Attack on Titan 2/A.O.T. 2 - Codex

Upload your cheat tables here (No requests)
CeLioCiBR
Expert Cheater
Expert Cheater
Posts: 77
Joined: Wed Apr 26, 2017 10:02 am
Reputation: 1

Attack on Titan 2/A.O.T. 2 - Codex

Post by CeLioCiBR » Sat Jul 14, 2018 2:09 am

Hey guys xD
so, can anyone update the table to work with the last update ?
thank's anyway xD
Last edited by CeLioCiBR on Mon Jun 24, 2019 5:28 pm, edited 1 time in total.

nomar
Noobzor
Noobzor
Posts: 8
Joined: Sat Mar 04, 2017 7:47 pm
Reputation: 3

Attack on Titan 2/A.O.T. 2 - Codex

Post by nomar » Fri Jul 27, 2018 11:48 pm

Just bought the game, it seems that there is no working table right?

xspeed
Cheater
Cheater
Posts: 49
Joined: Thu Mar 29, 2018 7:14 am
Reputation: 3

Attack on Titan 2/A.O.T. 2 - Codex

Post by xspeed » Sat Jul 28, 2018 9:25 am

Last table work for inf gas, blade, money, upgrade no mat. cost an consumables. Rest is not working :/

xspeed
Cheater
Cheater
Posts: 49
Joined: Thu Mar 29, 2018 7:14 am
Reputation: 3

Attack on Titan 2/A.O.T. 2 - Codex

Post by xspeed » Thu Aug 09, 2018 3:18 pm

Sorry for double post, but today was a update and it would be cool, if someone do the new table for the game or update the last one :)

XanaTitan303
Expert Cheater
Expert Cheater
Posts: 89
Joined: Thu Mar 22, 2018 2:00 pm
Reputation: 1

Re: Attack on Titan 2/A.O.T. 2 - Codex

Post by XanaTitan303 » Thu Aug 16, 2018 11:47 pm

predprey wrote:
Fri Jun 22, 2018 6:12 am
Taking inspiration from [USER=9013]@fangg0219[/USER] 's Auto Counter Scripts, here's a script for Auto Hook Drive. Only dodges, so you still have to press attack yourself.
SpoilerShow
[ENABLE]

aobscanmodule(aob_grabFunc,AOT2_EU.exe,48 89 5C 24 30 49 8B 98) // should be unique

aobscanmodule(aob_dodgeBranch,AOT2_EU.exe,8B 83 30 03 00 00 D0 E8 A8 01 0F 84 12 04) // should be unique

alloc(newmem_grabFunc,$100,"AOT2_EU.exe"+82F37E)

alloc(isGrabbing,$4,"AOT2_EU.exe"+82F37E)



registersymbol(aob_grabFunc)

registersymbol(aob_dodgeBranch)

registersymbol(isGrabbing)



newmem_grabFunc:

cmp [isGrabbing],0

jne short @f

mov [isGrabbing],4 // Counter for Pressing Button

@@:

add rsp,20

pop rdi

pop rax

jmp aob_dodgeBranch



isGrabbing:

db 00 00 00 00



aob_grabFunc:

jmp newmem_grabFunc



////////////////////////////////////////////////////////////////////////////////////////////////////



aobscanmodule(aob_hookDriveFlag,AOT2_EU.exe,48 C1 E8 16 A8 01 74 04) // should be unique

alloc(newmem_hookDriveFlag,$100,"AOT2_EU.exe"+85F3C4)



label(return_hookDriveFlag)



newmem_hookDriveFlag:

shr rax,16

cmp [isGrabbing],0

je short @f

or al,01

@@:

test al,01

jmp return_hookDriveFlag



aob_hookDriveFlag:

jmp newmem_hookDriveFlag

nop

return_hookDriveFlag:

registersymbol(aob_hookDriveFlag)



