes,DD 9B 98 04 00 00)
[ENABLE]
assert(address,bytes)
alloc(newmem,$1000)
label(code)
label(return)
label(value)
newmem:
fstp st(0)
fld qword ptr [value]
code:
fstp qword ptr [ebx+00000498]
jmp return
value:
dq (double)5000.00
address:
jmp newmem
nop
return:
[DISABLE]
address:
db bytes
dealloc(newmem)
</AssemblerScript>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>27</ID>
<Description>"Step 5: Code finder (PW=888899)"</Description>
<Options moHideChildren="1" moDeactivateChildrenAsWell="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>800000</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>29</ID>
<Description>"Value"</Description>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>define(address,"Tutorial-i386.exe"+24E08)
define(bytes,89 10 8B 45 F8)
[ENABLE]
assert(address,bytes)
alloc(newmem,$1000)
label(code)
label(return)
newmem:
code:
nop
nop
mov eax,[ebp-08]
jmp return
address:
jmp newmem
return:
[DISABLE]
address:
db bytes
dealloc(newmem)
</AssemblerScript>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>30</ID>
<Description>"Step 6: Pointers (PW=098712)"</Description>
<Options moHideChildren="1" moDeactivateChildrenAsWell="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>800080</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>35</ID>
<Description>"Pointer value"</Description>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>define(address,"Tutorial-i386.exe"+25221)
define(bytes,89 02 A1 30 16 60 00)
[ENABLE]
assert(address,bytes)
alloc(newmem,$1000)
label(code)
label(return)
newmem:
code:
nop
nop
mov eax,[Tutorial-i386.exe+201630]
jmp return
address:
jmp newmem
nop
nop
return:
[DISABLE]
address:
db bytes
dealloc(newmem)
</AssemblerScript>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>38</ID>
<Description>"Step 7: Code Injection (PW=013370)"</Description>
<Options moHideChildren="1" moDeactivateChildrenAsWell="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>808000</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>40</ID>
<Description>"Health"</Description>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>define(address,"Tutorial-i386.exe"+2585D)
define(bytes,83 AB 78 04 00 00 01)
[ENABLE]
assert(address,bytes)
alloc(newmem,$1000)
label(code)
label(return)
newmem:
code:
add dword ptr [ebx+00000478],02
jmp return
address:
jmp newmem
nop
nop
return:
[DISABLE]
address:
db bytes
dealloc(newmem)
</AssemblerScript>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>50</ID>
<Description>"Step 9: Shared code (PW=31337157)"</Description>
<Options moHideChildren="1" moDeactivateChildrenAsWell="1"/>
<LastState Value="" RealAddress="00000000"/>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>69</ID>
<Description>"God Mode"</Description>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>define(address,"Tutorial-i386.exe"+26857)
define(bytes,89 43 04 D9 EE)
[ENABLE]
assert(address,bytes)
alloc(newmem,$1000)
label(code)
label(return)
newmem:
cmp [ebx+10],2
je code
mov [ebx+04],(float)100
fldz
jmp return
code:
mov [ebx+04],eax
fldz
jmp return
address:
jmp newmem
return:
[DISABLE]
address:
db bytes
dealloc(newmem)
</AssemblerScript>
</CheatEntry>
<CheatEntry>
<ID>191</ID>
<Description>"One Hit Kill"</Description>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>define(address,"Tutorial-i386.exe"+26857)
define(bytes,89 43 04 D9 EE)
[ENABLE]
assert(address,bytes)
alloc(newmem,$1000)
label(code)
label(return)
newmem:
cmp [ebx+10],1
je code
mov [ebx+04],(float)0
fldz
jmp return
code:
mov [ebx+04],eax
fldz
jmp return
address:
jmp newmem
return:
[DISABLE]
address:
db bytes
dealloc(newmem)
</AssemblerScript>
</CheatEntry>
</CheatEntries>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>2</ID>
<Description>"Value"</Description>
