3
"enable"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
//vng21092's aobscan lua script
{$lua}
function lua_aobscan(name,module,bytes,index)
index = index - 1
if(module == "") then
local resultSet = AOBScan(bytes)
if(resultSet == nil) then
unregisterSymbol(name)
print(name.." not found")
else
unregisterSymbol(name)
registerSymbol(name,resultSet[index])
resultSet.destroy()
end
else
if(getModuleSize(module) == nil) then
print("Module "..module.." not found")
else
local memScanner = createMemScan()
local memFoundList = createFoundList(memScanner)
memScanner.firstScan(
soExactValue,vtByteArray,rtRounded,bytes,nil,
getAddress(module),(getAddress(module)+getModuleSize(module)),"",
fsmNotAligned,"",true,false,false,false)
memScanner.waitTillDone()
memFoundList.initialize()
if(memFoundList.Count == 0) then
unregisterSymbol(name)
print(name.." in module "..module.." not found")
else
unregisterSymbol(name)
registerSymbol(name,memFoundList.Address[index])
end
memScanner.destroy()
memFoundList.destroy()
end
end
end
{$asm}
aobscanmodule(playerHealthReadCaller,BloodstainedRotN-Win64-Shipping.exe,49 8B ** ** ** 00 00 66 0F ** ** ** ** 00 00 0F ** ** F3 ** ** ** ** ** ** ** 0F ** ** 74)
registersymbol(playerHealthReadCaller)
label(pPlayer)
registersymbol(pPlayer)
alloc(newmem,2048,playerHealthReadCaller) //"BloodstainedRotN-Win64-Shipping.exe"+9ADED8)
label(returnhere)
label(originalcode_playerHealthReadCaller)
registersymbol(originalcode_playerHealthReadCaller)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov rax,pPlayer
mov [rax],rcx
mov [rax+8],r15
originalcode_playerHealthReadCaller:
readmem(playerHealthReadCaller,7)
//mov rax,[r14+00000868]
exit:
jmp returnhere
///
pPlayer:
///
playerHealthReadCaller: //"BloodstainedRotN-Win64-Shipping.exe"+9ADED8:
jmp newmem
nop
nop
returnhere:
///********************************************///
aobscanmodule(goldReadOnMenuAccessAOB,BloodstainedRotN-Win64-Shipping.exe,4C ** ** ** ** 45 ** ** 8B ** ** ** 00 00 48 8B ** E8)
registersymbol(goldReadOnMenuAccessAOB)
label(pInv1)
registersymbol(pInv1)
alloc(newmem2,2048,goldReadOnMenuAccessAOB+8) //"BloodstainedRotN-Win64-Shipping.exe"+8FDA0A)
label(returnhere2)
label(originalcode2_goldReadOnMenuAccessAOB)
registersymbol(originalcode2_goldReadOnMenuAccessAOB)
label(exit2)
newmem2: //this is allocated memory, you have read,write,execute access
//place your code here
mov rcx,pInv1
mov [rcx],rax
originalcode2_goldReadOnMenuAccessAOB:
readmem(goldReadOnMenuAccessAOB+8,6)
//mov edx,[rax+00000254]
exit2:
jmp returnhere2
///
pInv1:
///
goldReadOnMenuAccessAOB+8: //"BloodstainedRotN-Win64-Shipping.exe"+8FDA0A:
jmp newmem2
nop
returnhere2:
///********************************************///
aobscanmodule(currentBulletReadCaller,BloodstainedRotN-Win64-Shipping.exe,49 ** ** ** ** 00 00 E8 ** ** ** ** 8B ** 44 8B ** EB)
registersymbol(currentBulletReadCaller)
label(pCurrentBullet)
registersymbol(pCurrentBullet)
alloc(newmem3,2048,currentBulletReadCaller+c) //"BloodstainedRotN-Win64-Shipping.exe"+9ADFD5)
label(returnhere3)
label(originalcode3_currentBulletReadCaller)
registersymbol(originalcode3_currentBulletReadCaller)
label(exit3)
newmem3: //this is allocated memory, you have read,write,execute access
//place your code here
mov r8,pCurrentBullet
mov [r8],rcx
originalcode3_currentBulletReadCaller:
readmem(currentBulletReadCaller+c,5)
//mov edx,eax
//mov r8d,ebx
exit3:
jmp returnhere3
///
pCurrentBullet:
///
currentBulletReadCaller+c: //"BloodstainedRotN-Win64-Shipping.exe"+9ADFD5:
jmp newmem3
returnhere3:
///********************************************///
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
playerHealthReadCaller: //"BloodstainedRotN-Win64-Shipping.exe"+9ADED8:
readmem(originalcode_playerHealthReadCaller,7)
//db 49 8B 86 68 08 00 00
//Alt: mov rax,[r14+00000868]
unregistersymbol(originalcode_playerHealthReadCaller)
unregistersymbol(pPlayer)
///********************************************///
dealloc(newmem2)
goldReadOnMenuAccessAOB+8: //"BloodstainedRotN-Win64-Shipping.exe"+8FDA0A:
readmem(originalcode2_goldReadOnMenuAccessAOB,6)
//db 8B 90 54 02 00 00
//Alt: mov edx,[rax+00000254]
unregistersymbol(originalcode2_goldReadOnMenuAccessAOB)
unregistersymbol(pInv1)
///********************************************///
dealloc(newmem3)
currentBulletReadCaller+c: //"BloodstainedRotN-Win64-Shipping.exe"+9ADFD5:
readmem(originalcode3_currentBulletReadCaller,5)
//db 8B D0 44 8B C3
//Alt: mov edx,eax
//Alt: mov r8d,ebx
unregistersymbol(originalcode3_currentBulletReadCaller)
unregistersymbol(pCurrentBullet)
///********************************************///
4
"undead"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
define(dminhealth,#1)
aobscanmodule(healthCalOnHitAOB,BloodstainedRotN-Win64-Shipping.exe,E8 ** ** ** ** 84 C0 74 ** ** 00 00 00 00 48 ** ** ** ** 8B ** ** 8B ** 2B ** 0F)
registersymbol(healthCalOnHitAOB)
label(dMinHealth)
registersymbol(dMinHealth)
alloc(newmem,2048,healthCalOnHitAOB+13) //"BloodstainedRotN-Win64-Shipping.exe"+86641F)
label(returnhere)
label(originalcode_healthCalOnHitAOB)
registersymbol(originalcode_healthCalOnHitAOB)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov rcx,pPlayer
cmp [rcx],rbx
jne @f
readmem(healthCalOnHitAOB+13,1)
db 4B
readmem(healthCalOnHitAOB+15,1)
//mov ecx,[rbx+38]
readmem(healthCalOnHitAOB+18,2)
//sub ecx,esi
mov rdi,dMinHealth
cmp ecx,[rdi]
jge @f
mov ecx,[rdi]
add ecx,esi
db 89 4B
readmem(healthCalOnHitAOB+15,1)
//mov [rbx+38],ecx
originalcode_healthCalOnHitAOB:
readmem(healthCalOnHitAOB+13,5)
//mov edi,[rbx+38]
//mov ecx,edi
exit:
jmp returnhere
///
dMinHealth:
dd dminhealth
///
healthCalOnHitAOB+13: //"BloodstainedRotN-Win64-Shipping.exe"+86641F:
jmp newmem
returnhere:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
healthCalOnHitAOB+13: //"BloodstainedRotN-Win64-Shipping.exe"+86641F:
readmem(originalcode_healthCalOnHitAOB,5)
//db 8B 7B 38 8B CF
//Alt: mov edi,[rbx+38]
//Alt: mov ecx,edi
unregistersymbol(originalcode_healthCalOnHitAOB)
unregistersymbol(dMinHealth)
5
"min health"
008000
4 Bytes
dMinHealth
18
"ignore mp .5"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(equippedConjuredMPUsageChkAOB,BloodstainedRotN-Win64-Shipping.exe,E8 ** ** ** ** 0F 2F ** ** ** 00 00 0F 83 ** ** ** ** 48)
registersymbol(equippedConjuredMPUsageChkAOB)
label(dCurrentConjureMPUsage)
registersymbol(dCurrentConjureMPUsage)
alloc(newmem,2048,equippedConjuredMPUsageChkAOB+5) //"BloodstainedRotN-Win64-Shipping.exe"+801A3A)
label(returnhere)
label(originalcode_equippedConjuredMPUsageChkAOB)
registersymbol(originalcode_equippedConjuredMPUsageChkAOB)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
push rax
mov rax,pPlayer
cmp [rax],rcx
jne @f
db F3 0F 5F
readmem(equippedConjuredMPUsageChkAOB+7,5)
//maxss xmm0,[rsi+fc]
mov rax,dCurrentConjureMPUsage
addss xmm0,[rax+4]
movss [rax],xmm0
@@:
pop rax
originalcode_equippedConjuredMPUsageChkAOB:
readmem(equippedConjuredMPUsageChkAOB+5,7)
//comiss xmm0,[rsi+000000FC]
exit:
jmp returnhere
///
dCurrentConjureMPUsage:
dd 0
dd (float)2
///
equippedConjuredMPUsageChkAOB+5: //"BloodstainedRotN-Win64-Shipping.exe"+801A3A:
jmp newmem
nop
nop
returnhere:
///****************************************************///
aobscanmodule(mpReadCallerOnConjureAOB,BloodstainedRotN-Win64-Shipping.exe,75 ** 48 ** ** E8 ** ** ** ** 0F ** ** 48 8B ** 48 ** ** ** 48)
registersymbol(mpReadCallerOnConjureAOB)
alloc(newmem2,2048,mpReadCallerOnConjureAOB+5) //"BloodstainedRotN-Win64-Shipping.exe"+353100C)
label(returnhere2)
label(originalcode2_mpReadCallerOnConjureAOB)
registersymbol(originalcode2_mpReadCallerOnConjureAOB)
label(exit2)
newmem2: //this is allocated memory, you have read,write,execute access
//place your code here
reassemble(mpReadCallerOnConjureAOB+5)
//call BloodstainedRotN-Win64-Shipping.exe+7FBF10
mov rax,pPlayer