////////////////////////////////////////////////////////////////////////////////////////////////////



aobscanmodule(aob_dinputScan,AOT2_EU.exe,44 38 AC 88 FC 00 00 00) // should be unique

alloc(newmem_dinputScan,$100,"AOT2_EU.exe"+DCF2A7)



label(exit_dinputScan)

label(originalcode)

label(return_dinputScan)



newmem_dinputScan:

cmp [isGrabbing],0

je short originalcode

push rbx

mov rbx,[r12+08] //Button Settings Array

@@:

cmp byte ptr [rbx+1C],r11l //Jump Button DInput ScanCode

jne short @f

cmp [rax+rcx*4+FC],80 //Button already held awaiting game read

je short @f

mov [rax+rcx*4+000000FC],0000000001000180

dec [isGrabbing]

exit_dinputScan:

pop rbx

originalcode:

cmp [rax+rcx*4+000000FC],r13l

jmp return_dinputScan



aob_dinputScan:

jmp newmem_dinputScan

nop

nop

nop

return_dinputScan:

registersymbol(aob_dinputScan)



[DISABLE]

aob_grabFunc:

db 48 89 5C 24 30



unregistersymbol(aob_grabFunc)

unregistersymbol(aob_dodgeBranch)

unregistersymbol(isGrabbing)

dealloc(newmem_grabFunc)

dealloc(isGrabbing)



{

// ORIGINAL CODE - INJECTION POINT: "AOT2_EU.exe"+82F37E



"AOT2_EU.exe"+82F362: 48 83 EC 20 - sub rsp,20

"AOT2_EU.exe"+82F366: F7 02 00 00 02 00 - test [rdx],20000

"AOT2_EU.exe"+82F36C: 48 8B F9 - mov rdi,rcx

"AOT2_EU.exe"+82F36F: 77 08 - ja AOT2_EU.exe+82F379

"AOT2_EU.exe"+82F371: 33 C0 - xor eax,eax

"AOT2_EU.exe"+82F373: 48 83 C4 20 - add rsp,20

"AOT2_EU.exe"+82F377: 5F - pop rdi

"AOT2_EU.exe"+82F378: C3 - ret

"AOT2_EU.exe"+82F379: 45 85 C9 - test r9d,r9d

"AOT2_EU.exe"+82F37C: 75 F3 - jne AOT2_EU.exe+82F371

// ---------- INJECTING HERE ----------

"AOT2_EU.exe"+82F37E: 48 89 5C 24 30 - mov [rsp+30],rbx

// ---------- DONE INJECTING ----------

"AOT2_EU.exe"+82F383: 49 8B 98 F8 00 00 00 - mov rbx,[r8+000000F8]

"AOT2_EU.exe"+82F38A: 8B 83 30 03 00 00 - mov eax,[rbx+00000330]

"AOT2_EU.exe"+82F390: C0 E8 03 - shr al,03

"AOT2_EU.exe"+82F393: A8 01 - test al,01

"AOT2_EU.exe"+82F395: 74 0B - je AOT2_EU.exe+82F3A2

"AOT2_EU.exe"+82F397: 48 8B 83 08 02 00 00 - mov rax,[rbx+00000208]

"AOT2_EU.exe"+82F39E: 48 8B 58 08 - mov rbx,[rax+08]

"AOT2_EU.exe"+82F3A2: 48 8B 83 10 02 00 00 - mov rax,[rbx+00000210]

"AOT2_EU.exe"+82F3A9: 48 83 78 38 00 - cmp qword ptr [rax+38],00

"AOT2_EU.exe"+82F3AE: 74 0D - je AOT2_EU.exe+82F3BD

}



////////////////////////////////////////////////////////////////////////////////////////////////////



aob_hookDriveFlag:

db 48 C1 E8 16 A8 01



unregistersymbol(aob_hookDriveFlag)

dealloc(newmem_hookDriveFlag)



