3
"enable"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
//vng21092's aobscan lua script
{$lua}
function lua_aobscan(name,module,bytes,index)
index = index - 1
if(module == "") then
local resultSet = AOBScan(bytes)
if(resultSet == nil) then
unregisterSymbol(name)
print(name.." not found")
else
unregisterSymbol(name)
registerSymbol(name,resultSet[index])
resultSet.destroy()
end
else
if(getModuleSize(module) == nil) then
print("Module "..module.." not found")
else
local memScanner = createMemScan()
local memFoundList = createFoundList(memScanner)
memScanner.firstScan(
soExactValue,vtByteArray,rtRounded,bytes,nil,
getAddress(module),(getAddress(module)+getModuleSize(module)),"",
fsmNotAligned,"",true,false,false,false)
memScanner.waitTillDone()
memFoundList.initialize()
if(memFoundList.Count == 0) then
unregisterSymbol(name)
print(name.." in module "..module.." not found")
else
unregisterSymbol(name)
registerSymbol(name,memFoundList.Address[index])
end
memScanner.destroy()
memFoundList.destroy()
end
end
end
{$asm}
aobscanmodule(equippedWeaponAmmoReadAOB,SAOFB-Win64-Shipping.exe,8B ** ** ** 00 00 48 8B ** 89 ** ** ** 00 00 E8 ** ** ** ** 48 ** ** ** ** 00 00 89)
registersymbol(equippedWeaponAmmoReadAOB)
label(pEquippedWeapon)
registersymbol(pEquippedWeapon)
alloc(newmem,2048,equippedWeaponAmmoReadAOB) //"SAOFB-Win64-Shipping.exe"+38F788)
label(returnhere)
label(originalcode_equippedWeaponAmmoReadAOB)
registersymbol(originalcode_equippedWeaponAmmoReadAOB)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov rcx,pEquippedWeapon
mov [rcx],rsi
originalcode_equippedWeaponAmmoReadAOB:
readmem(equippedWeaponAmmoReadAOB,6)
//mov eax,[rsi+0000067C]
exit:
jmp returnhere
///
pEquippedWeapon:
///
equippedWeaponAmmoReadAOB: //"SAOFB-Win64-Shipping.exe"+38F788:
jmp newmem
nop
returnhere:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
equippedWeaponAmmoReadAOB: //"SAOFB-Win64-Shipping.exe"+38F788:
readmem(originalcode_equippedWeaponAmmoReadAOB,6)
//db 8B 86 7C 06 00 00
//Alt: mov eax,[rsi+0000067C]
unregistersymbol(originalcode_equippedWeaponAmmoReadAOB)
unregistersymbol(pEquippedWeapon)
15
"no reload"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(ammoWriteOnFireAOB,SAOFB-Win64-Shipping.exe,89 ** ** ** 00 00 48 8B ** E8 ** ** ** ** 84 C0 74 ** 80 ** ** ** 00 00 00 75)
registersymbol(ammoWriteOnFireAOB)
alloc(newmem,2048,ammoWriteOnFireAOB) //"SAOFB-Win64-Shipping.exe"+3AB9F2)
label(returnhere)
label(originalcode_ammoWriteOnFireAOB)
registersymbol(originalcode_ammoWriteOnFireAOB)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov rcx,pEquippedWeapon
cmp [rcx],rbx
jne @f
cmp eax,1
jge @f
mov eax,1
@@:
originalcode_ammoWriteOnFireAOB:
readmem(ammoWriteOnFireAOB,6)
//mov [rbx+0000067C],eax
exit:
jmp returnhere
///
ammoWriteOnFireAOB: //"SAOFB-Win64-Shipping.exe"+3AB9F2:
jmp newmem
nop
returnhere:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
ammoWriteOnFireAOB: //"SAOFB-Win64-Shipping.exe"+3AB9F2:
readmem(originalcode_ammoWriteOnFireAOB,6)
//db 89 83 7C 06 00 00
//Alt: mov [rbx+0000067C],eax