cmp [rax],rcx
jne @f
mov rax,dCurrentConjureMPUsage
maxss xmm0,[rax]
cvtps2dq xmm0,xmm0
movd [rcx+3c],xmm0
cvtdq2ps xmm0,xmm0
//mov rax,dCurrentConjureMPUsage
//maxss xmm0,[rax]
//maxss xmm0,xmm6
//cvtps2dq xmm0,xmm0
//movd [rcx+3c],xmm0
//cvtdq2ps xmm0,xmm0
@@:
jmp exit2
originalcode2_mpReadCallerOnConjureAOB:
readmem(mpReadCallerOnConjureAOB+5,5)
//call BloodstainedRotN-Win64-Shipping.exe+7FBF10
exit2:
jmp returnhere2
///
mpReadCallerOnConjureAOB+5: //"BloodstainedRotN-Win64-Shipping.exe"+353100C:
jmp newmem2
returnhere2:
///****************************************************///
aobscanmodule(equippedDirectionalMPUsageChkAOB,BloodstainedRotN-Win64-Shipping.exe,E8 ** ** ** ** 0F 2F ** ** ** 00 00 0F 83 ** ** ** ** 80)
registersymbol(equippedDirectionalMPUsageChkAOB)
label(dCurrentDirectionalMPUsage)
registersymbol(dCurrentDirectionalMPUsage)
alloc(newmem6,2048,equippedDirectionalMPUsageChkAOB+5) //"BloodstainedRotN-Win64-Shipping.exe"+8009D3)
label(returnhere6)
label(originalcode6_equippedDirectionalMPUsageChkAOB)
registersymbol(originalcode6_equippedDirectionalMPUsageChkAOB)
label(exit6)
newmem6: //this is allocated memory, you have read,write,execute access
//place your code here
push rax
mov rax,pPlayer
cmp [rax],rcx
jne @f
db F3 0F 5F
readmem(equippedDirectionalMPUsageChkAOB+7,5)
//maxss xmm0,[rsi+fc]
mov rax,dCurrentDirectionalMPUsage
addss xmm0,[rax+4]
movss [rax],xmm0
@@:
pop rax
originalcode6_equippedDirectionalMPUsageChkAOB:
readmem(equippedDirectionalMPUsageChkAOB+5,7)
//comiss xmm0,[rsi+000000FC]
exit6:
jmp returnhere6
///
dCurrentDirectionalMPUsage:
dd 0
dd (float)2
///
equippedDirectionalMPUsageChkAOB+5: //"BloodstainedRotN-Win64-Shipping.exe"+8009D3:
jmp newmem6
nop
nop
returnhere6:
///****************************************************///
luaCall(lua_aobscan("mpReadCallerOnDirectional1AOB","BloodstainedRotN-Win64-Shipping.exe","E8 ** ** ** ** 0F 28 ** E8 ** ** ** ** F3 0F ** ** ** ** 00 00 48",2))
alloc(newmem11,2048,mpReadCallerOnDirectional1AOB+5) //"BloodstainedRotN-Win64-Shipping.exe"+800DBF)
label(returnhere11)
label(originalcode11_mpReadCallerOnDirectional1AOB)
registersymbol(originalcode11_mpReadCallerOnDirectional1AOB)
label(exit11)
newmem11: //this is allocated memory, you have read,write,execute access
//place your code here
mov rax,pPlayer
cmp [rax],rcx
jne @f
mov rax,dCurrentDirectionalMPUsage
maxss xmm0,[rax]
cvtps2dq xmm0,xmm0
movd [rcx+3c],xmm0
cvtdq2ps xmm0,xmm0
@@:
readmem(mpReadCallerOnDirectional1AOB+5,3)
reassemble(mpReadCallerOnDirectional1AOB+8)
jmp exit11
originalcode11_mpReadCallerOnDirectional1AOB:
readmem(mpReadCallerOnDirectional1AOB+5,8)
//movaps xmm6,xmm0
//call BloodstainedRotN-Win64-Shipping.exe+99D8A0
exit11:
jmp returnhere11
///
mpReadCallerOnDirectional1AOB+5: //"BloodstainedRotN-Win64-Shipping.exe"+800DBF:
jmp newmem11
nop
nop
nop
returnhere11:
///****************************************************///
aobscanmodule(mpReadCallerOnWeaponTechOneShotAOB,BloodstainedRotN-Win64-Shipping.exe,48 ** ** E8 ** ** ** ** 0F 28 ** 4C 8B ** ** 0F ** ** 0F 93 C0 41)
registersymbol(mpReadCallerOnWeaponTechOneShotAOB)
alloc(newmem12,2048,mpReadCallerOnWeaponTechOneShotAOB+8) //"BloodstainedRotN-Win64-Shipping.exe"+3530318)
label(returnhere12)
label(originalcode12_mpReadCallerOnWeaponTechOneShotAOB)
registersymbol(originalcode12_mpReadCallerOnWeaponTechOneShotAOB)
label(exit12)
newmem12: //this is allocated memory, you have read,write,execute access
//place your code here
mov r9,pPlayer
cmp [r9],rcx
jne @f
maxss xmm0,xmm6
cvtps2dq xmm0,xmm0
movd [rcx+3c],xmm0
cvtdq2ps xmm0,xmm0
originalcode12_mpReadCallerOnWeaponTechOneShotAOB:
readmem(mpReadCallerOnWeaponTechOneShotAOB+8,7)
//movaps xmm7,xmm0
//mov r9,[rbp-10]
exit12:
jmp returnhere12
///
mpReadCallerOnWeaponTechOneShotAOB+8: //"BloodstainedRotN-Win64-Shipping.exe"+3530318:
jmp newmem12
nop
nop
returnhere12:
///****************************************************///
aobscanmodule(mpReadCallerOnWeaponTechSustainAOB,BloodstainedRotN-Win64-Shipping.exe,49 ** ** E8 ** ** ** ** 44 0F 28 ** 8B ** ** 4C ** ** ** 44 0F)
registersymbol(mpReadCallerOnWeaponTechSustainAOB)
alloc(newmem13,2048,mpReadCallerOnWeaponTechSustainAOB+8) //"BloodstainedRotN-Win64-Shipping.exe"+3532669)
label(returnhere13)
label(originalcode13_mpReadCallerOnWeaponTechSustainAOB)
registersymbol(originalcode13_mpReadCallerOnWeaponTechSustainAOB)
label(exit13)
newmem13: //this is allocated memory, you have read,write,execute access
//place your code here
mov r9,pPlayer
cmp [r9],rcx
jne @f
mov r9,dMinRapiersTechMP
maxss xmm0,[r9]
cvtps2dq xmm0,xmm0
movd [rcx+3c],xmm0
cvtdq2ps xmm0,xmm0
originalcode13_mpReadCallerOnWeaponTechSustainAOB:
readmem(mpReadCallerOnWeaponTechSustainAOB+8,7)
//movaps xmm9,xmm0
//mov edx,[rbp+08]
exit13:
jmp returnhere13
///
dMinRapiersTechMP:
dd (float)2
///
mpReadCallerOnWeaponTechSustainAOB+8: //"BloodstainedRotN-Win64-Shipping.exe"+3532669:
jmp newmem13
nop
nop
returnhere13:
///****************************************************///
aobscanmodule(mpReadCallerOnShardSustain1AOB,BloodstainedRotN-Win64-Shipping.exe,49 ** ** E8 ** ** ** ** 44 0F ** ** 8B ** ** ** 00 00 4C ** ** ** ** 00 00 44 0F ** ** 0F)
registersymbol(mpReadCallerOnShardSustain1AOB)
alloc(newmem14,2048,mpReadCallerOnShardSustain1AOB+8) //"BloodstainedRotN-Win64-Shipping.exe"+3531D90)
label(returnhere14)
label(originalcode14_mpReadCallerOnShardSustain1AOB)
registersymbol(originalcode14_mpReadCallerOnShardSustain1AOB)
label(exit14)
newmem14: //this is allocated memory, you have read,write,execute access
//place your code here
mov r9,pPlayer
cmp [r9],rcx
jne @f
mov r9,dMinShardSustainMP
maxss xmm0,[r9]
maxss xmm0,xmm6
cvtps2dq xmm0,xmm0
movd [rcx+3c],xmm0
cvtdq2ps xmm0,xmm0
originalcode14_mpReadCallerOnShardSustain1AOB:
readmem(mpReadCallerOnShardSustain1AOB+8,10)
//movaps xmm13,xmm0
//mov edx,[rbp+000000B8]
exit14:
jmp returnhere14
///
dMinShardSustainMP:
dd (float)2
///
mpReadCallerOnShardSustain1AOB+8: //"BloodstainedRotN-Win64-Shipping.exe"+3531D90:
jmp newmem14
nop
nop
nop
nop
nop
returnhere14:
///****************************************************///
aobscanmodule(equippedManipulativeMPChkAOB,BloodstainedRotN-Win64-Shipping.exe,EB 08 F3 0F ** ** ** ** 00 00 4C 8B ** ** ** 00 00 33)
registersymbol(equippedManipulativeMPChkAOB)
alloc(newmem17,2048,equippedManipulativeMPChkAOB+2) //"BloodstainedRotN-Win64-Shipping.exe"+2E84AB6)
label(returnhere17)
label(originalcode17_equippedManipulativeMPChkAOB)
registersymbol(originalcode17_equippedManipulativeMPChkAOB)
label(exit17)
newmem17: //this is allocated memory, you have read,write,execute access
//place your code here
readmem(equippedManipulativeMPChkAOB+2,8)
//movss xmm6,[rcx+00000598]
mov r8,pPlayer
cmp [r8+8],rsi
jne nend
//mov r8,[r8]
//maxss xmm0,xmm6
//cvtps2dq xmm0,xmm0
//movd [r8+3c],xmm0
//lea r8,[rcx+598]
//maxss xmm6,[r8+4]
//movss [rsp+20],xmm6
//movss [r8+4],xmm6
//movss xmm0,xmm6
/*
mov r8,dCurrentConjureMPUsage
cmp byte ptr [r8+4],0
jle @f
maxss xmm0,[r8]
dec [r8+4]
@@:
mov r8,dCurrentDirectionalMPUsage
cmp byte ptr [r8+4],0
jle @f
maxss xmm0,[r8]
dec [r8+4]
*/
@@:
mov r8,pPlayer
maxss xmm0,xmm6
movss [rsp+20],xmm0
cvtps2dq xmm0,xmm0
mov r8,[r8]
movd [r8+3c],xmm0
movss xmm0,[rsp+20]
lea r8,[rcx+598]
movss [r8+4],xmm0
jmp exit17
nend:
originalcode17_equippedManipulativeMPChkAOB:
readmem(equippedManipulativeMPChkAOB+2,8)
//movss xmm6,[rcx+00000598]
exit17:
jmp returnhere17
///
equippedManipulativeMPChkAOB+2: //"BloodstainedRotN-Win64-Shipping.exe"+2E84AB6:
jmp newmem17
nop
nop
nop
returnhere17:
///****************************************************///
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
equippedConjuredMPUsageChkAOB+5: //"BloodstainedRotN-Win64-Shipping.exe"+801A3A:
readmem(originalcode_equippedConjuredMPUsageChkAOB,7)
//db 0F 2F 86 FC 00 00 00