<Options moHideChildren="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>0000FF</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>7</ID>
<Description>"Step 2: Exact Value scanning (PW=090453)"</Description>
<Options moHideChildren="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>000080</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>5</ID>
<Description>"Health"</Description>
<VariableType>4 Bytes</VariableType>
<Address>"Tutorial-i386.exe"+2015D0</Address>
<Offsets>
<Offset>480</Offset>
</Offsets>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>10</ID>
<Description>"Step 3: Unknown initial value (PW=419482)"</Description>
<Options moHideChildren="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>008000</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>13</ID>
<Description>"Health"</Description>
<VariableType>4 Bytes</VariableType>
<Address>"Tutorial-i386.exe"+2015E0</Address>
<Offsets>
<Offset>484</Offset>
</Offsets>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>20</ID>
<Description>"Step 4: Floating points (PW=890124)"</Description>
<Options moHideChildren="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>008080</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>17</ID>
<Description>"Health"</Description>
<VariableType>Float</VariableType>
<Address>"Tutorial-i386.exe"+201600</Address>
<Offsets>
<Offset>494</Offset>
</Offsets>
</CheatEntry>
<CheatEntry>
<ID>18</ID>
<Description>"Ammo"</Description>
<VariableType>Double</VariableType>
<Address>"Tutorial-i386.exe"+201600</Address>
<Offsets>
<Offset>498</Offset>
</Offsets>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>28</ID>
<Description>"Step 5: Code finder (PW=888899)"</Description>
<Options moHideChildren="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>800000</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>26</ID>
<Description>"Value"</Description>
<VariableType>4 Bytes</VariableType>
<Address>"Tutorial-i386.exe"+201610</Address>
<Offsets>
<Offset>0</Offset>
<Offset>478</Offset>
</Offsets>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>31</ID>
<Description>"Step 6: Pointers (PW=098712)"</Description>
<Options moHideChildren="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>800080</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>34</ID>
<Description>"Pointer value"</Description>
<VariableType>4 Bytes</VariableType>
<Address>"Tutorial-i386.exe"+201630</Address>
<Offsets>
<Offset>0</Offset>
</Offsets>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>39</ID>
<Description>"Step 7: Code Injection (PW=013370)"</Description>
<Options moHideChildren="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>808000</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>37</ID>
<Description>"Health"</Description>
<VariableType>4 Bytes</VariableType>
<Address>"Tutorial-i386.exe"+201640</Address>
<Offsets>
<Offset>478</Offset>
</Offsets>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>49</ID>
<Description>"Step 8: Multilevel pointers (PW=525927)"</Description>
<Options moHideChildren="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>808080</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>47</ID>
<Description>"Pointer value"</Description>
<VariableType>4 Bytes</VariableType>
<Address>"Tutorial-i386.exe"+201660</Address>
<Offsets>
<Offset>18</Offset>
<Offset>0</Offset>
<Offset>14</Offset>
<Offset>0C</Offset>
</Offsets>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>51</ID>
<Description>"Step 9: Shared code (PW=31337157)"</Description>
<Options moHideChildren="1"/>
<LastState Value="" RealAddress="00000000"/>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>56</ID>
<Description>"Player 1: Dave (Health)"</Description>
<VariableType>Float</VariableType>
<Address>"Tutorial-i386.exe"+201670</Address>
<Offsets>
<Offset>04</Offset>
<Offset>4CC</Offset>
</Offsets>
</CheatEntry>
