Re: Mortal Kombat 11 - table v: 1.0.6 CT
Posted: Thu May 09, 2019 9:48 pm
Table Updated:
- v 1.0.6: Updated to latest game version (0.1.103-10-CLI34469).
Community Cheat Tables of Cheat Engine
https://fearlessrevolution.com/
It doesn't really work. You can set the value but it still just works off that value, so if you set it to 0 you'll just get nothing. But you can follow from there and find where it figures out what you get based on the value or where it decreases the koins, I just never found the right spot.Another_ari wrote: ↑Fri May 10, 2019 5:57 pmHow can i use "Shrine Offering Read Hook"? Is this to cheat the Shrine?
I'd Second this!Morisato wrote: ↑Fri May 10, 2019 7:55 pmJust a quick question, I noticed on the first page that a person shared an image with them with 9,999,xxx in coins, souls, and hearts. How does one do that? I was in the assumption that setting a negative value or something gives you currency instead or something to that latter. The features shown don't really go into detail what each option does.
Be prepared to get called an OCD retard that ruined the game industry, and get said something like "JUST PLAY THE GAAAME, LOOOL"RaZ0R_R wrote: ↑Fri May 10, 2019 8:21 pmWould it be possible for hooks to unlock towers within towers of time without requirements met?
Even just the 'required' values like '100 crushing blows requirement', etc? 75 brutalities/75 fatalities was pushing it, but 100 crushing blows against the AI is just overdoing it.
To get koins, change the value of Khronika's Orb\Vault to negative value. To write them properly, go to Edit>Settings>General Settings> and check the "Show values as if they are signed" box. It works only on Kronika ones, btw. And to get souls\hearts, do the same with any of those chest.MashiroQT wrote: ↑Fri May 10, 2019 10:32 pmI'd Second this!Morisato wrote: ↑Fri May 10, 2019 7:55 pmJust a quick question, I noticed on the first page that a person shared an image with them with 9,999,xxx in coins, souls, and hearts. How does one do that? I was in the assumption that setting a negative value or something gives you currency instead or something to that latter. The features shown don't really go into detail what each option does.
How can you get unlimited Koins?, i tried a way yesterday but the Numbers didn't Change at all!
How to return everything to its original state? That all the chests again began to cost as before breakingShyTwig16 wrote: ↑Fri Apr 26, 2019 11:20 amHere's a Krypt unlocker based on SunBeams findings.
This will Unlock all chests and doors and set the chest cost to 1 for all types, but you have to approach the chest twice to see the change. But there is something that resets some of the chests when I reloaded the game and it doesn't work on those.
Code: Select all