//Alt: comiss xmm0,[rsi+000000FC]
unregistersymbol(originalcode_equippedConjuredMPUsageChkAOB)
unregistersymbol(dCurrentConjureMPUsage)
///****************************************************///
dealloc(newmem2)
mpReadCallerOnConjureAOB+5: //"BloodstainedRotN-Win64-Shipping.exe"+353100C:
readmem(originalcode2_mpReadCallerOnConjureAOB,5)
//db E8 FF AE 2C FD
//Alt: call BloodstainedRotN-Win64-Shipping.exe+7FBF10
unregistersymbol(originalcode2_mpReadCallerOnConjureAOB)
///****************************************************///
dealloc(newmem6)
equippedDirectionalMPUsageChkAOB+5: //"BloodstainedRotN-Win64-Shipping.exe"+8009D3:
readmem(originalcode6_equippedDirectionalMPUsageChkAOB,7)
//db 0F 2F 86 FC 00 00 00
//Alt: comiss xmm0,[rsi+000000FC]
unregistersymbol(originalcode6_equippedDirectionalMPUsageChkAOB)
unregistersymbol(dCurrentDirectionalMPUsage)
///****************************************************///
dealloc(newmem11)
mpReadCallerOnDirectional1AOB+5: //"BloodstainedRotN-Win64-Shipping.exe"+800DBF:
readmem(originalcode11_mpReadCallerOnDirectional1AOB,8)
//db 0F 28 F0 E8 D9 CA 19 00
//Alt: movaps xmm6,xmm0
//Alt: call BloodstainedRotN-Win64-Shipping.exe+99D8A0
unregistersymbol(originalcode11_mpReadCallerOnDirectional1AOB)
///****************************************************///
dealloc(newmem12)
mpReadCallerOnWeaponTechOneShotAOB+8: //"BloodstainedRotN-Win64-Shipping.exe"+3530318:
readmem(originalcode12_mpReadCallerOnWeaponTechOneShotAOB,7)
//db 0F 28 F8 4C 8B 4D F0
//Alt: movaps xmm7,xmm0
//Alt: mov r9,[rbp-10]
unregistersymbol(originalcode12_mpReadCallerOnWeaponTechOneShotAOB)
///****************************************************///
dealloc(newmem13)
mpReadCallerOnWeaponTechSustainAOB+8: //"BloodstainedRotN-Win64-Shipping.exe"+3532669:
readmem(originalcode13_mpReadCallerOnWeaponTechSustainAOB,7)
//db 44 0F 28 C8 8B 55 08
//Alt: movaps xmm9,xmm0
//Alt: mov edx,[rbp+08]
unregistersymbol(originalcode13_mpReadCallerOnWeaponTechSustainAOB)
///****************************************************///
dealloc(newmem14)
mpReadCallerOnShardSustain1AOB+8: //"BloodstainedRotN-Win64-Shipping.exe"+3531D90:
readmem(originalcode14_mpReadCallerOnShardSustain1AOB,10)
//db 44 0F 28 E8 8B 95 B8 00 00 00
//Alt: movaps xmm13,xmm0
//Alt: mov edx,[rbp+000000B8]
unregistersymbol(originalcode14_mpReadCallerOnShardSustain1AOB)
///****************************************************///
dealloc(newmem17)
equippedManipulativeMPChkAOB+2: //"BloodstainedRotN-Win64-Shipping.exe"+2E84AB6:
readmem(originalcode17_equippedManipulativeMPChkAOB,8)
//db F3 0F 10 B1 98 05 00 00
//Alt: movss xmm6,[rcx+00000598]
unregistersymbol(originalcode17_equippedManipulativeMPChkAOB)
///****************************************************///
83
"inf. bullet"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
define(dminbullet,#1)
aobscanmodule(someQCalOnChange1AOB,BloodstainedRotN-Win64-Shipping.exe,75 ** 8B ** ** 3B C6 0F)
registersymbol(someQCalOnChange1AOB)
alloc(newmem,2048,someQCalOnChange1AOB+2) //"BloodstainedRotN-Win64-Shipping.exe"+84D16B)
label(returnhere)
label(originalcode_someQCalOnChange1AOB)
registersymbol(originalcode_someQCalOnChange1AOB)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov rax,pCurrentBullet
cmp [rax],rbx
jne @f
readmem(someQCalOnChange1AOB+2,3)
//mov eax,[rbx+48]
readmem(someQCalOnChange1AOB+a,2)
//sub eax,esi
cmp eax,dminbullet
jge @f
mov eax,dminbullet
add eax,esi
db 89
readmem(someQCalOnChange1AOB+3,2)
//mov [rbx+48],eax
originalcode_someQCalOnChange1AOB:
readmem(someQCalOnChange1AOB+2,5)
//mov eax,[rbx+48]
//cmp eax,esi
exit:
jmp returnhere
///
someQCalOnChange1AOB+2: //"BloodstainedRotN-Win64-Shipping.exe"+84D16B:
jmp newmem
returnhere:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
someQCalOnChange1AOB+2: //"BloodstainedRotN-Win64-Shipping.exe"+84D16B:
readmem(originalcode_someQCalOnChange1AOB,5)
//db 8B 43 48 3B C6
//Alt: mov eax,[rbx+48]
//Alt: cmp eax,esi
unregistersymbol(originalcode_someQCalOnChange1AOB)
93
"ignore gold"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(purchasableFlagsSetInShopMenuAOB,BloodstainedRotN-Win64-Shipping.exe,40 ** 48 ** ** ** ** ** ** 48 ** ** ** ** ** ** ** ** 48 ** ** ** ** ** ** 48 ** ** 48 ** ** ** ** ** ** ** 0F B6 DA)
registersymbol(purchasableFlagsSetInShopMenuAOB)
alloc(newmem,2048,purchasableFlagsSetInShopMenuAOB) //"BloodstainedRotN-Win64-Shipping.exe"+161FB30)
label(returnhere)
label(originalcode_purchasableFlagsSetInShopMenuAOB)
registersymbol(originalcode_purchasableFlagsSetInShopMenuAOB)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov dl,1
originalcode_purchasableFlagsSetInShopMenuAOB:
readmem(purchasableFlagsSetInShopMenuAOB,9)
//push rbx
//sub rsp,000000A0
exit:
jmp returnhere
///
purchasableFlagsSetInShopMenuAOB: //"BloodstainedRotN-Win64-Shipping.exe"+161FB30:
jmp newmem
nop
nop
nop
nop
returnhere:
///*******************************///
aobscanmodule(someDivision1AOB,BloodstainedRotN-Win64-Shipping.exe,8B ** ** ** 48 ** ** ** ** 99 F7 F9 89 ** 48 ** ** ** 5F C3)
registersymbol(someDivision1AOB)
alloc(newmem2,2048,someDivision1AOB+c) //"BloodstainedRotN-Win64-Shipping.exe"+1E8EF59)
label(returnhere2)
label(originalcode2_someDivision1AOB)
registersymbol(originalcode2_someDivision1AOB)
label(exit2)
newmem2: //this is allocated memory, you have read,write,execute access
//place your code here
push rcx
mov rcx,pInv1
mov rcx,[rcx]
cmp [rsp+10],rcx
jne @f
mov eax,#99
@@:
pop rcx
originalcode2_someDivision1AOB:
readmem(someDivision1AOB+c,6)
//mov [rdi],eax
//add rsp,20
exit2:
jmp returnhere2
///
someDivision1AOB+c: //"BloodstainedRotN-Win64-Shipping.exe"+1E8EF59:
jmp newmem2
nop
returnhere2:
///*******************************///
aobscanmodule(comQSufficientFlagSetAOB,BloodstainedRotN-Win64-Shipping.exe,8B ** ** ** 39 ** ** ** 48 ** ** ** 48 ** ** ** ** 0F 9D C0 88 ** 48 ** ** ** ** 48 ** ** ** 5F C3)
registersymbol(comQSufficientFlagSetAOB)
alloc(newmem3,2048,comQSufficientFlagSetAOB+14) //"BloodstainedRotN-Win64-Shipping.exe"+1E940EB)
label(returnhere3)
label(originalcode3_comQSufficientFlagSetAOB)
registersymbol(originalcode3_comQSufficientFlagSetAOB)
label(exit3)
newmem3: //this is allocated memory, you have read,write,execute access
//place your code here
mov rdi,pInv1
mov rdi,[rdi]
cmp [rsp+1b0],rdi
jne @f
mov al,1
originalcode3_comQSufficientFlagSetAOB:
readmem(comQSufficientFlagSetAOB+14,7)
//mov [rsi],al
//mov rsi,[rsp+48]
exit3:
jmp returnhere3
///
comQSufficientFlagSetAOB+14: //"BloodstainedRotN-Win64-Shipping.exe"+1E940EB:
jmp newmem3
nop
nop
returnhere3:
///*******************************///
aobscanmodule(goldSufficientChkOnBuyAOB,BloodstainedRotN-Win64-Shipping.exe,E8 ** ** ** ** 44 3B ** ** ** 00 00 0F 8F ** ** ** ** 45 ** ** 7E)
registersymbol(goldSufficientChkOnBuyAOB)
alloc(newmem4,2048,goldSufficientChkOnBuyAOB+5) //"BloodstainedRotN-Win64-Shipping.exe"+7C1047)
label(returnhere4)
label(originalcode4_goldSufficientChkOnBuyAOB)
registersymbol(originalcode4_goldSufficientChkOnBuyAOB)
label(exit4)
newmem4: //this is allocated memory, you have read,write,execute access
//place your code here
readmem(goldSufficientChkOnBuyAOB+5,7)
//cmp r12d,[rax+254]
jle @f
readmem(goldSufficientChkOnBuyAOB+5,1)
db 89
readmem(goldSufficientChkOnBuyAOB+7,5)
//mov [rax+254],r12d
originalcode4_goldSufficientChkOnBuyAOB:
readmem(goldSufficientChkOnBuyAOB+5,7)
//cmp r12d,[rax+00000254]
exit4:
jmp returnhere4
///
goldSufficientChkOnBuyAOB+5: //"BloodstainedRotN-Win64-Shipping.exe"+7C1047:
jmp newmem4
nop
nop
returnhere4:
///*******************************///
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
purchasableFlagsSetInShopMenuAOB: //"BloodstainedRotN-Win64-Shipping.exe"+161FB30:
readmem(originalcode_purchasableFlagsSetInShopMenuAOB,9)
//db 40 53 48 81 EC A0 00 00 00
//Alt: push rbx