{

// ORIGINAL CODE - INJECTION POINT: "AOT2_EU.exe"+85F3C4



"AOT2_EU.exe"+85F39F: 74 04 - je AOT2_EU.exe+85F3A5

"AOT2_EU.exe"+85F3A1: 0F BA EA 09 - bts edx,09

"AOT2_EU.exe"+85F3A5: 48 B9 01 00 00 00 00 00 00 04 - mov rcx,0400000000000001

"AOT2_EU.exe"+85F3AF: 49 8B C0 - mov rax,r8

"AOT2_EU.exe"+85F3B2: 48 23 C1 - and rax,rcx

"AOT2_EU.exe"+85F3B5: 8B CA - mov ecx,edx

"AOT2_EU.exe"+85F3B7: 0F BA E9 0A - bts ecx,0A

"AOT2_EU.exe"+85F3BB: 48 85 C0 - test rax,rax

"AOT2_EU.exe"+85F3BE: 49 8B C0 - mov rax,r8

"AOT2_EU.exe"+85F3C1: 0F 44 CA - cmove ecx,edx

// ---------- INJECTING HERE ----------

"AOT2_EU.exe"+85F3C4: 48 C1 E8 16 - shr rax,16

"AOT2_EU.exe"+85F3C8: A8 01 - test al,01

// ---------- DONE INJECTING ----------

"AOT2_EU.exe"+85F3CA: 74 04 - je AOT2_EU.exe+85F3D0

"AOT2_EU.exe"+85F3CC: 0F BA E9 0A - bts ecx,0A

"AOT2_EU.exe"+85F3D0: 49 C1 E8 3A - shr r8,3A

"AOT2_EU.exe"+85F3D4: 41 F6 C0 01 - test r8l,01

"AOT2_EU.exe"+85F3D8: 74 04 - je AOT2_EU.exe+85F3DE

"AOT2_EU.exe"+85F3DA: 0F BA E9 14 - bts ecx,14

"AOT2_EU.exe"+85F3DE: 8B C1 - mov eax,ecx

"AOT2_EU.exe"+85F3E0: C3 - ret

"AOT2_EU.exe"+85F3E1: CC - int 3

"AOT2_EU.exe"+85F3E2: CC - int 3

}



////////////////////////////////////////////////////////////////////////////////////////////////////



aob_dinputScan:

db 44 38 AC 88 FC 00 00 00



unregistersymbol(aob_dinputScan)

dealloc(newmem_dinputScan)



{

// ORIGINAL CODE - INJECTION POINT: "AOT2_EU.exe"+DCF2A7



"AOT2_EU.exe"+DCF286: 45 8B F5 - mov r14d,r13d

"AOT2_EU.exe"+DCF289: 45 8B FD - mov r15d,r13d

"AOT2_EU.exe"+DCF28C: 0F 1F 40 00 - nop [rax+00]

"AOT2_EU.exe"+DCF290: 0F B6 45 00 - movzx eax,byte ptr [rbp+00]

"AOT2_EU.exe"+DCF294: 45 8B CD - mov r9d,r13d

"AOT2_EU.exe"+DCF297: 8B 56 FC - mov edx,[rsi-04]

"AOT2_EU.exe"+DCF29A: 44 8B D8 - mov r11d,eax

"AOT2_EU.exe"+DCF29D: 8B 1E - mov ebx,[rsi]

"AOT2_EU.exe"+DCF29F: 48 8D 0C 40 - lea rcx,[rax+rax*2]

"AOT2_EU.exe"+DCF2A3: 49 8B 04 24 - mov rax,[r12]