unregistersymbol(originalcode_ammoWriteOnFireAOB)
8
"inf. ammo pouch"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
define(minammopouch,#100)
aobscanmodule(ammoPouchReadAOB,SAOFB-Win64-Shipping.exe,48 89 ** E8 ** ** ** ** 8B 40 ** 48 ** ** ** C3 31 C0 48 ** ** ** C3)
registersymbol(ammoPouchReadAOB)
label(dMinAmmoPouch)
registersymbol(dMinAmmoPouch)
alloc(newmem,2048,ammoPouchReadAOB+8,7) //"SAOFB-Win64-Shipping.exe"+5F5A56D)
label(returnhere)
label(originalcode_ammoPouchReadAOB)
registersymbol(originalcode_ammoPouchReadAOB)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
push rbx
mov rbx,pEquippedWeapon
cmp [rbx],rsi
jne @f
mov rbx,dMinAmmoPouch
mov ebx,[rbx]
db 39 58
readmem(ammoPouchReadAOB+a,1)
//cmp [rax+10],ebx
jge @f
db 89 58
readmem(ammoPouchReadAOB+a,1)
//mov [rax+10],ebx
@@:
pop rbx
originalcode_ammoPouchReadAOB:
readmem(ammoPouchReadAOB+8,7)
//mov eax,[rax+10]
//add rsp,28
exit:
jmp returnhere
///
dMinAmmoPouch:
dd minammopouch
///
ammoPouchReadAOB+8: //"SAOFB-Win64-Shipping.exe"+5F5A56D:
jmp newmem
nop
nop
returnhere:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
ammoPouchReadAOB+8: //"SAOFB-Win64-Shipping.exe"+5F5A56D:
readmem(originalcode_ammoPouchReadAOB,7)
//db 8B 40 10 48 83 C4 28
//Alt: mov eax,[rax+10]
//Alt: add rsp,28
unregistersymbol(originalcode_ammoPouchReadAOB)
unregistersymbol(dMinAmmoPouch)
17
"ignore cooldown"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(cooldownChkOnSkillUseAOB,SAOFB-Win64-Shipping.exe,F3 0F ** ** ** 0F 2F ** ** 0F 96 D0 C3 30 C0 C3)
registersymbol(cooldownChkOnSkillUseAOB)
cooldownChkOnSkillUseAOB+9: //"SAOFB-Win64-Shipping.exe"+5DE6964:
db 90 B0 01
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
cooldownChkOnSkillUseAOB+9: //"SAOFB-Win64-Shipping.exe"+5DE6964:
db 0F 96 D0
//Alt: setbe al
21
"ignore $"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(moneyChkOnBuyAOB,SAOFB-Win64-Shipping.exe,4C 8B ** ** ** 00 00 48 ** ** ** 4C 3B C1 0F 8F)
registersymbol(moneyChkOnBuyAOB)
moneyChkOnBuyAOB+b: //"SAOFB-Win64-Shipping.exe"+6B16E4:
db 4D 39 C0
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
moneyChkOnBuyAOB+b: //"SAOFB-Win64-Shipping.exe"+6B16E4:
db 4C 3B C1
//Alt: cmp r8,rcx
13032
"ignore CP"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(sufficientCPChkOnStatsIncAOB,SAOFB-Win64-Shipping.exe,8B ** ** ** 00 00 39 ** ** ** 00 00 7C ** FF)
registersymbol(sufficientCPChkOnStatsIncAOB)
alloc(originalcode_sufficientCPChkOnStatsIncAOB,10)
registersymbol(originalcode_sufficientCPChkOnStatsIncAOB)
originalcode_sufficientCPChkOnStatsIncAOB:
readmem(sufficientCPChkOnStatsIncAOB+c,2)
///
sufficientCPChkOnStatsIncAOB+c: //"SAOFB-Win64-Shipping.exe"+7D718A:
db 90 90
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
sufficientCPChkOnStatsIncAOB+c: //"SAOFB-Win64-Shipping.exe"+7D718A:
readmem(originalcode_sufficientCPChkOnStatsIncAOB,2)
//db 7C 63
//Alt: jl SAOFB-Win64-Shipping.exe+7D71EF
dealloc(originalcode_sufficientCPChkOnStatsIncAOB)
unregistersymbol(originalcode_sufficientCPChkOnStatsIncAOB)
13024