//Alt: sub rsp,000000A0
unregistersymbol(originalcode_purchasableFlagsSetInShopMenuAOB)
///*******************************///
dealloc(newmem2)
someDivision1AOB+c: //"BloodstainedRotN-Win64-Shipping.exe"+1E8EF59:
readmem(originalcode2_someDivision1AOB,6)
//db 89 07 48 83 C4 20
//Alt: mov [rdi],eax
//Alt: add rsp,20
unregistersymbol(originalcode2_someDivision1AOB)
///*******************************///
dealloc(newmem3)
comQSufficientFlagSetAOB+14: //"BloodstainedRotN-Win64-Shipping.exe"+1E940EB:
readmem(originalcode3_comQSufficientFlagSetAOB,7)
//db 88 06 48 8B 74 24 48
//Alt: mov [rsi],al
//Alt: mov rsi,[rsp+48]
unregistersymbol(originalcode3_comQSufficientFlagSetAOB)
///*******************************///
dealloc(newmem4)
goldSufficientChkOnBuyAOB+5: //"BloodstainedRotN-Win64-Shipping.exe"+7C1047:
readmem(originalcode4_goldSufficientChkOnBuyAOB,7)
//db 44 3B A0 54 02 00 00
//Alt: cmp r12d,[rax+00000254]
unregistersymbol(originalcode4_goldSufficientChkOnBuyAOB)
///*******************************///
101
"ignore ingredients .1"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(ingredientsSufficientChkInShopMenuAOB,BloodstainedRotN-Win64-Shipping.exe,8B ** 2B ** ** 85 ** 78 ** 85 ** 78 ** 45 ** ** 78 ** 85 ** 78 ** 48 ** ** E8)
registersymbol(ingredientsSufficientChkInShopMenuAOB)
alloc(originalcode_ingredientsSufficientChkInShopMenuAOB,16,ingredientsSufficientChkInShopMenuAOB+7)
registersymbol(originalcode_ingredientsSufficientChkInShopMenuAOB)
originalcode_ingredientsSufficientChkInShopMenuAOB:
readmem(ingredientsSufficientChkInShopMenuAOB+7,2)
originalcode_ingredientsSufficientChkInShopMenuAOB+2:
readmem(ingredientsSufficientChkInShopMenuAOB+b,2)
originalcode_ingredientsSufficientChkInShopMenuAOB+4:
readmem(ingredientsSufficientChkInShopMenuAOB+10,2)
originalcode_ingredientsSufficientChkInShopMenuAOB+6:
readmem(ingredientsSufficientChkInShopMenuAOB+14,2)
ingredientsSufficientChkInShopMenuAOB+7: //"BloodstainedRotN-Win64-Shipping.exe"+7CFEEA:
db 90 90
///********************///
ingredientsSufficientChkInShopMenuAOB+b: //"BloodstainedRotN-Win64-Shipping.exe"+7CFEEE:
db 90 90
///********************///
ingredientsSufficientChkInShopMenuAOB+10: //"BloodstainedRotN-Win64-Shipping.exe"+7CFEF3:
db 90 90
///********************///
ingredientsSufficientChkInShopMenuAOB+14: //"BloodstainedRotN-Win64-Shipping.exe"+7CFEF7:
db 90 90
///********************///
aobscanmodule(maxQCalForCraftAOB,BloodstainedRotN-Win64-Shipping.exe,E8 ** ** ** ** 84 C0 ** ** ** ** ** 0F ** ** 3B FB 0F 4E DF)
registersymbol(maxQCalForCraftAOB)
maxQCalForCraftAOB+11: //maxQCalForCraftAOB+"BloodstainedRotN-Win64-Shipping.exe"+7CA0F8:
db 90 8B DF
///********************///
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
ingredientsSufficientChkInShopMenuAOB+7: //"BloodstainedRotN-Win64-Shipping.exe"+7CFEEA:
readmem(originalcode_ingredientsSufficientChkInShopMenuAOB,2)
//db 78 19
//Alt: js BloodstainedRotN-Win64-Shipping.exe+7CFF05
dealloc(originalcode_ingredientsSufficientChkInShopMenuAOB)
unregistersymbol(originalcode_ingredientsSufficientChkInShopMenuAOB)
///********************///
ingredientsSufficientChkInShopMenuAOB+b: //"BloodstainedRotN-Win64-Shipping.exe"+7CFEEE:
readmem(originalcode_ingredientsSufficientChkInShopMenuAOB+2,2)
//db 78 15
//Alt: js BloodstainedRotN-Win64-Shipping.exe+7CFF05
///********************///
ingredientsSufficientChkInShopMenuAOB+10: //"BloodstainedRotN-Win64-Shipping.exe"+7CFEF3:
readmem(originalcode_ingredientsSufficientChkInShopMenuAOB+4,2)
//db 78 10
//Alt: js BloodstainedRotN-Win64-Shipping.exe+7CFF05
///********************///
ingredientsSufficientChkInShopMenuAOB+14: //"BloodstainedRotN-Win64-Shipping.exe"+7CFEF7:
readmem(originalcode_ingredientsSufficientChkInShopMenuAOB+6,2)
//db 78 0C
//Alt: js BloodstainedRotN-Win64-Shipping.exe+7CFF05
///********************///
maxQCalForCraftAOB+11: //"BloodstainedRotN-Win64-Shipping.exe"+7CA0F8:
db 0F 4E DF
//Alt: cmovle ebx,edi
///********************///
105
"999999 luck"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
luaCall(lua_aobscan("luckUpperCapChkAOB","BloodstainedRotN-Win64-Shipping.exe","F3 0F ** ** ** ** ** ** 0F 28 C2 F3 0F 2C C0 66 ** ** ** 0F ** ** 48 ** ** ** C3",3))
alloc(newmem,2048,luckUpperCapChkAOB) //"BloodstainedRotN-Win64-Shipping.exe"+86CD99)
label(returnhere)
label(originalcode_luckUpperCapChkAOB)
registersymbol(originalcode_luckUpperCapChkAOB)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov rax,dFLuck
movss xmm2,[rax]
jmp exit
originalcode_luckUpperCapChkAOB:
readmem(luckUpperCapChkAOB,8)
//minss xmm2,[BloodstainedRotN-Win64-Shipping.exe+3C63360]
exit:
jmp returnhere
///
dFLuck:
dd (float)999999
///
luckUpperCapChkAOB: //"BloodstainedRotN-Win64-Shipping.exe"+86CD99:
jmp newmem
nop
nop
nop
returnhere:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
luckUpperCapChkAOB: //"BloodstainedRotN-Win64-Shipping.exe"+86CD99:
readmem(originalcode_luckUpperCapChkAOB,8)
//db F3 0F 5D 15 BF 65 3F 03
//Alt: minss xmm2,[BloodstainedRotN-Win64-Shipping.exe+3C63360]
unregistersymbol(originalcode_luckUpperCapChkAOB)
55
"highlighted item/shard"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
luaCall(lua_aobscan("someRead3AOB","BloodstainedRotN-Win64-Shipping.exe","48 ** ** ** E8 ** ** ** ** 8B ** ** 89 ** ** 8B ** ** 89 ** ** 8B ** ** 89 ** ** 8B",3))
///
aobscanmodule(highlightedItemQReadCallerAOB,BloodstainedRotN-Win64-Shipping.exe,48 8B CE E8 ** ** ** ** 90 48 ** ** ** E8 ** ** ** ** 4C)
registersymbol(highlightedItemQReadCallerAOB)
///
label(pHighlightedItem)
registersymbol(pHighlightedItem)
alloc(newmem,2048,someRead3AOB+9) //"BloodstainedRotN-Win64-Shipping.exe"+82860D)
label(returnhere)
label(originalcode_someRead3AOB)
registersymbol(originalcode_someRead3AOB)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
//mov rax,"BloodstainedRotN-Win64-Shipping.exe"+A0DAE8
mov rax,highlightedItemQReadCallerAOB
lea rax,[rax+8]
cmp [rsp+288],rax
jne @f
//mov eax,[rbx+48]
mov rax,pHighlightedItem
mov [rax],rbx
originalcode_someRead3AOB:
readmem(someRead3AOB+9,6)
//mov eax,[rbx+48]
//mov [rdi+48],eax
exit:
jmp returnhere
///
pHighlightedItem:
///
someRead3AOB+9: //"BloodstainedRotN-Win64-Shipping.exe"+82860D:
jmp newmem
nop
returnhere:
///**********************************///
luaCall(lua_aobscan("shardRankCaller4AOB","BloodstainedRotN-Win64-Shipping.exe","48 ** ** 48 ** ** ** E8 ** ** ** ** 48 ** ** ** ** 48 ** ** ** ** 89 06 48 ** ** ** ** 48 ** ** ** 5F C3",5))
label(pShardRank)
registersymbol(pShardRank)
alloc(newmem2,2048,shardRankCaller4AOB+c) //"BloodstainedRotN-Win64-Shipping.exe"+A0E668)
label(returnhere2)
label(originalcode2_shardRankCaller4AOB)
registersymbol(originalcode2_shardRankCaller4AOB)
label(exit2)
newmem2: //this is allocated memory, you have read,write,execute access
//place your code here
mov rbx,pShardRank
mov [rbx],rdx
originalcode2_shardRankCaller4AOB:
readmem(shardRankCaller4AOB+c,5)
//mov rbx,[rsp+30]
exit2:
jmp returnhere2
///
pShardRank:
///
shardRankCaller4AOB+c: //"BloodstainedRotN-Win64-Shipping.exe"+A0E668:
jmp newmem2
returnhere2:
///**********************************///
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
someRead3AOB+9: //"BloodstainedRotN-Win64-Shipping.exe"+82860D:
readmem(originalcode_someRead3AOB,6)
//db 8B 43 48 89 47 48
//Alt: mov eax,[rbx+48]
//Alt: mov [rdi+48],eax
unregistersymbol(originalcode_someRead3AOB)
unregistersymbol(pHighlightedItem)
///**********************************///
dealloc(newmem2)
shardRankCaller4AOB+c: //"BloodstainedRotN-Win64-Shipping.exe"+A0E668:
readmem(originalcode2_shardRankCaller4AOB,5)
//db 48 8B 5C 24 30
//Alt: mov rbx,[rsp+30]
unregistersymbol(originalcode2_shardRankCaller4AOB)
unregistersymbol(pShardRank)
///**********************************///
56
"[item/shard]"
000080
Array of byte
0
pHighlightedItem
0
81
"id?"