// ---------- INJECTING HERE ----------

"AOT2_EU.exe"+DCF2A7: 44 38 AC 88 FC 00 00 00 - cmp [rax+rcx*4+000000FC],r13l

// ---------- DONE INJECTING ----------

"AOT2_EU.exe"+DCF2AF: 7D 6C - jnl AOT2_EU.exe+DCF31D

"AOT2_EU.exe"+DCF2B1: 85 DB - test ebx,ebx

"AOT2_EU.exe"+DCF2B3: 75 62 - jne AOT2_EU.exe+DCF317

"AOT2_EU.exe"+DCF2B5: B9 80 00 00 00 - mov ecx,00000080

"AOT2_EU.exe"+DCF2BA: 83 FF 01 - cmp edi,01

"AOT2_EU.exe"+DCF2BD: 74 4C - je AOT2_EU.exe+DCF30B

"AOT2_EU.exe"+DCF2BF: B8 00 02 00 00 - mov eax,00000200

"AOT2_EU.exe"+DCF2C4: 44 3B D0 - cmp r10d,eax

"AOT2_EU.exe"+DCF2C7: 0F 44 C1 - cmove eax,ecx

"AOT2_EU.exe"+DCF2CA: 3B D0 - cmp edx,eax

}


Now go! And let the legend come back to life!
Thank you for this work but now it don't work anymore,can you fix it?

XanaTitan303
Expert Cheater
Expert Cheater
Posts: 89
Joined: Thu Mar 22, 2018 2:00 pm
Reputation: 1

Re: Attack on Titan 2/A.O.T. 2 - Codex

Post by XanaTitan303 » Tue Aug 28, 2018 2:37 pm

Ok guys some cheat work but the infinite titan time has been patched with the Auto Dodge so please,FIX THEM!

XanaTitan303
Expert Cheater
Expert Cheater
Posts: 89
Joined: Thu Mar 22, 2018 2:00 pm
Reputation: 1

Re: Attack on Titan 2/A.O.T. 2 - Codex

Post by XanaTitan303 » Sun Sep 09, 2018 10:31 pm

All died?

xspeed
Cheater
Cheater
Posts: 49
Joined: Thu Mar 29, 2018 7:14 am
Reputation: 3

Re: Attack on Titan 2/A.O.T. 2 - Codex

Post by xspeed » Mon Sep 10, 2018 9:53 am

Maybe they watching AoT S3 and don't have time xD

XanaTitan303
Expert Cheater
Expert Cheater
Posts: 89
Joined: Thu Mar 22, 2018 2:00 pm
Reputation: 1

Re: Attack on Titan 2/A.O.T. 2 - Codex

Post by XanaTitan303 » Mon Sep 10, 2018 12:37 pm

I hope it,in aottg all are modding for the new season and i want some new cheat after the update, :(

xspeed
Cheater
Cheater
Posts: 49
Joined: Thu Mar 29, 2018 7:14 am
Reputation: 3

Re: Attack on Titan 2/A.O.T. 2 - Codex

Post by xspeed » Mon Sep 10, 2018 4:36 pm

XanaTitan303 wrote:
Mon Sep 10, 2018 12:37 pm
I hope it,in aottg all are modding for the new season and i want some new cheat after the update, :(
Yeah me too. I like to upgrade blades and rest of my stuff to 99+. :D

XanaTitan303
Expert Cheater
Expert Cheater
Posts: 89
Joined: Thu Mar 22, 2018 2:00 pm
Reputation: 1

Re: Attack on Titan 2/A.O.T. 2 - Codex

Post by XanaTitan303 » Mon Sep 10, 2018 11:37 pm

I'm hyped for the new auto dodge fix and the infinite "buddy" transformation time! i'm waiting from a month :(

XanaTitan303
Expert Cheater
Expert Cheater
Posts: 89
Joined: Thu Mar 22, 2018 2:00 pm
Reputation: 1

Re: Attack on Titan 2/A.O.T. 2 - Codex

Post by XanaTitan303 » Wed Sep 19, 2018 11:24 am

predprey wrote:
Fri Jun 22, 2018 6:12 am
Taking inspiration from 9013 's Auto Counter Scripts, here's a script for Auto Hook Drive. Only dodges, so you still have to press attack yourself.