{ Process : MK11.exe - (x64) Module : MK11.exe Game Title : MK11 Game Version : 1.0.0.0 CE Version : 6.83 Script Version : 0.0.1 Date : 04/26/19 Author : ShyTwig16 Name : KryptChestCheckHook Krypt Chest Check Hook } {$STRICT} define(address, MK11.exe+8E5DD1F) define(bytes, 83 BB 28 04 00 00 FF) //// //// ------------------------------ ENABLE ------------------------------ [ENABLE] aobScanModule(aobKryptChestCheckHook, MK11.exe, F7xxxxxxxxxxxxxxxxxx0F85xxxxxxxx83xxxxxxxxxxxx74xx83xxxxxxxxxxxx74xx83xxxxxxxxxxxx0F85xxxxxxxx83xxxxxxxxxxxx0F85xxxxxxxx83) define(injKryptChestCheckHook, aobKryptChestCheckHook+10) assert(injKryptChestCheckHook, bytes) registerSymbol(injKryptChestCheckHook) alloc(memKryptChestCheckHook, 0x400, injKryptChestCheckHook) label(ptrKryptChestCheckHook) registerSymbol(ptrKryptChestCheckHook) label(n_code) label(o_code) label(exit) label(return) memKryptChestCheckHook: ptrKryptChestCheckHook: dq 0 align 10 CC n_code: push rax mov [ptrKryptChestCheckHook],rbx or byte ptr [rbx+D0],08 cmp dword ptr [rbx+488],00 je @f mov dword ptr [rbx+488],01 jmp o_code @@: cmp dword ptr [rbx+4B8],00 je @f mov dword ptr [rbx+4B8],01 jmp o_code @@: mov rax,[rbx+1C8] test rax,rax jz o_code cmp dword ptr [rax+10],00 je @f mov dword ptr [rax+10],01 jmp o_code @@: o_code: cmp dword ptr [rbx+00000428],-01 exit: pop rax jmp return //// //// ---------- Injection Point ---------- injKryptChestCheckHook: jmp n_code nop nop return: //// //// ------------------------------ DISABLE ------------------------------ [DISABLE] //// //// ---------- Injection Point ---------- injKryptChestCheckHook: db bytes unregisterSymbol(injKryptChestCheckHook) unregisterSymbol(ptrKryptChestCheckHook) dealloc(memKryptChestCheckHook) { //// Injection Point: MK11.exe+8E5DD1F - 0000000148E5DD1F //// AOB address: 0000000148E5DD0F - MK11.exe+8E5DD0F //// Process: MK11.exe - 0000000140000000 //// Module: MK11.exe - 0000000140000000 //// Module Size: 0000000017EBE000 MK11.exe+8E5DCCE: 48 8B 0C 24 - mov rcx,[rsp] MK11.exe+8E5DCD2: 48 8D 64 24 08 - lea rsp,[rsp+08] MK11.exe+8E5DCD7: 9D - popfq MK11.exe+8E5DCD8: 53 - push rbx MK11.exe+8E5DCD9: 48 8D 1D F0DF2101 - lea rbx,[14A07BCD0] [245C8948] MK11.exe+8E5DCE0: 48 87 1C 24 - xchg [rsp],rbx MK11.exe+8E5DCE4: C3 - ret MK11.exe+8E5DCE5: 4C 8D 3D B03B5C0E - lea r15,[15742189C] [8D4C3289] MK11.exe+8E5DCEC: 41 FF E3 - jmp r11 MK11.exe+8E5DCEF: 3D 48894C24 - cmp eax,244C8948 [(float)-0.0304] MK11.exe+8E5DCF4: 08 53 48 - or [rbx+48],dl MK11.exe+8E5DCF7: 83 EC 70 - sub esp,70 MK11.exe+8E5DCFA: 48 89 CB - mov rbx,rcx MK11.exe+8E5DCFD: 31 D2 - xor edx,edx MK11.exe+8E5DCFF: 31 C9 - xor ecx,ecx MK11.exe+8E5DD01: E8 3AB25DF7 - call 140438F40 MK11.exe+8E5DD06: 48 85 C0 - test rax,rax MK11.exe+8E5DD09: 0F84 47050000 - je 148E5E256 MK11.exe+8E5DD0F: F7 83 D0000000 00000200 - test [rbx+000000D0],20000 <<<--- AOB Starts Here MK11.exe+8E5DD19: 0F85 37050000 - jne 