<CheatEntry>
<ID>60</ID>
<Description>"Player 2: Eric (Health)"</Description>
<VariableType>Float</VariableType>
<Address>"Tutorial-i386.exe"+201670</Address>
<Offsets>
<Offset>04</Offset>
<Offset>4d0</Offset>
</Offsets>
</CheatEntry>
<CheatEntry>
<ID>66</ID>
<Description>"C. Player 3: HAL (Health)"</Description>
<VariableType>Float</VariableType>
<Address>"Tutorial-i386.exe"+201670</Address>
<Offsets>
<Offset>04</Offset>
<Offset>4D4</Offset>
</Offsets>
</CheatEntry>
<CheatEntry>
<ID>68</ID>
<Description>"C. Player 4: KITT (Health)"</Description>
<VariableType>Float</VariableType>
<Address>"Tutorial-i386.exe"+201670</Address>
<Offsets>
<Offset>04</Offset>
<Offset>4D8</Offset>
</Offsets>
</CheatEntry>
</CheatEntries>
</CheatEntry>
</CheatEntries>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>70</ID>
<Description>"64 bits ("Tutorial-x86_64.exe")"</Description>
<Options moHideChildren="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>8000FF</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>71</ID>
<Description>"Script"</Description>
<Options moHideChildren="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>FF0000</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>72</ID>
<Description>"Step 2: Exact Value scanning (PW=090453)"</Description>
<Options moHideChildren="1" moDeactivateChildrenAsWell="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>000080</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>99</ID>
<Description>"Health"</Description>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>define(address,"Tutorial-x86_64.exe"+2B237)
define(bytes,29 93 90 07 00 00)
[ENABLE]
assert(address,bytes)
alloc(newmem,$1000,"Tutorial-x86_64.exe"+2B237)
label(code)
label(return)
newmem:
code:
mov [rbx+00000790],#1000
jmp return
address:
jmp newmem
nop
return:
[DISABLE]
address:
db bytes
dealloc(newmem)
</AssemblerScript>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>74</ID>
<Description>"Step 3: Unknown initial value (PW=419482)"</Description>
<Options moHideChildren="1" moDeactivateChildrenAsWell="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>008000</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>103</ID>
<Description>"Health"</Description>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>define(address,"Tutorial-x86_64.exe"+2B825)
define(bytes,29 9E 98 07 00 00)
[ENABLE]
assert(address,bytes)
alloc(newmem,$1000,"Tutorial-x86_64.exe"+2B825)
label(code)
label(return)
newmem:
code:
mov [rsi+00000798],#5000
jmp return
address:
jmp newmem
nop
return:
[DISABLE]
address:
db bytes
dealloc(newmem)
</AssemblerScript>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>76</ID>
<Description>"Step 4: Floating points (PW=890124)"</Description>
<Options moHideChildren="1" moDeactivateChildrenAsWell="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>008080</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>109</ID>
<Description>"Health"</Description>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>define(address,"Tutorial-x86_64.exe"+2C283)
define(bytes,F3 0F 11 8E B8 07 00 00)
[ENABLE]
assert(address,bytes)
alloc(newmem,$1000,"Tutorial-x86_64.exe"+2C283)
label(code)
label(return)
newmem:
code:
mov [rsi+000007B8],(float)5000
jmp return
address:
jmp newmem
nop
nop
nop
return:
[DISABLE]
address:
db bytes
dealloc(newmem)
</AssemblerScript>
</CheatEntry>
<CheatEntry>
<ID>110</ID>
<Description>"Ammo"</Description>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>define(address,"Tutorial-x86_64.exe"+2C05C)
define(bytes,F2 0F 11 83 C0 07 00 00)
[ENABLE]
assert(address,bytes)
alloc(newmem,$1000,"Tutorial-x86_64.exe"+2C05C)
label(code)
label(return)
newmem:
code:
push r8
mov r8,(double)5000.00
mov [rbx+000007C0],r8
pop r8
jmp return
address:
jmp newmem
nop
nop
nop
return:
[DISABLE]
address:
db bytes
dealloc(newmem)