1
808080
4 Bytes
+0
82
""
1
808080
4 Bytes
+4
80
""
1
808080
Array of byte
0
+8
0
78
""
1
808080
4 Bytes
+10
79
""
1
808080
4 Bytes
+14
76
"[]"
1
000080
Array of byte
0
+18
0
117
"[]"
1
000080
Array of byte
0
+28
0
116
""
808080
String
128
1
0
1
+0
118
"[]"
1
000080
Array of byte
0
+38
0
119
""
808080
String
128
1
0
1
+0
77
""
1
808080
Array of byte
0
+20
0
72
""
1
808080
4 Bytes
+28
74
""
1
808080
4 Bytes
+2c
70
""
1
808080
Array of byte
0
+30
0
75
""
1
808080
Array of byte
0
+38
0
73
""
1
808080
4 Bytes
+40
71
""
1
808080
4 Bytes
+44
57
"quantity"
0000FF
4 Bytes
+48
58
"max stack"
0000FF
4 Bytes
+4c
59
""
808080
4 Bytes
+50
60
""
808080
4 Bytes
+54
61
""
808080
Byte
+58
62
""
808080
Byte
+59
63
""
808080
Byte
+5a
64
""
1
808080
8 Bytes
+60
65
""
1
808080
8 Bytes
+68
66
""
808080
4 Bytes
+6c
67
""
808080
4 Bytes
+70
68
""
808080
Byte
+74
69
"favorite"
0000FF
Byte
+75
110
"[shard rank stats]"
000080
Array of byte
0
pShardRank
0
111
"id?"
1
808080
4 Bytes
+0
112
"rank"
0000FF
4 Bytes
+8
113
"equipped?"
0000FF
4 Bytes
+10
114
"attack speed / ?"
0000FF
Float
+14
115
"# of projectiles / duration / ?"
0000FF
Float
+18
507
"game speed mod"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(timeScalesWriteAOB,BloodstainedRotN-Win64-Shipping.exe,48 ** ** F3 0F ** ** ** ** 00 00 48 8B ** 80 ** ** ** 00 00 00 74)
registersymbol(timeScalesWriteAOB)
label(dCustTimeScales)
registersymbol(dCustTimeScales)
alloc(newmem,2048,timeScalesWriteAOB+3) //"BloodstainedRotN-Win64-Shipping.exe"+1D969E5)
label(returnhere)
label(originalcode_timeScalesWriteAOB)
registersymbol(originalcode_timeScalesWriteAOB)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov rcx,dCustTimeScales
mulss xmm7,[rcx]
originalcode_timeScalesWriteAOB:
readmem(timeScalesWriteAOB+3,8)
//movss [rax+0000013C],xmm7
exit:
jmp returnhere
///
dCustTimeScales:
dd (float)1
///
timeScalesWriteAOB+3: //"BloodstainedRotN-Win64-Shipping.exe"+1D969E5:
jmp newmem
nop
nop
nop
returnhere:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
timeScalesWriteAOB+3: //"BloodstainedRotN-Win64-Shipping.exe"+1D969E5:
readmem(originalcode_timeScalesWriteAOB,8)
//db F3 0F 11 B8 3C 01 00 00
//Alt: movss [rax+0000013C],xmm7
unregistersymbol(originalcode_timeScalesWriteAOB)
unregistersymbol(dCustTimeScales)
508
"custom speed"
008000
Float
dCustTimeScales
Set Value
96
111
0.2
0
Set Value
96
106
0.4
1
Set Value
96
109
0.6
2
Set Value
96
107
0.8
3
Set Value
96
110
1
4
509
"hold numpad0, then:"
808080
1
510
"numpad. :: reset"
808080
1
511
"numpad/ :: 0.2"
808080
1
512
"numpad* :: 0.4"
808080
1
513
"numpad- :: 0.6"
808080
1
514
"numpad+ :: 0.8"
808080
1
8
"[pointers]"
000080
1
7
"[player]"
000080
Array of byte
0
pPLayer
0
9
"hp"
0000FF
4 Bytes
+38
10
"mp"
0000FF
4 Bytes
+3c
19
"exp"
0000FF
4 Bytes
+40
20
"[stats]"
000080
Array of byte
0
pPLayer+8
0
21
"max hp"
0000FF
Float
+c34
28
""
0000FF
Float
+1c
22
"max mp"
0000FF
Float
+c38
35
""
0000FF
Float
+1c
23
"str"
0000FF
Float
+c3c
36
""
0000FF
Float
+1c
24
"int"
0000FF
Float
+c40
37
""
0000FF
Float
+1c
25
"con"
0000FF
Float
+c44
38
""
0000FF
Float
+1c
26
"mnd"
0000FF
Float
+c48
39
""
0000FF
Float
+1c
27
"lck"
0000FF
Float
+c4c
40
""
0000FF
Float
+1c
45
"gold"
0000FF
4 Bytes
pInv1
254
6
""
1
86
"aobt1"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(aobt1,BloodstainedRotN-Win64-Shipping.exe,48 ** ** F3 0F ** ** ** ** 00 00 48 8B ** 80 ** ** ** 00 00 00 74)
registersymbol(aobt1)
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
unregistersymbol(aobt1)
87
""
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
//vng21092's aobscan lua script
{$lua}
function lua_aobscan(name,module,bytes,index)
index = index - 1
if(module == "") then
local resultSet = AOBScan(bytes)
if(resultSet == nil) then
unregisterSymbol(name)
print(name.." not found")
else
unregisterSymbol(name)
registerSymbol(name,resultSet[index])
resultSet.destroy()
end
else
if(getModuleSize(module) == nil) then
print("Module "..module.." not found")
else
local memScanner = createMemScan()
local memFoundList = createFoundList(memScanner)
memScanner.firstScan(
soExactValue,vtByteArray,rtRounded,bytes,nil,
getAddress(module),(getAddress(module)+getModuleSize(module)),"",
fsmNotAligned,"",true,false,false,false)
memScanner.waitTillDone()
memFoundList.initialize()
if(memFoundList.Count == 0) then
unregisterSymbol(name)
print(name.." in module "..module.." not found")
else
unregisterSymbol(name)
registerSymbol(name,memFoundList.Address[index])
end
memScanner.destroy()
memFoundList.destroy()
end
end
end
{$asm}
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
88
"aobt2"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
luaCall(lua_aobscan("aobt2","BloodstainedRotN-Win64-Shipping.exe","F3 0F ** ** ** ** ** ** 0F 28 C2 F3 0F 2C C0 66 ** ** ** 0F ** ** 48 ** ** ** C3",3))
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
unregistersymbol(aobt2)
0
"No description"
4 Bytes
5E2DED78
1
"No description"
4 Bytes
5F7C3778
2
"No description"
4 Bytes
68255914
11
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem,2048,"BloodstainedRotN-Win64-Shipping.exe"+8658C4)
label(returnhere)
label(originalcode)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
push rcx
mov rcx,pPlayer
cmp [rcx],rbx
jne @f
xor al,al
@@:
pop rbx
originalcode:
add rsp,20
pop rbx
exit:
jmp returnhere
///
"BloodstainedRotN-Win64-Shipping.exe"+8658C4:
jmp newmem
returnhere:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
"BloodstainedRotN-Win64-Shipping.exe"+8658C4:
db 48 83 C4 20 5B
//Alt: add rsp,20
//Alt: pop rbx
12
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem,2048,"BloodstainedRotN-Win64-Shipping.exe"+801AAC)
label(returnhere)
label(originalcode)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov rcx,pPlayer
cmp [rcx+8],rdi
jne @f
maxss xmm6,xmm2
movss xmm0,xmm6
movaps xmm1,xmm6
cvtps2dq xmm1,xmm1
//push rbx
//movd ebx,xmm1
mov rcx,[rcx]
//mov [rcx+3c],ebx
movd [rcx+3c],xmm1
//pop rbx
originalcode:
mov rcx,rax
movaps xmm1,xmm6
exit:
jmp returnhere
///
"BloodstainedRotN-Win64-Shipping.exe"+801AAC:
jmp newmem
nop
returnhere:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
"BloodstainedRotN-Win64-Shipping.exe"+801AAC:
db 48 8B C8 0F 28 CE
//Alt: mov rcx,rax
//Alt: movaps xmm1,xmm6
13
"No Description"
Float
3199C43C
14
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"BloodstainedRotN-Win64-Shipping.exe"+801A41:
db 90 E9
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"BloodstainedRotN-Win64-Shipping.exe"+801A41:
db 0F 83
//Alt: jae
15
"No Description"
4 Bytes
142A81011
16
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
label(dCurrentMPUsage)
registersymbol(dCurrentMPUsage)
alloc(newmem,2048,"BloodstainedRotN-Win64-Shipping.exe"+801A3A)
label(returnhere)
label(originalcode)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
push rax
mov rax,pPlayer
cmp [rax],rcx
jne @f
//maxss xmm0,[rsi+fc]
//cvtps2dq xmm0,xmm0
//movd [rcx+3c],xmm0
maxss xmm0,[rsi+fc]
mov rax,dCurrentMPUsage
movss [rax],xmm0
@@:
pop rax
originalcode:
comiss xmm0,[rsi+000000FC]
exit:
jmp returnhere
///
dCurrentMPUsage:
///
"BloodstainedRotN-Win64-Shipping.exe"+801A3A:
jmp newmem
nop
nop
returnhere:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
"BloodstainedRotN-Win64-Shipping.exe"+801A3A:
db 0F 2F 86 FC 00 00 00
//Alt: comiss xmm0,[rsi+000000FC]
unregistersymbol(dCurrentMPUsage)
17
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem2,2048,"BloodstainedRotN-Win64-Shipping.exe"+3531011)
label(returnhere2)
label(originalcode2)
label(exit2)
newmem2: //this is allocated memory, you have read,write,execute access
//place your code here
mov rax,pPlayer
cmp [rax],rcx
jne @f
mov rax,dCurrentMPUsage