"ignore skill requirements"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(learnableFlagUnSetOnSkillMenuAccessAOB,SAOFB-Win64-Shipping.exe,7C 04 B0 01 EB 02 30 C0 48 ** ** ** ** 48)
registersymbol(learnableFlagUnSetOnSkillMenuAccessAOB)
learnableFlagUnSetOnSkillMenuAccessAOB+6: //"SAOFB-Win64-Shipping.exe"+6C4A7C5:
db B0 01
///*****************************///
aobscanmodule(equipableFlagUnSetOnSkillEquipAOB,SAOFB-Win64-Shipping.exe,7C 04 B0 01 EB 02 32 C0 48 ** ** ** ** ** ** ** 4C)
registersymbol(equipableFlagUnSetOnSkillEquipAOB)
equipableFlagUnSetOnSkillEquipAOB+6: //"SAOFB-Win64-Shipping.exe"+7CF430:
db B0 01
///*****************************///
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
learnableFlagUnSetOnSkillMenuAccessAOB+6: //"SAOFB-Win64-Shipping.exe"+6C4A7C5:
db 30 C0
//Alt: xor al,al
///*****************************///
equipableFlagUnSetOnSkillEquipAOB+6: //"SAOFB-Win64-Shipping.exe"+7CF430:
db 32 C0
//Alt: xor al,al
///*****************************///
39
"walk key"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
define(walkkeyiddefault,14)
aobscanmodule(yForceWrite1AOB,SAOFB-Win64-Shipping.exe,74 03 0F 57 ** F3 41 ** ** ** ** 40 ** ** ** 0F84)
registersymbol(yForceWrite1AOB)
label(bWalkKeyID)
registersymbol(bWalkKeyID)
label(bWalkKeyPressed)
registersymbol(bWalkKeyPressed)
label(dMoveSpeedMultiplier)
registersymbol(dMoveSpeedMultiplier)
alloc(newmem,2048,yForceWrite1AOB+5) //"SAOFB-Win64-Shipping.exe"+4F27D7)
label(returnhere)
label(originalcode_yForceWrite1AOB)
registersymbol(originalcode_yForceWrite1AOB)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov rax,bWalkKeyPressed
cmp byte ptr [rax],1
jne @f
mov rax,dMoveSpeedMultiplier
mulss xmm0,[rax]
originalcode_yForceWrite1AOB:
readmem(yForceWrite1AOB+5,6)
//movss [r11+3C],xmm0
exit:
jmp returnhere
///
bWalkKeyID:
dd walkkeyiddefault
bWalkKeyPressed:
dd 0
dMoveSpeedMultiplier:
dd (float)0.4
///
yForceWrite1AOB+5: //"SAOFB-Win64-Shipping.exe"+4F27D7:
jmp newmem
nop
returnhere:
///*****************************************///
luaCall(lua_aobscan("yForceWrite2AOB","SAOFB-Win64-Shipping.exe","75 03 0F 57 ** F3 41 ** ** ** ** 40 ** ** ** 0F84",1))
alloc(newmem2,2048,yForceWrite2AOB+5) //"SAOFB-Win64-Shipping.exe"+4F2887)
label(returnhere2)
label(originalcode2_yForceWrite2AOB)
registersymbol(originalcode2_yForceWrite2AOB)
label(exit2)
newmem2: //this is allocated memory, you have read,write,execute access
//place your code here
mov rax,bWalkKeyPressed
cmp byte ptr [rax],1
jne @f
mov rax,dMoveSpeedMultiplier
mulss xmm0,[rax]
originalcode2_yForceWrite2AOB:
readmem(yForceWrite2AOB+5,6)
//movss [r11+3C],xmm0
exit2:
jmp returnhere2
///
yForceWrite2AOB+5: //"SAOFB-Win64-Shipping.exe"+4F2887:
jmp newmem2
nop
returnhere2:
///*****************************************///
luaCall(lua_aobscan("xForceWrite1AOB","SAOFB-Win64-Shipping.exe","75 03 0F 57 ** F3 41 ** ** ** ** 40 ** ** ** 0F84",2))
alloc(newmem3,2048,xForceWrite1AOB+5) //"SAOFB-Win64-Shipping.exe"+4F2937)
label(returnhere3)
label(originalcode3_xForceWrite1AOB)