Code: Select all

[ENABLE]

aobscanmodule(aob_grabFunc,AOT2_EU.exe,48 89 5C 24 30 49 8B 98) // should be unique

aobscanmodule(aob_dodgeBranch,AOT2_EU.exe,8B 83 30 03 00 00 D0 E8 A8 01 0F 84 12 04) // should be unique

alloc(newmem_grabFunc,$100,"AOT2_EU.exe"+82F37E)

alloc(isGrabbing,$4,"AOT2_EU.exe"+82F37E)



registersymbol(aob_grabFunc)

registersymbol(aob_dodgeBranch)

registersymbol(isGrabbing)



newmem_grabFunc:

  cmp [isGrabbing],0

  jne short @f

  mov [isGrabbing],4 // Counter for Pressing Button

@@:

  add rsp,20

  pop rdi

  pop rax

  jmp aob_dodgeBranch



isGrabbing:

  db 00 00 00 00



aob_grabFunc:

  jmp newmem_grabFunc



////////////////////////////////////////////////////////////////////////////////////////////////////



aobscanmodule(aob_hookDriveFlag,AOT2_EU.exe,48 C1 E8 16 A8 01 74 04) // should be unique

alloc(newmem_hookDriveFlag,$100,"AOT2_EU.exe"+85F3C4)



label(return_hookDriveFlag)



newmem_hookDriveFlag:

  shr rax,16

  cmp [isGrabbing],0

  je short @f

  or al,01

@@:

  test al,01

  jmp return_hookDriveFlag



aob_hookDriveFlag:

  jmp newmem_hookDriveFlag

  nop

return_hookDriveFlag:

registersymbol(aob_hookDriveFlag)



////////////////////////////////////////////////////////////////////////////////////////////////////



aobscanmodule(aob_dinputScan,AOT2_EU.exe,44 38 AC 88 FC 00 00 00) // should be unique

alloc(newmem_dinputScan,$100,"AOT2_EU.exe"+DCF2A7)



label(exit_dinputScan)

label(originalcode)

label(return_dinputScan)



newmem_dinputScan:

  cmp [isGrabbing],0

  je short originalcode

  push rbx

  mov rbx,[r12+08] //Button Settings Array

@@:

  cmp byte ptr [rbx+1C],r11l //Jump Button DInput ScanCode

  jne short @f

  cmp [rax+rcx*4+FC],80 //Button already held awaiting game read

  je short @f

  mov [rax+rcx*4+000000FC],0000000001000180

  dec [isGrabbing]

exit_dinputScan:

  pop rbx

originalcode:

  cmp [rax+rcx*4+000000FC],r13l

  jmp return_dinputScan



aob_dinputScan:

  jmp newmem_dinputScan

  nop

  nop

  nop

return_dinputScan:

registersymbol(aob_dinputScan)



[DISABLE]

aob_grabFunc:

  db 48 89 5C 24 30



unregistersymbol(aob_grabFunc)

unregistersymbol(aob_dodgeBranch)

unregistersymbol(isGrabbing)

dealloc(newmem_grabFunc)

dealloc(isGrabbing)



{

// ORIGINAL CODE - INJECTION POINT: "AOT2_EU.exe"+82F37E



"AOT2_EU.exe"+82F362: 48 83 EC 20              -  sub rsp,20

"AOT2_EU.exe"+82F366: F7 02 00 00 02 00        -  test [rdx],20000

"AOT2_EU.exe"+82F36C: 48 8B F9                 -  mov rdi,rcx

"AOT2_EU.exe"+82F36F: 77 08                    -  ja AOT2_EU.exe+82F379

"AOT2_EU.exe"+82F371: 33 C0                    -  xor eax,eax

"AOT2_EU.exe"+82F373: 48 83 C4 20              -  add rsp,20

"AOT2_EU.exe"+82F377: 5F                       -  pop rdi

"AOT2_EU.exe"+82F378: C3                       -  ret

"AOT2_EU.exe"+82F379: 45 85 C9                 -  test r9d,r9d

"AOT2_EU.exe"+82F37C: 75 F3                    -  jne AOT2_EU.exe+82F371

// ---------- INJECTING HERE ----------

"AOT2_EU.exe"+82F37E: 48 89 5C 24 30           -  mov [rsp+30],rbx

// ---------- DONE INJECTING  ----------

"AOT2_EU.exe"+82F383: 49 8B 98 F8 00 00 00     -  mov rbx,[r8+000000F8]