maxss xmm0,[rax]
cvtps2dq xmm0,xmm0
movd [rcx+3c],xmm0
cvtdq2ps xmm0,xmm0
originalcode2:
movaps xmm7,xmm0
mov rax,[rdi]
exit2:
jmp returnhere2
///
"BloodstainedRotN-Win64-Shipping.exe"+3531011:
jmp newmem2
nop
returnhere2:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem2)
"BloodstainedRotN-Win64-Shipping.exe"+3531011:
db 0F 28 F8 48 8B 07
//Alt: movaps xmm7,xmm0
//Alt: mov rax,[rdi]
41
"No description"
4 Bytes
1C980254
42
"Float"
Float
1D548DEC
43
"Float"
Float
1D548DF8
44
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
label(pInv1)
registersymbol(pInv1)
alloc(newmem2,2048,"BloodstainedRotN-Win64-Shipping.exe"+8FDA0A)
label(returnhere2)
label(originalcode2)
label(exit2)
newmem2: //this is allocated memory, you have read,write,execute access
//place your code here
mov rcx,pInv1
mov [rcx],rax
originalcode2:
mov edx,[rax+00000254]
exit2:
jmp returnhere2
///
pInv1:
///
"BloodstainedRotN-Win64-Shipping.exe"+8FDA0A:
jmp newmem2
nop
returnhere2:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem2)
"BloodstainedRotN-Win64-Shipping.exe"+8FDA0A:
db 8B 90 54 02 00 00
//Alt: mov edx,[rax+00000254]
unregistersymbol(pInv1)
46
"No Description"
Float
3199FC7C
47
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"BloodstainedRotN-Win64-Shipping.exe"+8009DA:
db 90 E9
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"BloodstainedRotN-Win64-Shipping.exe"+8009DA:
db 0F 83
//Alt: jae
48
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"BloodstainedRotN-Win64-Shipping.exe"+800D2A:
db 90 E9
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"BloodstainedRotN-Win64-Shipping.exe"+800D2A:
db 0F 83
//Alt: jae
49
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
label(dCurrentDirectionalMPUsage)
registersymbol(dCurrentDirectionalMPUsage)
alloc(newmem6,2048,"BloodstainedRotN-Win64-Shipping.exe"+8009D3)
label(returnhere6)
label(originalcode6)
label(exit6)
newmem6: //this is allocated memory, you have read,write,execute access
//place your code here
push rax
mov rax,pPlayer
cmp [rax],rcx
jne @f
maxss xmm0,[rsi+fc]
mov rax,dCurrentDirectionalMPUsage
movss [rax],xmm0
@@:
pop rax
originalcode6:
comiss xmm0,[rsi+000000FC]
exit6:
jmp returnhere6
///
dCurrentDirectionalMPUsage:
///
"BloodstainedRotN-Win64-Shipping.exe"+8009D3:
jmp newmem6
nop
nop
returnhere6:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem6)
"BloodstainedRotN-Win64-Shipping.exe"+8009D3:
db 0F 2F 86 FC 00 00 00
//Alt: comiss xmm0,[rsi+000000FC]
unregistersymbol(dCurrentDirectionalMPUsage)
50
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem11,2048,"BloodstainedRotN-Win64-Shipping.exe"+800DBF)
label(returnhere11)
label(originalcode11)
label(exit11)
newmem11: //this is allocated memory, you have read,write,execute access
//place your code here
mov rax,pPlayer
cmp [rax],rcx
jne @f
mov rax,dCurrentDirectionalMPUsage
maxss xmm0,[rax]
cvtps2dq xmm0,xmm0
movd [rcx+3c],xmm0
cvtdq2ps xmm0,xmm0
originalcode11:
movaps xmm6,xmm0
call BloodstainedRotN-Win64-Shipping.exe+99D8A0
exit11:
jmp returnhere11
///
"BloodstainedRotN-Win64-Shipping.exe"+800DBF:
jmp newmem11
nop
nop
nop
returnhere11:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem11)
"BloodstainedRotN-Win64-Shipping.exe"+800DBF:
db 0F 28 F0 E8 D9 CA 19 00
//Alt: movaps xmm6,xmm0
//Alt: call BloodstainedRotN-Win64-Shipping.exe+99D8A0
51
"No description"
2 Bytes
BF311648
52
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
label(pCurrentBullet)
registersymbol(pCurrentBullet)
alloc(newmem3,2048,"BloodstainedRotN-Win64-Shipping.exe"+838E3E)
label(returnhere3)
label(originalcode3)
label(exit3)
newmem3: //this is allocated memory, you have read,write,execute access
//place your code here
mov rbx,pCurrentBullet
mov [rbx],rcx
originalcode3:
mov eax,[rcx+48]
mov rbx,[rsp+30]
exit3:
jmp returnhere3
///
pCurrentBullet:
///
"BloodstainedRotN-Win64-Shipping.exe"+838E3E:
jmp newmem3
nop
nop
nop
returnhere3:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem3)
"BloodstainedRotN-Win64-Shipping.exe"+838E3E:
db 8B 41 48 48 8B 5C 24 30
//Alt: mov eax,[rcx+48]
//Alt: mov rbx,[rsp+30]
unregistersymbol(pCurrentBullet)
53
"No Description"
Byte
0D950B98
54
"No Description"
Byte
0E473758
84
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem12,2048,"BloodstainedRotN-Win64-Shipping.exe"+3530318)
label(returnhere12)
label(originalcode12)
label(exit12)
newmem12: //this is allocated memory, you have read,write,execute access
//place your code here
mov r9,pPlayer
cmp [r9],rcx
jne @f
maxss xmm0,xmm6
cvtps2dq xmm0,xmm0
movd [rcx+3c],xmm0
cvtdq2ps xmm0,xmm0
originalcode12:
movaps xmm7,xmm0
mov r9,[rbp-10]
exit12:
jmp returnhere12
///
"BloodstainedRotN-Win64-Shipping.exe"+3530318:
jmp newmem12
nop
nop
returnhere12:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem12)
"BloodstainedRotN-Win64-Shipping.exe"+3530318:
db 0F 28 F8 4C 8B 4D F0
//Alt: movaps xmm7,xmm0
//Alt: mov r9,[rbp-10]
85
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem13,2048,"BloodstainedRotN-Win64-Shipping.exe"+3532669)
label(returnhere13)
label(originalcode13)
label(exit13)
newmem13: //this is allocated memory, you have read,write,execute access
//place your code here
mov r9,pPlayer
cmp [r9],rcx
jne @f
mov r9,dMinRepidAttackMP
maxss xmm0,[r9]
cvtps2dq xmm0,xmm0
movd [rcx+3c],xmm0
cvtdq2ps xmm0,xmm0
originalcode13:
movaps xmm9,xmm0
mov edx,[rbp+08]
exit13:
jmp returnhere13
///
dMinRepidAttackMP:
dd (float)2
///
"BloodstainedRotN-Win64-Shipping.exe"+3532669:
jmp newmem13
nop
nop
returnhere13:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem13)
"BloodstainedRotN-Win64-Shipping.exe"+3532669:
db 44 0F 28 C8 8B 55 08
//Alt: movaps xmm9,xmm0
//Alt: mov edx,[rbp+08]
89
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(purchasableFlagsSetInShopMenuAOB,BloodstainedRotN-Win64-Shipping.exe,40 ** 48 ** ** ** ** ** ** 48 ** ** ** ** ** ** ** ** 48 ** ** ** ** ** ** 48 ** ** 48 ** ** ** ** ** ** ** 0F B6 DA)
registersymbol(purchasableFlagsSetInShopMenuAOB)
alloc(newmem,2048,purchasableFlagsSetInShopMenuAOB) //"BloodstainedRotN-Win64-Shipping.exe"+161FB30)
label(returnhere)
label(originalcode_purchasableFlagsSetInShopMenuAOB)
registersymbol(originalcode_purchasableFlagsSetInShopMenuAOB)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov dl,1
originalcode_purchasableFlagsSetInShopMenuAOB:
readmem(purchasableFlagsSetInShopMenuAOB,9)
//push rbx
//sub rsp,000000A0
exit:
jmp returnhere
///
purchasableFlagsSetInShopMenuAOB: //"BloodstainedRotN-Win64-Shipping.exe"+161FB30:
jmp newmem
nop
nop
nop
nop
returnhere:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
purchasableFlagsSetInShopMenuAOB: //"BloodstainedRotN-Win64-Shipping.exe"+161FB30:
readmem(originalcode_purchasableFlagsSetInShopMenuAOB,9)
//db 40 53 48 81 EC A0 00 00 00
//Alt: push rbx
//Alt: sub rsp,000000A0
unregistersymbol(originalcode_purchasableFlagsSetInShopMenuAOB)
90
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(someDivision1AOB,BloodstainedRotN-Win64-Shipping.exe,8B ** ** ** 48 ** ** ** ** 99 F7 F9 89 ** 48 ** ** ** 5F C3)
registersymbol(someDivision1AOB)
alloc(newmem2,2048,someDivision1AOB+c) //"BloodstainedRotN-Win64-Shipping.exe"+1E8EF59)
label(returnhere2)
label(originalcode2_someDivision1AOB)
registersymbol(originalcode2_someDivision1AOB)
label(exit2)
newmem2: //this is allocated memory, you have read,write,execute access
//place your code here
push rcx
mov rcx,pInv1
mov rcx,[rcx]
cmp [rsp+10],rcx
jne @f
mov eax,#99
@@:
pop rcx
originalcode2_someDivision1AOB:
readmem(someDivision1AOB+c,6)
//mov [rdi],eax
//add rsp,20
exit2:
jmp returnhere2
///
someDivision1AOB+c: //"BloodstainedRotN-Win64-Shipping.exe"+1E8EF59:
jmp newmem2
nop