registersymbol(originalcode3_xForceWrite1AOB)
label(exit3)
newmem3: //this is allocated memory, you have read,write,execute access
//place your code here
mov rax,bWalkKeyPressed
cmp byte ptr [rax],1
jne @f
mov rax,dMoveSpeedMultiplier
mulss xmm0,[rax]
originalcode3_xForceWrite1AOB:
readmem(xForceWrite1AOB+5,6)
//movss [r11+38],xmm0
exit3:
jmp returnhere3
///
xForceWrite1AOB+5: //"SAOFB-Win64-Shipping.exe"+4F2937:
jmp newmem3
nop
returnhere3:
///*****************************************///
aobscanmodule(xForceWrite2AOB,SAOFB-Win64-Shipping.exe,74 03 0F 57 C1 F3 ** ** ** ** ** 0F ** ** ** 0F 83)
registersymbol(xForceWrite2AOB)
alloc(newmem4,2048,xForceWrite2AOB+5) //"SAOFB-Win64-Shipping.exe"+4F29E7)
label(returnhere4)
label(originalcode4_xForceWrite2AOB)
registersymbol(originalcode4_xForceWrite2AOB)
label(exit4)
newmem4: //this is allocated memory, you have read,write,execute access
//place your code here
mov rax,bWalkKeyPressed
cmp byte ptr [rax],1
jne @f
mov rax,dMoveSpeedMultiplier
mulss xmm0,[rax]
originalcode4_xForceWrite2AOB:
readmem(xForceWrite2AOB+5,6)
//movss [r11+38],xmm0
exit4:
jmp returnhere4
///
xForceWrite2AOB+5: //"SAOFB-Win64-Shipping.exe"+4F29E7:
jmp newmem4
nop
returnhere4:
///*****************************************///
//modified from TheyCallMeTim13's lua keylistener script
//http://fearlessrevolution.com/viewtopic.php?f=4&t=6041&start=60#p62657
{$lua}
local function walkkeyLuaThread(thread2)
local addr2 = getAddressSafe('bWalkKeyPressed')
while RunWalkkeyLuaThreadLoop do
sleep(100)
if addr2 then
if ( isKeyPressed( readInteger('bWalkKeyID') ) ) then
writeBytes(addr2, 1)
else
writeBytes(addr2, 0)
end
else
addr2 = getAddressSafe('bWalkKeyPressed')
end
end
thread2.terminate()
-- while RunWalkkeyLuaThreadLoop do
-- if ( isKeyPressed(VK_CAPITAL) ) then
-- writeBytes("bWalkKeyPressed" ,1)
-- else
-- writeBytes("bWalkKeyPressed" ,0)
-- end
-- end
-- thread2.terminate()
end
----------------------------------
if syntaxcheck then return end
RunWalkkeyLuaThreadLoop = true
createThread(walkkeyLuaThread)
{$asm}
///*****************************************///
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
{$lua}
if syntaxcheck then return end
RunWalkkeyLuaThreadLoop = false
{$asm}
///*****************************************///
dealloc(newmem)
yForceWrite1AOB+5: //"SAOFB-Win64-Shipping.exe"+4F27D7:
readmem(originalcode_yForceWrite1AOB,6)
//db F3 41 0F 11 43 3C
//Alt: movss [r11+3C],xmm0
unregistersymbol(originalcode_yForceWrite1AOB)
unregistersymbol(bWalkKeyID)
unregistersymbol(bWalkKeyPressed)
unregistersymbol(dMoveSpeedMultiplier)
///*****************************************///
dealloc(newmem2)
yForceWrite2AOB+5: //"SAOFB-Win64-Shipping.exe"+4F2887:
readmem(originalcode2_yForceWrite2AOB,6)
//db F3 41 0F 11 43 3C
//Alt: movss [r11+3C],xmm0
unregistersymbol(originalcode2_yForceWrite2AOB)
///*****************************************///
dealloc(newmem3)
xForceWrite1AOB+5: //"SAOFB-Win64-Shipping.exe"+4F2937:
readmem(originalcode3_xForceWrite1AOB,6)
//db F3 41 0F 11 43 38
//Alt: movss [r11+38],xmm0