"AOT2_EU.exe"+82F38A: 8B 83 30 03 00 00        -  mov eax,[rbx+00000330]

"AOT2_EU.exe"+82F390: C0 E8 03                 -  shr al,03

"AOT2_EU.exe"+82F393: A8 01                    -  test al,01

"AOT2_EU.exe"+82F395: 74 0B                    -  je AOT2_EU.exe+82F3A2

"AOT2_EU.exe"+82F397: 48 8B 83 08 02 00 00     -  mov rax,[rbx+00000208]

"AOT2_EU.exe"+82F39E: 48 8B 58 08              -  mov rbx,[rax+08]

"AOT2_EU.exe"+82F3A2: 48 8B 83 10 02 00 00     -  mov rax,[rbx+00000210]

"AOT2_EU.exe"+82F3A9: 48 83 78 38 00           -  cmp qword ptr [rax+38],00

"AOT2_EU.exe"+82F3AE: 74 0D                    -  je AOT2_EU.exe+82F3BD

}



////////////////////////////////////////////////////////////////////////////////////////////////////



aob_hookDriveFlag:

  db 48 C1 E8 16 A8 01



unregistersymbol(aob_hookDriveFlag)

dealloc(newmem_hookDriveFlag)



{

// ORIGINAL CODE - INJECTION POINT: "AOT2_EU.exe"+85F3C4



"AOT2_EU.exe"+85F39F: 74 04                          -  je AOT2_EU.exe+85F3A5

"AOT2_EU.exe"+85F3A1: 0F BA EA 09                    -  bts edx,09

"AOT2_EU.exe"+85F3A5: 48 B9 01 00 00 00 00 00 00 04  -  mov rcx,0400000000000001

"AOT2_EU.exe"+85F3AF: 49 8B C0                       -  mov rax,r8

"AOT2_EU.exe"+85F3B2: 48 23 C1                       -  and rax,rcx

"AOT2_EU.exe"+85F3B5: 8B CA                          -  mov ecx,edx

"AOT2_EU.exe"+85F3B7: 0F BA E9 0A                    -  bts ecx,0A

"AOT2_EU.exe"+85F3BB: 48 85 C0                       -  test rax,rax

"AOT2_EU.exe"+85F3BE: 49 8B C0                       -  mov rax,r8

"AOT2_EU.exe"+85F3C1: 0F 44 CA                       -  cmove ecx,edx

// ---------- INJECTING HERE ----------

"AOT2_EU.exe"+85F3C4: 48 C1 E8 16                    -  shr rax,16

"AOT2_EU.exe"+85F3C8: A8 01                          -  test al,01

// ---------- DONE INJECTING  ----------

"AOT2_EU.exe"+85F3CA: 74 04                          -  je AOT2_EU.exe+85F3D0

"AOT2_EU.exe"+85F3CC: 0F BA E9 0A                    -  bts ecx,0A

"AOT2_EU.exe"+85F3D0: 49 C1 E8 3A                    -  shr r8,3A

"AOT2_EU.exe"+85F3D4: 41 F6 C0 01                    -  test r8l,01

"AOT2_EU.exe"+85F3D8: 74 04                          -  je AOT2_EU.exe+85F3DE

"AOT2_EU.exe"+85F3DA: 0F BA E9 14                    -  bts ecx,14

"AOT2_EU.exe"+85F3DE: 8B C1                          -  mov eax,ecx

"AOT2_EU.exe"+85F3E0: C3                             -  ret

"AOT2_EU.exe"+85F3E1: CC                             -  int 3

"AOT2_EU.exe"+85F3E2: CC                             -  int 3

}



////////////////////////////////////////////////////////////////////////////////////////////////////



aob_dinputScan:

  db 44 38 AC 88 FC 00 00 00



unregistersymbol(aob_dinputScan)

dealloc(newmem_dinputScan)