returnhere2:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem2)
someDivision1AOB+c: //"BloodstainedRotN-Win64-Shipping.exe"+1E8EF59:
readmem(originalcode2_someDivision1AOB,6)
//db 89 07 48 83 C4 20
//Alt: mov [rdi],eax
//Alt: add rsp,20
unregistersymbol(originalcode2_someDivision1AOB)
91
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(comQSufficientFlagSetAOB,BloodstainedRotN-Win64-Shipping.exe,8B ** ** ** 39 ** ** ** 48 ** ** ** 48 ** ** ** ** 0F 9D C0 88 ** 48 ** ** ** ** 48 ** ** ** 5F C3)
registersymbol(comQSufficientFlagSetAOB)
alloc(newmem3,2048,comQSufficientFlagSetAOB+14) //"BloodstainedRotN-Win64-Shipping.exe"+1E940EB)
label(returnhere3)
label(originalcode3_comQSufficientFlagSetAOB)
registersymbol(originalcode3_comQSufficientFlagSetAOB)
label(exit3)
newmem3: //this is allocated memory, you have read,write,execute access
//place your code here
mov rdi,pInv1
mov rdi,[rdi]
cmp [rsp+1b0],rdi
jne @f
mov al,1
originalcode3_comQSufficientFlagSetAOB:
readmem(comQSufficientFlagSetAOB+14,7)
//mov [rsi],al
//mov rsi,[rsp+48]
exit3:
jmp returnhere3
///
comQSufficientFlagSetAOB+14: //"BloodstainedRotN-Win64-Shipping.exe"+1E940EB:
jmp newmem3
nop
nop
returnhere3:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem3)
comQSufficientFlagSetAOB+14: //"BloodstainedRotN-Win64-Shipping.exe"+1E940EB:
readmem(originalcode3_comQSufficientFlagSetAOB,7)
//db 88 06 48 8B 74 24 48
//Alt: mov [rsi],al
//Alt: mov rsi,[rsp+48]
unregistersymbol(originalcode3_comQSufficientFlagSetAOB)
92
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(goldSufficientChkOnBuyAOB,BloodstainedRotN-Win64-Shipping.exe,E8 ** ** ** ** 44 3B ** ** ** 00 00 0F 8F ** ** ** ** 45 ** ** 7E)
registersymbol(goldSufficientChkOnBuyAOB)
alloc(newmem4,2048,goldSufficientChkOnBuyAOB+5) //"BloodstainedRotN-Win64-Shipping.exe"+7C1047)
label(returnhere4)
label(originalcode4_goldSufficientChkOnBuyAOB)
registersymbol(originalcode4_goldSufficientChkOnBuyAOB)
label(exit4)
newmem4: //this is allocated memory, you have read,write,execute access
//place your code here
readmem(goldSufficientChkOnBuyAOB+5,7)
//cmp r12d,[rax+254]
jle @f
readmem(goldSufficientChkOnBuyAOB+5,1)
db 89
readmem(goldSufficientChkOnBuyAOB+7,5)
//mov [rax+254],r12d
originalcode4_goldSufficientChkOnBuyAOB:
readmem(goldSufficientChkOnBuyAOB+5,7)
//cmp r12d,[rax+00000254]
exit4:
jmp returnhere4
///
goldSufficientChkOnBuyAOB+5: //"BloodstainedRotN-Win64-Shipping.exe"+7C1047:
jmp newmem4
nop
nop
returnhere4:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem4)
goldSufficientChkOnBuyAOB+5: //"BloodstainedRotN-Win64-Shipping.exe"+7C1047:
readmem(originalcode4_goldSufficientChkOnBuyAOB,7)
//db 44 3B A0 54 02 00 00
//Alt: cmp r12d,[rax+00000254]
unregistersymbol(originalcode4_goldSufficientChkOnBuyAOB)
95
"No description"
4 Bytes
9C048938
96
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem,2048,"BloodstainedRotN-Win64-Shipping.exe"+7CFE98)
label(returnhere)
label(originalcode)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov ebp,eax
sub ebp,[rbx+40]
jns @f
mov eax,[rbx+40]
originalcode:
mov ebp,eax
sub ebp,[rbx+40]
exit:
jmp returnhere
///
"BloodstainedRotN-Win64-Shipping.exe"+7CFE98:
jmp newmem
returnhere:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
"BloodstainedRotN-Win64-Shipping.exe"+7CFE98:
db 8B E8 2B 6B 40
//Alt: mov ebp,eax
//Alt: sub ebp,[rbx+40]
98
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(ingredientsSufficientChkInShopMenuAOB,BloodstainedRotN-Win64-Shipping.exe,8B ** 2B ** ** 85 ** 78 ** 85 ** 78 ** 45 ** ** 78 ** 85 ** 78 ** 48 ** ** E8)
registersymbol(ingredientsSufficientChkInShopMenuAOB)
alloc(originalcode_ingredientsSufficientChkInShopMenuAOB,16,ingredientsSufficientChkInShopMenuAOB+7)
registersymbol(originalcode_ingredientsSufficientChkInShopMenuAOB)
originalcode_ingredientsSufficientChkInShopMenuAOB:
readmem(ingredientsSufficientChkInShopMenuAOB+7,2)
originalcode_ingredientsSufficientChkInShopMenuAOB+2:
readmem(ingredientsSufficientChkInShopMenuAOB+b,2)
originalcode_ingredientsSufficientChkInShopMenuAOB+4:
readmem(ingredientsSufficientChkInShopMenuAOB+10,2)
originalcode_ingredientsSufficientChkInShopMenuAOB+6:
readmem(ingredientsSufficientChkInShopMenuAOB+14,2)
ingredientsSufficientChkInShopMenuAOB+7: //"BloodstainedRotN-Win64-Shipping.exe"+7CFEEA:
db 90 90
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
ingredientsSufficientChkInShopMenuAOB+7: //"BloodstainedRotN-Win64-Shipping.exe"+7CFEEA:
readmem(originalcode_ingredientsSufficientChkInShopMenuAOB,2)
//db 78 19
//Alt: js BloodstainedRotN-Win64-Shipping.exe+7CFF05
dealloc(originalcode_ingredientsSufficientChkInShopMenuAOB)
unregistersymbol(originalcode_ingredientsSufficientChkInShopMenuAOB)
97
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
ingredientsSufficientChkInShopMenuAOB+b: //"BloodstainedRotN-Win64-Shipping.exe"+7CFEEE:
db 90 90
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
ingredientsSufficientChkInShopMenuAOB+b: //"BloodstainedRotN-Win64-Shipping.exe"+7CFEEE:
readmem(originalcode_ingredientsSufficientChkInShopMenuAOB+2,2)
//db 78 15
//Alt: js BloodstainedRotN-Win64-Shipping.exe+7CFF05
99
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
ingredientsSufficientChkInShopMenuAOB+10: //"BloodstainedRotN-Win64-Shipping.exe"+7CFEF3:
db 90 90
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
ingredientsSufficientChkInShopMenuAOB+10: //"BloodstainedRotN-Win64-Shipping.exe"+7CFEF3:
readmem(originalcode_ingredientsSufficientChkInShopMenuAOB+4,2)
//db 78 10
//Alt: js BloodstainedRotN-Win64-Shipping.exe+7CFF05
100
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
ingredientsSufficientChkInShopMenuAOB+14: //"BloodstainedRotN-Win64-Shipping.exe"+7CFEF7:
db 90 90
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
ingredientsSufficientChkInShopMenuAOB+14: //"BloodstainedRotN-Win64-Shipping.exe"+7CFEF7:
readmem(originalcode_ingredientsSufficientChkInShopMenuAOB+6,2)
//db 78 0C
//Alt: js BloodstainedRotN-Win64-Shipping.exe+7CFF05
102
"No description"
Byte
9C048C80
103
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(maxQCalForCraftAOB,BloodstainedRotN-Win64-Shipping.exe,E8 ** ** ** ** 84 C0 ** ** ** ** ** 0F ** ** 3B FB 0F 4E DF)
registersymbol(maxQCalForCraftAOB)
maxQCalForCraftAOB+11: //maxQCalForCraftAOB+"BloodstainedRotN-Win64-Shipping.exe"+7CA0F8:
db 90 8B DF
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
maxQCalForCraftAOB+11: //"BloodstainedRotN-Win64-Shipping.exe"+7CA0F8:
db 0F 4E
//Alt: cmovle ebx,edi
106
"No description"
4 Bytes
34A8AC95
107
"No description"
1
4 Bytes
5F126550
108
"No description"
4 Bytes
5F126558
109
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
luaCall(lua_aobscan("shardRankCaller4AOB","BloodstainedRotN-Win64-Shipping.exe","48 ** ** 48 ** ** ** E8 ** ** ** ** 48 ** ** ** ** 48 ** ** ** ** 89 06 48 ** ** ** ** 48 ** ** ** 5F C3",5))
label(pShardRank)
registersymbol(pShardRank)
alloc(newmem2,2048,shardRankCaller4AOB+c) //"BloodstainedRotN-Win64-Shipping.exe"+A0E668)
label(returnhere2)
label(originalcode2_shardRankCaller4AOB)
registersymbol(originalcode2_shardRankCaller4AOB)
label(exit2)
newmem2: //this is allocated memory, you have read,write,execute access
//place your code here
mov rbx,pShardRank
mov [rbx],rdx
originalcode2_shardRankCaller4AOB:
readmem(shardRankCaller4AOB+c,5)
//mov rbx,[rsp+30]
exit2:
jmp returnhere2
///
pShardRank:
///
shardRankCaller4AOB+c: //"BloodstainedRotN-Win64-Shipping.exe"+A0E668:
jmp newmem2
returnhere2:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem2)
shardRankCaller4AOB+c: //"BloodstainedRotN-Win64-Shipping.exe"+A0E668:
readmem(originalcode2_shardRankCaller4AOB,5)
//db 48 8B 5C 24 30
//Alt: mov rbx,[rsp+30]