unregistersymbol(originalcode3_xForceWrite1AOB)
///*****************************************///
dealloc(newmem4)
xForceWrite2AOB+5: //"SAOFB-Win64-Shipping.exe"+4F29E7:
readmem(originalcode4_xForceWrite2AOB,6)
//db F3 41 0F 11 43 38
//Alt: movss [r11+38],xmm0
unregistersymbol(originalcode4_xForceWrite2AOB)
///*****************************************///
13010
"key"
10:SHIFT key
11:CTRL key
12:ALT key
14:CAPS LOCK key
04:Middle Mouse Button
05:X1 Mouse Button
06:X2 Moust Button
09:TAB key
1
008000
Byte
bWalkKeyID
13011
""
008000
Byte
+4
13012
""
008000
Float
+4
13034
""
1
13033
"aobt1"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(aobt1,SAOFB-Win64-Shipping.exe,74 03 0F 57 C1 F3 ** ** ** ** ** 0F ** ** ** 0F 83)
registersymbol(aobt1)
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
unregistersymbol(aobt1)
13039
"aobt2"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
luaCall(lua_aobscan("aobt2","SAOFB-Win64-Shipping.exe","75 03 0F 57 ** F3 41 ** ** ** ** 40 ** ** ** 0F84",2))
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
unregistersymbol(aobt2)
4
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem,2048,"SAOFB-Win64-Shipping.exe"+3E726F)
label(returnhere)
label(originalcode)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov rsi,pEquippedWeapon
cmp [rsi],rax
jne @f
cmp dword ptr [rax+67c],1
jge @f
mov dword ptr [rax+67c],1
@@:
jmp exit
originalcode:
mov eax,[rax+0000067C]
exit:
jmp returnhere
///
"SAOFB-Win64-Shipping.exe"+3E726F:
jmp newmem
nop
returnhere:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
"SAOFB-Win64-Shipping.exe"+3E726F:
db 8B 80 7C 06 00 00
//Alt: mov eax,[rax+0000067C]
9
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem2,2048,"SAOFB-Win64-Shipping.exe"+3AB9E6)
label(returnhere2)
label(originalcode2)
label(exit2)
newmem2: //this is allocated memory, you have read,write,execute access
//place your code here
mov eax,[rbx+0000067C]
mov rcx,pEquippedWeapon
cmp [rcx],rbx
jne @f
test eax,eax
jg @f
setle al
@@:
jmp exit2
originalcode2:
mov eax,[rbx+0000067C]
exit2:
jmp returnhere2
///
"SAOFB-Win64-Shipping.exe"+3AB9E6:
jmp newmem2
nop
returnhere2:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem2)
"SAOFB-Win64-Shipping.exe"+3AB9E6:
db 8B 83 7C 06 00 00
//Alt: mov eax,[rbx+0000067C]
11
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem4,2048,"SAOFB-Win64-Shipping.exe"+3E6E8A)
label(returnhere4)
label(originalcode4)
label(exit4)
newmem4: //this is allocated memory, you have read,write,execute access
//place your code here
mov rsi,pEquippedWeapon
cmp [rsi],rax
jne @f
or dil,1
originalcode4:
or dil,dl
or dil,r9l
exit4:
jmp returnhere4
///
"SAOFB-Win64-Shipping.exe"+3E6E8A:
jmp newmem4
nop
returnhere4:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
"SAOFB-Win64-Shipping.exe"+3E6E8A:
db 40 0A FA 41 0A F9
//Alt: or dil,dl
//Alt: or dil,r9l
10
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem3,2048,"SAOFB-Win64-Shipping.exe"+3E6E78)
label(returnhere3)
label(originalcode3)
label(exit3)