{

// ORIGINAL CODE - INJECTION POINT: "AOT2_EU.exe"+DCF2A7



"AOT2_EU.exe"+DCF286: 45 8B F5                 -  mov r14d,r13d

"AOT2_EU.exe"+DCF289: 45 8B FD                 -  mov r15d,r13d

"AOT2_EU.exe"+DCF28C: 0F 1F 40 00              -  nop [rax+00]

"AOT2_EU.exe"+DCF290: 0F B6 45 00              -  movzx eax,byte ptr [rbp+00]

"AOT2_EU.exe"+DCF294: 45 8B CD                 -  mov r9d,r13d

"AOT2_EU.exe"+DCF297: 8B 56 FC                 -  mov edx,[rsi-04]

"AOT2_EU.exe"+DCF29A: 44 8B D8                 -  mov r11d,eax

"AOT2_EU.exe"+DCF29D: 8B 1E                    -  mov ebx,[rsi]

"AOT2_EU.exe"+DCF29F: 48 8D 0C 40              -  lea rcx,[rax+rax*2]

"AOT2_EU.exe"+DCF2A3: 49 8B 04 24              -  mov rax,[r12]

// ---------- INJECTING HERE ----------

"AOT2_EU.exe"+DCF2A7: 44 38 AC 88 FC 00 00 00  -  cmp [rax+rcx*4+000000FC],r13l

// ---------- DONE INJECTING  ----------

"AOT2_EU.exe"+DCF2AF: 7D 6C                    -  jnl AOT2_EU.exe+DCF31D

"AOT2_EU.exe"+DCF2B1: 85 DB                    -  test ebx,ebx

"AOT2_EU.exe"+DCF2B3: 75 62                    -  jne AOT2_EU.exe+DCF317

"AOT2_EU.exe"+DCF2B5: B9 80 00 00 00           -  mov ecx,00000080

"AOT2_EU.exe"+DCF2BA: 83 FF 01                 -  cmp edi,01

"AOT2_EU.exe"+DCF2BD: 74 4C                    -  je AOT2_EU.exe+DCF30B

"AOT2_EU.exe"+DCF2BF: B8 00 02 00 00           -  mov eax,00000200

"AOT2_EU.exe"+DCF2C4: 44 3B D0                 -  cmp r10d,eax

"AOT2_EU.exe"+DCF2C7: 0F 44 C1                 -  cmove eax,ecx

"AOT2_EU.exe"+DCF2CA: 3B D0                    -  cmp edx,eax

}


Now go! And let the legend come back to life!
Please i need this script,can you help me? the problem is this ... "The array of byte named aob_dodgeBranch could not be found"

predprey
Expert Cheater
Expert Cheater
Posts: 132
Joined: Thu Mar 02, 2017 8:46 pm
Reputation: 89

Re: Attack on Titan 2/A.O.T. 2 - Codex

Post by predprey » Thu Oct 25, 2018 8:35 am

Better late than never? :(

viewtopic.php?p=95612#p95612
Last edited by predprey on Sat Jul 06, 2019 6:02 pm, edited 1 time in total.

XanaTitan303
Expert Cheater
Expert Cheater
Posts: 89
Joined: Thu Mar 22, 2018 2:00 pm
Reputation: 1

Re: Attack on Titan 2/A.O.T. 2 - Codex

Post by XanaTitan303 » Sat Oct 27, 2018 5:26 pm

Yeah.thank you very much!! now i go test it,YEEEEEE

XanaTitan303
Expert Cheater
Expert Cheater
Posts: 89
Joined: Thu Mar 22, 2018 2:00 pm
Reputation: 1

Re: Attack on Titan 2/A.O.T. 2 - Codex

Post by XanaTitan303 » Sat Oct 27, 2018 9:50 pm

Aaaand yeah it works perfectly,gg.

Post Reply

Who is online

Users browsing this forum: Bing [Bot], nos4r2