unregistersymbol(originalcode2_shardRankCaller4AOB)
unregistersymbol(pShardRank)
120
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(mpReadCallerOnManipulativeSustain1AOB,BloodstainedRotN-Win64-Shipping.exe,49 ** ** E8 ** ** ** ** 44 0F ** ** 8B ** ** ** 00 00 4C ** ** ** ** 00 00 44 0F ** ** 0F)
registersymbol(mpReadCallerOnManipulativeSustain1AOB)
alloc(newmem14,2048,mpReadCallerOnManipulativeSustain1AOB+8) //"BloodstainedRotN-Win64-Shipping.exe"+3531D90)
label(returnhere14)
label(originalcode14_mpReadCallerOnManipulativeSustain1AOB)
registersymbol(originalcode14_mpReadCallerOnManipulativeSustain1AOB)
label(exit14)
newmem14: //this is allocated memory, you have read,write,execute access
//place your code here
mov r9,pPlayer
cmp [r9],rcx
jne @f
mov r9,dMinManipulativeSustainMP
maxss xmm0,[r9]
cvtps2dq xmm0,xmm0
movd [rcx+3c],xmm0
cvtdq2ps xmm0,xmm0
originalcode14_mpReadCallerOnManipulativeSustain1AOB:
readmem(mpReadCallerOnManipulativeSustain1AOB+8,10)
//movaps xmm13,xmm0
//mov edx,[rbp+000000B8]
exit14:
jmp returnhere14
///
dMinManipulativeSustainMP:
dd (float)6
///
mpReadCallerOnManipulativeSustain1AOB+8: //"BloodstainedRotN-Win64-Shipping.exe"+3531D90:
jmp newmem14
nop
nop
nop
nop
nop
returnhere14:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem14)
mpReadCallerOnManipulativeSustain1AOB+8: //"BloodstainedRotN-Win64-Shipping.exe"+3531D90:
readmem(originalcode14_mpReadCallerOnManipulativeSustain1AOB,10)
//db 44 0F 28 E8 8B 95 B8 00 00 00
//Alt: movaps xmm13,xmm0
//Alt: mov edx,[rbp+000000B8]
unregistersymbol(originalcode14_mpReadCallerOnManipulativeSustain1AOB)
121
"No Description"
Float
3122EDDC
122
"No description"
Byte
82B25C24
123
"No description"
Byte
6D94A9A3
124
"No description"
Byte
5B7B4790
125
"No Description"
1
4 Bytes
142964E40
126
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"BloodstainedRotN-Win64-Shipping.exe"+2EB4BDE:
db 90 90
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"BloodstainedRotN-Win64-Shipping.exe"+2EB4BDE:
db 75 07
//Alt: jne BloodstainedRotN-Win64-Shipping.exe+2EB4BE7
133
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem,2048,"BloodstainedRotN-Win64-Shipping.exe"+18A238F)
label(returnhere)
label(originalcode)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov cl,1
originalcode:
mov [rax+000000E0],cl
exit:
jmp returnhere
///
"BloodstainedRotN-Win64-Shipping.exe"+18A238F:
jmp newmem
nop
returnhere:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
"BloodstainedRotN-Win64-Shipping.exe"+18A238F:
db 88 88 E0 00 00 00
//Alt: mov [rax+000000E0],cl
Code :movd xmm0,[rcx+38]
BloodstainedRotN-Win64-Shipping.exe+86C74C
48
85
C0
75
F4
66
0F
6E
41
38
0F
5B
C0
C3
CC
Code :mov edi,[rbx+38]
BloodstainedRotN-Win64-Shipping.exe+86641F
48
89
7C
24
30
8B
7B
38
8B
CF
2B
CE
0F
Code :mov [rbx+38],eax
BloodstainedRotN-Win64-Shipping.exe+86642D
C1
48
8B
4B
28
89
43
38
E8
7B
BE
F9
FF
Code :cmp dword ptr [rbx+38],00
BloodstainedRotN-Win64-Shipping.exe+86647F
38
01
00
00
00
83
7B
38
00
48
8B
7C
24
30
Code :mov edx,[rsp+34]
BloodstainedRotN-Win64-Shipping.exe+1EC5AE3
30
44
0F
B6
C6
8B
54
24
34
48
8D
4C
24
40
Code :mov r15,[rsp+000000C8]
BloodstainedRotN-Win64-Shipping.exe+B1E95C
7B
D8
4C
8B
D9
4C
8B
BC
24
C8
00
00
00
48
85
C9
0F
84
Code :mov eax,[rsp+40]
BloodstainedRotN-Win64-Shipping.exe+1E8EF4D
83
C4
20
5F
C3
8B
44
24
40
48
8B
5C
24
30
Code :movzx ecx,byte ptr [rdi+71]
BloodstainedRotN-Win64-Shipping.exe+D63A49
4D
85
FF
74
20
0F
B6
4F
71
40
38
6C
24
58
Code :mov [rbx+20],rdi
BloodstainedRotN-Win64-Shipping.exe+1660606
83
7C
24
30
00
48
89
7B
20
48
8B
06
0F
95
Code :push rbx
BloodstainedRotN-Win64-Shipping.exe+161FB30
CC
CC
CC
CC
CC
40
53
48
81
EC
A0
00
Code :cmp [rsp+40],eax
BloodstainedRotN-Win64-Shipping.exe+1E9743B
F8
8B
44
24
38
39
44
24
40
48
89
7B
20
48
Code :mov eax,[rbx+000000FC]
BloodstainedRotN-Win64-Shipping.exe+828752
87
F8
00
00
00
8B
83
FC
00
00
00
89
87
FC
00
00
Code :addss xmm0,dword ptr [rsi+rdi*8+14]
BloodstainedRotN-Win64-Shipping.exe+7C2524
F3
0F
10
45
C7
F3
0F
58
44
FE
14
F3
0F
11
45
C7
Code :mov [r8+rcx],r10l
BloodstainedRotN-Win64-Shipping.exe+2FF4241
8E
18
02
00
00
45
88
14
08
EB
57
44
8D
48
Code :movzx r8d,byte ptr [rax+rcx]
BloodstainedRotN-Win64-Shipping.exe+2FF4331
00
00
49
63
C6
44
0F
B6
04
08
EB
55
44
8B
8E
Code :cmp byte ptr [rbx+00000610],00
BloodstainedRotN-Win64-Shipping.exe+2EB53B5
8D
88
00
00
00
80
BB
10
06
00
00
00
0F
84
CB
04
00
Code :mov byte ptr [rdi+00000610],01
BloodstainedRotN-Win64-Shipping.exe+2EB4C99
83
C4
50
5F
C3
C6
87
10
06
00
00
01
88
9F
18
06
00
Code :movzx eax,byte ptr [rbx+00000610]
BloodstainedRotN-Win64-Shipping.exe+2EB5505
90
B8
03
00
00
0F
B6
83
10
06
00
00
84
C0
74
06
45
Code :movzx eax,byte ptr [rbx+00000610]
BloodstainedRotN-Win64-Shipping.exe+2EB55C6
90
70
06
00
00
0F
B6
83
10
06
00
00
84
C0
74
05
0F
Code :mov byte ptr [rbx+00000610],00
BloodstainedRotN-Win64-Shipping.exe+2EB56F3
84
9A
01
00
00
C6
83
10
06
00
00
00
C6
83
18
06
00
Code :mov [rdi+00000610],bl
BloodstainedRotN-Win64-Shipping.exe+2EB4C69
E9
3A
FF
FF
FF
88
9F
10
06
00
00
C6
87
18
06
00
Code :mov [rsp+08],rbx
BloodstainedRotN-Win64-Shipping.exe+2607280
CC
CC
CC
CC
CC
48
89
5C
24
08
48
89
74
24
18
Code :mov rdx,[r13+48]
BloodstainedRotN-Win64-Shipping.exe+2B24153
4C
8D
4C
24
21
49
8B
55
48
48
8B
CD
E8
21
Code :cmp [rsi+rcx*8+10],r14d
BloodstainedRotN-Win64-Shipping.exe+38034F5
0C
40
48
03
C9
44
39
74
CE
10
0F
85
B5
00
00
Code :inc [rbx+10]
BloodstainedRotN-Win64-Shipping.exe+3805D47
08
4C
89
49
08
FF
43
10
4C
89
4B
08
B8
Code :add [rdx+10],r11d
BloodstainedRotN-Win64-Shipping.exe+38033D3
2A
4C
89
51
08
44
01
5A
10
4C
89
11
4C
39
Code :mov [rax+000000E0],cl
BloodstainedRotN-Win64-Shipping.exe+18A238F
0F
B6
4C
24
30
88
88
E0
00
00
00
48
89
86
E8
00
Code :cmp byte ptr [rdi+000000E0],00
BloodstainedRotN-Win64-Shipping.exe+18A454D
E8
83
F7
FD
FF
80
BF
E0
00
00
00
00
0F
84
60
05
00
Code :mov eax,[rax+rbx*4+000007C0]
BloodstainedRotN-Win64-Shipping.exe+90A7A3
07
00
00
EB
24
8B
84
98
C0
07
00
00
85
C0
7E
09
FF
Code :cmp dword ptr [rcx+rbx*4+000007C0],00
BloodstainedRotN-Win64-Shipping.exe+90A7B7
99
C0
07
00
00
83
BC
99
C0
07
00
00
00
75
06
C7
06
00
Code :cmp dword ptr [rax+rbx*4+000007C0],00
BloodstainedRotN-Win64-Shipping.exe+90A78C
40
84
FF
74
17
83
BC
98
C0
07
00
00
00
75
04
F3
0F
11
Code :inc [rax+rbx*4+000007C0]
BloodstainedRotN-Win64-Shipping.exe+90A79A
04
F3
0F
11
36
FF
84
98
C0
07
00
00
EB
24
8B
84
98
Code :mov [rcx+rbx*4+000007C0],eax
BloodstainedRotN-Win64-Shipping.exe+90A7B0
C0
7E
09
FF
C8
89
84
99
C0
07
00
00
83
BC
99
C0
07
Code :inc [rax+rbx*4+000007C0]
BloodstainedRotN-Win64-Shipping.exe+90A79A
04
F3
0F
11
36
FF
84
98
C0
07
00
00
EB
24
8B
84
98
Code :mov [rcx+rbx*4+000007C0],eax
BloodstainedRotN-Win64-Shipping.exe+90A7B0
C0
7E
09
FF
C8
89
84
99
C0
07
00
00
83
BC
99
C0
07
Code :cmp dword ptr [rcx+rbx*4+000007C0],00
BloodstainedRotN-Win64-Shipping.exe+90A7B7
99
C0
07
00
00
83
BC
99
C0
07
00
00
00
75
06
C7
06
00
Code :add [rcx+rax+000000B8],r14w
BloodstainedRotN-Win64-Shipping.exe+37CBE67
00
49
8B
41
18
66
44
01
B4
01
B8
00
00
00
49
8B
79
18
49
Code :comiss xmm6,[rcx+0000013C]
BloodstainedRotN-Win64-Shipping.exe+1D969B3
28
F8
48
8B
0B
0F
2F
B1
3C
01
00
00
73
0D
0F
2E
FE
Code :ucomiss xmm6,[rcx+0000013C]
BloodstainedRotN-Win64-Shipping.exe+1D969CC
50
10
48
8B
0B
0F
2E
B1
3C
01
00
00
75
0D
0F
2F
FE
Code :movss [rax+0000013C],xmm7
BloodstainedRotN-Win64-Shipping.exe+1D969E5
50
10
48
8B
03
F3
0F
11
B8
3C
01
00
00
48
8B
0B
80
B9
mpReadCallerOnDirectional1AOB
140550DCA
luckUpperCapChkAOB
1405BCD99
someRead3AOB
140578454
shardRankCaller4AOB
14075E65C
https://fearlessrevolution.com/viewtopic.php?f=4&t=9658
https://www.patreon.com/Cielos