newmem3: //this is allocated memory, you have read,write,execute access
//place your code here
mov rsi,pEquippedWeapon
cmp [rsi],rax
jne @f
cmp dword ptr [rax+67c],1
jge @f
mov dword ptr [rax+67c],1
originalcode3:
cmp dword ptr [rax+0000067C],00
exit3:
jmp returnhere3
///
"SAOFB-Win64-Shipping.exe"+3E6E78:
jmp newmem3
nop
nop
returnhere3:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem3)
"SAOFB-Win64-Shipping.exe"+3E6E78:
db 83 B8 7C 06 00 00 00
//Alt: cmp dword ptr [rax+0000067C],00
12
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
alloc(newmem5,2048,"SAOFB-Win64-Shipping.exe"+3AB9F2)
label(returnhere5)
label(originalcode5)
label(exit5)
newmem5: //this is allocated memory, you have read,write,execute access
//place your code here
test eax,eax
jg @f
setle al
originalcode5:
mov [rbx+0000067C],eax
exit5:
jmp returnhere5
///
"SAOFB-Win64-Shipping.exe"+3AB9F2:
jmp newmem5
nop
returnhere5:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem5)
"SAOFB-Win64-Shipping.exe"+3AB9F2:
db 89 83 7C 06 00 00
//Alt: mov [rbx+0000067C],eax
13022
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"SAOFB-Win64-Shipping.exe"+5F5AE96:
db EB
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"SAOFB-Win64-Shipping.exe"+5F5AE96:
db 79
//Alt: jns
13023
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"SAOFB-Win64-Shipping.exe"+6C4A789:
db 90 90
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"SAOFB-Win64-Shipping.exe"+6C4A789:
db 7C 3A
//Alt: jl SAOFB-Win64-Shipping.exe+6C4A7C5
13040
"walk key"
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
define(walkkeyiddefault,14)
aobscanmodule(yForceWrite1AOB,SAOFB-Win64-Shipping.exe,74 03 0F 57 ** F3 41 ** ** ** ** 40 ** ** ** 0F84)
registersymbol(yForceWrite1AOB)
label(bWalkKeyID)
registersymbol(bWalkKeyID)
label(bWalkKeyPressed)
registersymbol(bWalkKeyPressed)
label(dMoveSpeedMultiplier)
registersymbol(dMoveSpeedMultiplier)
alloc(newmem,2048,yForceWrite1AOB+5) //"SAOFB-Win64-Shipping.exe"+4F27D7)
label(returnhere)
label(originalcode_yForceWrite1AOB)
registersymbol(originalcode_yForceWrite1AOB)
label(exit)
newmem: //this is allocated memory, you have read,write,execute access
//place your code here
mov rax,bWalkKeyPressed
cmp byte ptr [rax],1
jne @f
mov rax,dMoveSpeedMultiplier
mulss xmm0,[rax]
originalcode_yForceWrite1AOB:
readmem(yForceWrite1AOB+5,6)
//movss [r11+3C],xmm0
exit:
jmp returnhere
///
bWalkKeyID:
dd walkkeyiddefault
bWalkKeyPressed:
dd 0
dMoveSpeedMultiplier:
dd (float)0.4
///
yForceWrite1AOB+5: //"SAOFB-Win64-Shipping.exe"+4F27D7:
jmp newmem
nop
returnhere:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem)
yForceWrite1AOB+5: //"SAOFB-Win64-Shipping.exe"+4F27D7:
readmem(originalcode_yForceWrite1AOB,6)
//db F3 41 0F 11 43 3C
//Alt: movss [r11+3C],xmm0
unregistersymbol(originalcode_yForceWrite1AOB)
unregistersymbol(bWalkKeyID)
unregistersymbol(bWalkKeyPressed)
unregistersymbol(dMoveSpeedMultiplier)
13041
""
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
luaCall(lua_aobscan("yForceWrite2AOB","SAOFB-Win64-Shipping.exe","75 03 0F 57 ** F3 41 ** ** ** ** 40 ** ** ** 0F84",1))