</AssemblerScript>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>79</ID>
<Description>"Step 5: Code finder (PW=888899)"</Description>
<Options moHideChildren="1" moDeactivateChildrenAsWell="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>800000</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>115</ID>
<Description>"Value"</Description>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>define(address,"Tutorial-x86_64.exe"+2C600)
define(bytes,89 10 48 8B 45 F0)
[ENABLE]
assert(address,bytes)
alloc(newmem,$1000,"Tutorial-x86_64.exe"+2C600)
label(code)
label(return)
newmem:
code:
nop
nop
mov rax,[rbp-10]
jmp return
address:
jmp newmem
nop
return:
[DISABLE]
address:
db bytes
dealloc(newmem)
</AssemblerScript>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>81</ID>
<Description>"Step 6: Pointers (PW=098712)"</Description>
<Options moHideChildren="1" moDeactivateChildrenAsWell="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>800080</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>119</ID>
<Description>"Pointer value"</Description>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>define(address,"Tutorial-x86_64.exe"+2CAEC)
define(bytes,89 02 48 8B 05 4B FF 29 00)
[ENABLE]
assert(address,bytes)
alloc(newmem,$1000,"Tutorial-x86_64.exe"+2CAEC)
label(code)
label(return)
newmem:
code:
nop
nop
mov rax,[Tutorial-x86_64.exe+2CCA40]
jmp return
address:
jmp newmem
nop
nop
nop
nop
return:
[DISABLE]
address:
db bytes
dealloc(newmem)
</AssemblerScript>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>83</ID>
<Description>"Step 7: Code Injection (PW=013370)"</Description>
<Options moHideChildren="1" moDeactivateChildrenAsWell="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>808000</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>123</ID>
<Description>"Health"</Description>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>define(address,"Tutorial-x86_64.exe"+2D27B)
define(bytes,83 AE 80 07 00 00 01)
[ENABLE]
assert(address,bytes)
alloc(newmem,$1000,"Tutorial-x86_64.exe"+2D27B)
label(code)
label(return)
newmem:
code:
add dword ptr [rsi+00000780],02
jmp return
address:
jmp newmem
nop
nop
return:
[DISABLE]
address:
db bytes
dealloc(newmem)
</AssemblerScript>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>86</ID>
<Description>"Step 9: Shared code (PW=31337157)"</Description>
<Options moHideChildren="1" moDeactivateChildrenAsWell="1"/>
<LastState Value="" RealAddress="00000000"/>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>144</ID>
<Description>"God Mode"</Description>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>define(address,"Tutorial-x86_64.exe"+2E587)
define(bytes,F3 0F 11 43 08)
[ENABLE]
assert(address,bytes)
alloc(newmem,$1000,"Tutorial-x86_64.exe"+2E587)
label(code)
label(return)
newmem:
cmp [rbx+14],1
jne code
movsd xmm0,[rbx+08]
movss [rbx+08],xmm0
code:
movss [rbx+08],xmm0
jmp return
address:
jmp newmem
return:
[DISABLE]
address:
db bytes
dealloc(newmem)
</AssemblerScript>
</CheatEntry>
<CheatEntry>
<ID>192</ID>
<Description>"One Hit Kill"</Description>
<LastState/>
<VariableType>Auto Assembler Script</VariableType>
<AssemblerScript>define(address,"Tutorial-x86_64.exe"+2E587)
define(bytes,F3 0F 11 43 08)
[ENABLE]
assert(address,bytes)
alloc(newmem,$1000,"Tutorial-x86_64.exe"+2E587)
label(code)
label(return)
label(value)
newmem:
cmp [rbx+14],2
jne code
movss xmm0,[value]
movss [rbx+08],xmm0
code:
movss [rbx+08],xmm0
jmp return
value:
dd (float)0.00
address:
jmp newmem
return:
[DISABLE]
address:
db bytes
dealloc(newmem)
</AssemblerScript>
</CheatEntry>
</CheatEntries>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>87</ID>
<Description>"Value"</Description>
<Options moHideChildren="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>0000FF</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>88</ID>