148E5E256 //// INJECTING START ---------------------------------------------------------- MK11.exe+8E5DD1F: 83 BB 28040000 FF - cmp dword ptr [rbx+00000428],-01 //// INJECTING END ---------------------------------------------------------- MK11.exe+8E5DD26: 74 30 - je 148E5DD58 MK11.exe+8E5DD28: 83 BB 58040000 FF - cmp dword ptr [rbx+00000458],-01 MK11.exe+8E5DD2F: 74 27 - je 148E5DD58 MK11.exe+8E5DD31: 83 BB 88040000 00 - cmp dword ptr [rbx+00000488],00 MK11.exe+8E5DD38: 0F85 18050000 - jne 148E5E256 MK11.exe+8E5DD3E: 83 BB B8040000 00 - cmp dword ptr [rbx+000004B8],00 MK11.exe+8E5DD45: 0F85 0B050000 - jne 148E5E256 MK11.exe+8E5DD4B: 83 BB E8040000 00 - cmp dword ptr [rbx+000004E8],00 MK11.exe+8E5DD52: 0F85 FE040000 - jne 148E5E256 MK11.exe+8E5DD58: 48 89 6C 24 68 - mov [rsp+68],rbp MK11.exe+8E5DD5D: 48 8B 2D 1C5320FA - mov rbp,[143063080] [74E4B940] MK11.exe+8E5DD64: 48 89 AC 24 98000000 - mov [rsp+00000098],rbp MK11.exe+8E5DD6C: 48 85 ED - test rbp,rbp MK11.exe+8E5DD6F: 0F84 DC040000 - je 148E5E251 MK11.exe+8E5DD75: 48 89 D9 - mov rcx,rbx MK11.exe+8E5DD78: E8 D3EB98F7 - call 1407EC950 MK11.exe+8E5DD7D: 83 F8 05 - cmp eax,05 MK11.exe+8E5DD80: 0F84 CB040000 - je 148E5E251 MK11.exe+8E5DD86: 48 83 BB C8010000 00 - cmp qword ptr [rbx+000001C8],00 MK11.exe+8E5DD8E: 0F85 BD040000 - jne 148E5E251 //// Template: I2CEA_AOBFullInjectionWithValues //// Generated with: I2 Cheat Engine Auto Assembler Script Template Generator //// Code Happy, Code Freely, Be Awesome. }
If you want it to only approach the chest once use this script as well.Code: Select all
{ Process : MK11.exe - (x64) Module : MK11.exe Game Title : MK11 Game Version : 1.0.0.0 CE Version : 6.83 Script Version : 0.0.1 Date : 04/25/19 Author : ShyTwig16 Name : KryptChestReadHook Krypt Chest Read Hook } {$STRICT} define(address, MK11.exe+8E87480) define(bytes, 8B 96 88 04 00 00) //// //// ------------------------------ ENABLE ------------------------------ [ENABLE] aobScanModule(aobKryptChestReadHook, MK11.exe, 48xxxxFFxx8Bxxxxxxxxxx8Bxxxxxxxxxx8Bxxxxxxxxxx41xxxxxx75) define(injKryptChestReadHook, aobKryptChestReadHook+5) assert(injKryptChestReadHook, bytes) registerSymbol(injKryptChestReadHook) alloc(memKryptChestReadHook, 0x400, injKryptChestReadHook) label(intKryptChestReadHook) registerSymbol(intKryptChestReadHook) label(ptrKryptChestReadHook) registerSymbol(ptrKryptChestReadHook) label(n_code) label(o_code) label(exit) label(return) memKryptChestReadHook: intKryptChestReadHook: dd (int)1 align 10 ptrKryptChestReadHook: dq 0 align 10 CC n_code: mov [ptrKryptChestReadHook],rsi mov edx,[intKryptChestReadHook] cmp dword ptr [rsi+488],00 je @f mov [rsi+488],edx jmp o_code @@: cmp dword ptr [rsi+4B8],00 je @f mov [rsi+4B8],edx jmp o_code @@: o_code: mov edx,[rsi+00000488] exit: jmp return //// //// ---------- Injection Point ---------- injKryptChestReadHook: jmp n_code nop return: //// //// ------------------------------ DISABLE ------------------------------ [DISABLE] //// //// ---------- Injection Point ---------- injKryptChestReadHook: db bytes unregisterSymbol(injKryptChestReadHook) unregisterSymbol(intKryptChestReadHook) unregisterSymbol(ptrKryptChestReadHook) dealloc(memKryptChestReadHook) { //// Injection Point: MK11.exe+8E87480 - 0000000148E87480 //// AOB address: 0000000148E8747B - MK11.exe+8E8747B //// Process: MK11.exe - 0000000140000000 //// Module: MK11.exe - 0000000140000000 //// Module Size: 0000000017EBE000 MK11.exe+8E87439: C1 E8 0F - shr eax,0F MK11.exe+8E8743C: F6 D0 - not al MK11.exe+8E8743E: 24 01 - and al,01 MK11.exe+8E87440: 48 8B 5C 24 30 - mov rbx,[rsp+30] MK11.exe+8E87445: 48 8B 74 24 38 - mov rsi,[rsp+38] MK11.exe+8E8744A: 48 83 C4 20 - add rsp,20 MK11.exe+8E8744E: 5F - pop rdi MK11.exe+8E8744F: C3 - ret MK11.exe+8E87450: 48 89 F1 - mov rcx,rsi MK11.exe+8E87453: E8 383C96F7 - call 1407EB090 MK11.exe+8E87458: 41 89 C0 - mov r8d,eax MK11.exe+8E8745B: FF C8 - dec eax MK11.exe+8E8745D: 83 F8 16 - cmp eax,16 MK11.exe+8E87460: 77 1E - ja 148E87480 MK11.exe+8E87462: 48 63 C8 - movsxd rcx,eax MK11.exe+8E87465: 48 8D 05 948B17F7 - lea rax,[140000000] [00905A4D] MK11.exe+8E8746C: 0FB6 8C 08 4CBE7E00 - movzx ecx,byte ptr [rax+rcx+007EBE4C] MK11.exe+8E87474: 8B 94 88 44BE7E00 - mov edx,[rax+rcx*4+007EBE44] MK11.exe+8E8747B: 48 01 C2 - add rdx,rax <<<--- AOB Starts Here MK11.exe+8E8747E: FF E2 - jmp rdx //// INJECTING START ---------------------------------------------------------- MK11.exe+8E87480: 8B 96 88040000 - mov edx,[rsi+00000488] //// INJECTING END ---------------------------------------------------------- MK11.exe+8E87486: 8B 8E B8040000 - mov ecx,[rsi+000004B8] MK11.exe+8E8748C: 8B 86 E8040000 - mov eax,[rsi+000004E8] MK11.exe+8E87492: 41 83 F8 0C - cmp r8d,0C MK11.exe+8E87496: 75 3C - jne 148E874D4 MK11.exe+8E87498: 85 C9 - test ecx,ecx MK11.exe+8E8749A: 7E 1A - jle 148E874B6 MK11.exe+8E8749C: C7 07 02000000 - mov [rdi],00000002 MK11.exe+8E874A2: B0 01 - mov al,01 MK11.exe+8E874A4: 89 0B - mov [rbx],ecx MK11.exe+8E874A6: 48 8B 5C 24 30 - mov rbx,[rsp+30] MK11.exe+8E874AB: 48 8B 74 24 38 - mov rsi,[rsp+38] MK11.exe+8E874B0: 48 83 C4 20 - add rsp,20 MK11.exe+8E874B4: 5F - pop rdi MK11.exe+8E874B5: C3 - ret MK11.exe+8E874B6: 85 C0 - test eax,eax MK11.exe+8E874B8: 7E 24 - jle 148E874DE MK11.exe+8E874BA: C7 07 03000000 - mov [rdi],00000003 MK11.exe+8E874C0: 89 03 - mov [rbx],eax MK11.exe+8E874C2: B0 01 - mov al,01 MK11.exe+8E874C4: 48 8B 5C 24 30 - mov rbx,[rsp+30] //// Template: I2CEA_AOBFullInjection //// Generated with: I2 Cheat Engine Auto Assembler Script Template Generator //// Code Happy, Code Freely, Be Awesome. }
Have fun, where you going this time?
EDIT:
Does anyone know what this chest is?
[Link]
[Link]