alloc(newmem2,2048,yForceWrite2AOB+5) //"SAOFB-Win64-Shipping.exe"+4F2887)
label(returnhere2)
label(originalcode2_yForceWrite2AOB)
registersymbol(originalcode2_yForceWrite2AOB)
label(exit2)
newmem2: //this is allocated memory, you have read,write,execute access
//place your code here
mov rax,bWalkKeyPressed
cmp byte ptr [rax],1
jne @f
mov rax,dMoveSpeedMultiplier
mulss xmm0,[rax]
originalcode2_yForceWrite2AOB:
readmem(yForceWrite2AOB+5,6)
//movss [r11+3C],xmm0
exit2:
jmp returnhere2
///
yForceWrite2AOB+5: //"SAOFB-Win64-Shipping.exe"+4F2887:
jmp newmem2
nop
returnhere2:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem2)
yForceWrite2AOB+5: //"SAOFB-Win64-Shipping.exe"+4F2887:
readmem(originalcode2_yForceWrite2AOB,6)
//db F3 41 0F 11 43 3C
//Alt: movss [r11+3C],xmm0
unregistersymbol(originalcode2_yForceWrite2AOB)
13042
""
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
luaCall(lua_aobscan("xForceWrite1AOB","SAOFB-Win64-Shipping.exe","75 03 0F 57 ** F3 41 ** ** ** ** 40 ** ** ** 0F84",2))
alloc(newmem3,2048,xForceWrite1AOB+5) //"SAOFB-Win64-Shipping.exe"+4F2937)
label(returnhere3)
label(originalcode3_xForceWrite1AOB)
registersymbol(originalcode3_xForceWrite1AOB)
label(exit3)
newmem3: //this is allocated memory, you have read,write,execute access
//place your code here
mov rax,bWalkKeyPressed
cmp byte ptr [rax],1
jne @f
mov rax,dMoveSpeedMultiplier
mulss xmm0,[rax]
originalcode3_xForceWrite1AOB:
readmem(xForceWrite1AOB+5,6)
//movss [r11+38],xmm0
exit3:
jmp returnhere3
///
xForceWrite1AOB+5: //"SAOFB-Win64-Shipping.exe"+4F2937:
jmp newmem3
nop
returnhere3:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem3)
xForceWrite1AOB+5: //"SAOFB-Win64-Shipping.exe"+4F2937:
readmem(originalcode3_xForceWrite1AOB,6)
//db F3 41 0F 11 43 38
//Alt: movss [r11+38],xmm0
unregistersymbol(originalcode3_xForceWrite1AOB)
13043
""
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
aobscanmodule(xForceWrite2AOB,SAOFB-Win64-Shipping.exe,74 03 0F 57 C1 F3 ** ** ** ** ** 0F ** ** ** 0F 83)
registersymbol(xForceWrite2AOB)
alloc(newmem4,2048,xForceWrite2AOB+5) //"SAOFB-Win64-Shipping.exe"+4F29E7)
label(returnhere4)
label(originalcode4_xForceWrite2AOB)
registersymbol(originalcode4_xForceWrite2AOB)
label(exit4)
newmem4: //this is allocated memory, you have read,write,execute access
//place your code here
mov rax,bWalkKeyPressed
cmp byte ptr [rax],1
jne @f
mov rax,dMoveSpeedMultiplier
mulss xmm0,[rax]
originalcode4_xForceWrite2AOB:
readmem(xForceWrite2AOB+5,6)
//movss [r11+38],xmm0
exit4:
jmp returnhere4
///
xForceWrite2AOB+5: //"SAOFB-Win64-Shipping.exe"+4F29E7:
jmp newmem4
nop
returnhere4:
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
dealloc(newmem4)
xForceWrite2AOB+5: //"SAOFB-Win64-Shipping.exe"+4F29E7:
readmem(originalcode4_xForceWrite2AOB,6)
//db F3 41 0F 11 43 38
//Alt: movss [r11+38],xmm0
unregistersymbol(originalcode4_xForceWrite2AOB)
13044
""
FF0000
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
///*****************************************///