<Description>"Step 2: Exact Value scanning (PW=090453)"</Description>
<Options moHideChildren="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>000080</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>98</ID>
<Description>"Health"</Description>
<VariableType>4 Bytes</VariableType>
<Address>"Tutorial-x86_64.exe"+2CC9E0</Address>
<Offsets>
<Offset>790</Offset>
</Offsets>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>89</ID>
<Description>"Step 3: Unknown initial value (PW=419482)"</Description>
<Options moHideChildren="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>008000</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>102</ID>
<Description>"Health"</Description>
<VariableType>4 Bytes</VariableType>
<Address>"Tutorial-x86_64.exe"+2CC9F0</Address>
<Offsets>
<Offset>798</Offset>
</Offsets>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>90</ID>
<Description>"Step 4: Floating points (PW=890124)"</Description>
<Options moHideChildren="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>008080</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>107</ID>
<Description>"Health"</Description>
<VariableType>Float</VariableType>
<Address>"Tutorial-x86_64.exe"+2CCA10</Address>
<Offsets>
<Offset>7B8</Offset>
</Offsets>
</CheatEntry>
<CheatEntry>
<ID>108</ID>
<Description>"Ammo"</Description>
<VariableType>Double</VariableType>
<Address>"Tutorial-x86_64.exe"+2CCA10</Address>
<Offsets>
<Offset>7C0</Offset>
</Offsets>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>91</ID>
<Description>"Step 5: Code finder (PW=888899)"</Description>
<Options moHideChildren="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>800000</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>114</ID>
<Description>"Value"</Description>
<VariableType>4 Bytes</VariableType>
<Address>"Tutorial-x86_64.exe"+2CCA20</Address>
<Offsets>
<Offset>0</Offset>
<Offset>780</Offset>
</Offsets>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>92</ID>
<Description>"Step 6: Pointers (PW=098712)"</Description>
<Options moHideChildren="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>800080</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>118</ID>
<Description>"Pointer value"</Description>
<VariableType>4 Bytes</VariableType>
<Address>"Tutorial-x86_64.exe"+2CCA40</Address>
<Offsets>
<Offset>0</Offset>
</Offsets>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>93</ID>
<Description>"Step 7: Code Injection (PW=013370)"</Description>
<Options moHideChildren="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>808000</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>122</ID>
<Description>"Health"</Description>
<VariableType>4 Bytes</VariableType>
<Address>"Tutorial-x86_64.exe"+2CCA50</Address>
<Offsets>
<Offset>780</Offset>
</Offsets>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>94</ID>
<Description>"Step 8: Multilevel pointers (PW=525927)"</Description>
<Options moHideChildren="1"/>
<LastState Value="" RealAddress="00000000"/>
<Color>808080</Color>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>129</ID>
<Description>"Pointer value"</Description>
<VariableType>4 Bytes</VariableType>
<Address>"Tutorial-x86_64.exe"+2CCA70</Address>
<Offsets>
<Offset>18</Offset>
<Offset>0</Offset>
<Offset>18</Offset>
<Offset>10</Offset>
</Offsets>
</CheatEntry>
</CheatEntries>
</CheatEntry>
<CheatEntry>
<ID>95</ID>
<Description>"Step 9: Shared code (PW=31337157)"</Description>
<Options moHideChildren="1"/>
<LastState Value="" RealAddress="00000000"/>
<GroupHeader>1</GroupHeader>
<CheatEntries>
<CheatEntry>
<ID>137</ID>
<Description>"Player 1: Dave (Health)"</Description>
<VariableType>Float</VariableType>
<Address>"Tutorial-x86_64.exe"+2CCA80</Address>
<Offsets>
<Offset>8</Offset>
<Offset>828</Offset>
</Offsets>
</CheatEntry>
<CheatEntry>