//modified from TheyCallMeTim13's lua keylistener script
//http://fearlessrevolution.com/viewtopic.php?f=4&t=6041&start=60#p62657
{$lua}
local function walkkeyLuaThread(thread2)
local addr2 = getAddressSafe('bWalkKeyPressed')
while RunWalkkeyLuaThreadLoop do
sleep(100)
if addr2 then
if ( isKeyPressed( readInteger('bWalkKeyID') ) ) then
writeBytes(addr2, 1)
else
writeBytes(addr2, 0)
end
else
addr2 = getAddressSafe('bWalkKeyPressed')
end
end
thread2.terminate()
-- while RunWalkkeyLuaThreadLoop do
-- if ( isKeyPressed(VK_CAPITAL) ) then
-- writeBytes("bWalkKeyPressed" ,1)
-- else
-- writeBytes("bWalkKeyPressed" ,0)
-- end
-- end
-- thread2.terminate()
end
----------------------------------
if syntaxcheck then return end
RunWalkkeyLuaThreadLoop = true
createThread(walkkeyLuaThread)
{$asm}
///*****************************************///
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
{$lua}
if syntaxcheck then return end
RunWalkkeyLuaThreadLoop = false
{$asm}
///*****************************************///
13035
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"SAOFB-Win64-Shipping.exe"+6C4A7B5:
db 90 90
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"SAOFB-Win64-Shipping.exe"+6C4A7B5:
db 7C 0E
//Alt: jl SAOFB-Win64-Shipping.exe+6C4A7C5
13036
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"SAOFB-Win64-Shipping.exe"+6C4A789:
db 90 90
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"SAOFB-Win64-Shipping.exe"+6C4A789:
db 7C 3A
//Alt: jl SAOFB-Win64-Shipping.exe+6C4A7C5
13037
"4 Bytes"
4 Bytes
3555E3D8
13038
"Auto Assemble script"
Auto Assembler Script
[ENABLE]
//code from here to '[DISABLE]' will be used to enable the cheat
"SAOFB-Win64-Shipping.exe"+7CF430:
db B0 01
[DISABLE]
//code from here till the end of the code will be used to disable the cheat
"SAOFB-Win64-Shipping.exe"+7CF430:
db 32 C0
//Alt: xor al,al
Code :movss xmm0,[rcx+28]
SAOFB-Win64-Shipping.exe+5DE1A07
0F
2E
C8
74
0D
F3
0F
10
41
28
F3
0F
5E
C1
C3
Code :addss xmm0,dword ptr [rcx+28]
SAOFB-Win64-Shipping.exe+5E01417
49
08
0F
28
C6
F3
0F
58
41
28
0F
2F
C1
F3
0F
Code :movss [rcx+28],xmm0
SAOFB-Win64-Shipping.exe+5E0141F
41
28
0F
2F
C1
F3
0F
11
41
28
72
05
F3
0F
11
Code :movss [rcx+28],xmm1
SAOFB-Win64-Shipping.exe+5E01426
11
41
28
72
05
F3
0F
11
49
28
48
83
C7
10
48
Code :comiss xmm0,[rcx+28]
SAOFB-Win64-Shipping.exe+5DE6960
F3
0F
10
41
08
0F
2F
41
28
0F
96
D0
C3
30
Code :mov [rax+28],00000000
SAOFB-Win64-Shipping.exe+5DFD033
48
8B
44
CA
18
C7
40
28
00
00
00
00
C6
40
2C
01
48
Code :movss [r11+3C],xmm0
SAOFB-Win64-Shipping.exe+4F27D7
74
03
0F
57
C1
F3
41
0F
11
43
3C
40
F6
C7
02
0F
Code :movss [r11+3C],xmm0
SAOFB-Win64-Shipping.exe+4F2887
75
03
0F
57
C1
F3
41
0F
11
43
3C
40
F6
C7
04
0F
Code :movss [r11+38],xmm0
SAOFB-Win64-Shipping.exe+4F2937
75
03
0F
57
C1
F3
41
0F
11
43
38
40
F6
C7
08
0F
Code :movss [r11+38],xmm0
SAOFB-Win64-Shipping.exe+4F29E7
74
03
0F
57
C1
F3
41
0F
11
43
38
0F
BA
E7
08
0F
yForceWrite2AOB
1404F2882
xForceWrite1AOB
1404F2932
https://fearlessrevolution.com/viewtopic.php?f=4&t=9782
https://www.patreon.com/Cielos