<ID>139</ID>
<Description>"Player 2: Eric (Health)"</Description>
<VariableType>Float</VariableType>
<Address>"Tutorial-x86_64.exe"+2CCA80</Address>
<Offsets>
<Offset>8</Offset>
<Offset>830</Offset>
</Offsets>
</CheatEntry>
<CheatEntry>
<ID>141</ID>
<Description>"C. Player 3: HAL"</Description>
<VariableType>Float</VariableType>
<Address>"Tutorial-x86_64.exe"+2CCA80</Address>
<Offsets>
<Offset>8</Offset>
<Offset>838</Offset>
</Offsets>
</CheatEntry>
<CheatEntry>
<ID>143</ID>
<Description>"C. Player 4: KITT"</Description>
<VariableType>Float</VariableType>
<Address>"Tutorial-x86_64.exe"+2CCA80</Address>
<Offsets>
<Offset>8</Offset>
<Offset>840</Offset>
</Offsets>
</CheatEntry>
</CheatEntries>
</CheatEntry>
</CheatEntries>
</CheatEntry>
</CheatEntries>
</CheatEntry>
</CheatEntries>
<UserdefinedSymbols/>
<Structures StructVersion="2">
<Structure Name="unnamed structure" AutoFill="0" AutoCreate="1" DefaultHex="0" AutoDestroy="0" DoNotSaveLocal="0" RLECompression="1" AutoCreateStructsize="4096">
<Elements>
<Element Offset="0" Vartype="Pointer" Bytesize="8" DisplayMethod="Unsigned Integer"/>
<Element Offset="4" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
<Element Offset="8" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
<Element Offset="12" Vartype="Pointer" Bytesize="8" DisplayMethod="Unsigned Integer"/>
<Element Offset="16" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
<Element Offset="20" Vartype="Byte" Bytesize="1" DisplayMethod="Unsigned Integer"/>
<Element Offset="21" Vartype="String" Bytesize="5" DisplayMethod="Unsigned Integer"/>
<Element Offset="26" Vartype="Byte" Bytesize="1" RLECount="2" DisplayMethod="Unsigned Integer"/>
<Element Offset="28" Vartype="4 Bytes" Bytesize="4" RLECount="14" DisplayMethod="Unsigned Integer"/>
<Element Offset="84" Vartype="Pointer" Bytesize="8" DisplayMethod="Unsigned Integer"/>
<Element Offset="88" Vartype="Pointer" Bytesize="8" DisplayMethod="Unsigned Integer"/>
<Element Offset="92" Vartype="4 Bytes" Bytesize="4" RLECount="1001" DisplayMethod="Unsigned Integer"/>
</Elements>
</Structure>
<Structure Name="unnamed structure 2" AutoFill="0" AutoCreate="1" DefaultHex="0" AutoDestroy="0" DoNotSaveLocal="0" RLECompression="1" AutoCreateStructsize="4096">
<Elements>
<Element Offset="0" Vartype="Pointer" Bytesize="8" DisplayMethod="Unsigned Integer"/>
<Element Offset="8" Vartype="Float" Bytesize="4" DisplayMethod="Unsigned Integer"/>
<Element Offset="12" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
<Element Offset="16" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Hexadecimal"/>
<Element Offset="20" Vartype="4 Bytes" Bytesize="4" DisplayMethod="Unsigned Integer"/>
<Element Offset="24" Vartype="Byte" Bytesize="1" DisplayMethod="Unsigned Integer"/>
<Element Offset="25" Vartype="String" Bytesize="5" DisplayMethod="Unsigned Integer"/>
<Element Offset="30" Vartype="Byte" Bytesize="1" RLECount="2" DisplayMethod="Unsigned Integer"/>
<Element Offset="32" Vartype="4 Bytes" Bytesize="4" RLECount="14" DisplayMethod="Unsigned Integer"/>
<Element Offset="88" Vartype="Pointer" Bytesize="8" RLECount="2" DisplayMethod="Unsigned Integer"/>
<Element Offset="104" Vartype="4 Bytes" Bytesize="4" RLECount="998" DisplayMethod="Unsigned Integer"/>
</Elements>
</Structure>
</Structures>
</CheatTable>
|
Last edited by CassiOwOpeia on Fri Dec 21, 2018 1:50 pm; edited 6 times in total |
|
| Back to top |
|
 |
OldCheatEngineUser Whateven rank
Reputation: 20
Joined: 01 Feb 2016 Posts: 1586
|
|
| Back to top |
|
 |
CassiOwOpeia Newbie cheater
Reputation: 0
Joined: 29 Nov 2018 Posts: 18 Location: France
|
Posted: Fri Dec 21, 2018 1:30 pm Post subject: |
|
|
Thanks man !
|
|
| Back to top |
|
 |
|
|
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum You cannot attach files in this forum You can download files in this forum
|
|