Mortal Kombat 11 - table v: 1.0.8 CT

Upload your cheat tables here (No requests)
User avatar
SunBeam
Administration
Administration
Posts: 4915
Joined: Sun Feb 04, 2018 7:16 pm
Reputation: 4608

Re: Mortal Kombat 11 - table v: 1.0.4 CT

Post by SunBeam »

So.. WB are humans after all. They give you some compensation for the "Towers" fiasco. Too hard T_T Let's see the little bitches now whine some more "not enough"..

How to use this cheat table?
  1. Install Cheat Engine
  2. Double-click the .CT file in order to open it.
  3. Click the PC icon in Cheat Engine in order to select the game process.
  4. Keep the list.
  5. Activate the trainer options by checking boxes or setting values from 0 to 1

6yXJI0
What is cheating?
What is cheating?
Posts: 3
Joined: Tue Apr 30, 2019 5:39 pm
Reputation: 2

Re: Mortal Kombat 11 - table v: 1.0.4 CT

Post by 6yXJI0 »

SunBeam wrote:
Tue Apr 30, 2019 5:48 pm
So.. WB are humans after all. They give you some compensation for the "Towers" fiasco. Too hard T_T Let's see the little bitches now whine some more "not enough"..
Come on Man! Im just addicted to infinite chest opening. I was doing it all day and i find it mega addictive. Didn't play a single match. Only Story Mode and krypt

User avatar
SunBeam
Administration
Administration
Posts: 4915
Joined: Sun Feb 04, 2018 7:16 pm
Reputation: 4608

Re: Mortal Kombat 11 - table v: 1.0.4 CT

Post by SunBeam »

^ "Like" for admitting ;) There aren't many like you in the world. All sissy hypocrites using false pretenses to drive away people from scrutiny.

Holly
Novice Cheater
Novice Cheater
Posts: 15
Joined: Tue Apr 30, 2019 10:59 am
Reputation: 4

Re: Mortal Kombat 11 - table v: 1.0.4 CT

Post by Holly »

the store script still works for me!

User avatar
SunBeam
Administration
Administration
Posts: 4915
Joined: Sun Feb 04, 2018 7:16 pm
Reputation: 4608

Re: Mortal Kombat 11 - table v: 1.0.4 CT

Post by SunBeam »

ShyTwig16 wrote: ...
I dunno why you use this..

Code: Select all

cmp r10,8
je @f
mov [ptrHealthHook],rax
@@:
mov [ptrHealthHook+8],rax
..to determine who is P1 and P2 :) This is the original instruction:

Code: Select all

MK11.exe+448459 - F3 0F10 80 8C0B0000   - movss xmm0,[rax+00000B8C]
Now.. if you head to RAX+0x18 you'll notice this for P1:

Code: Select all

00000002
And this for P2:

Code: Select all

00010002
Figga-dill-me? :D

hvl
Noobzor
Noobzor
Posts: 8
Joined: Tue Oct 03, 2017 4:37 pm
Reputation: 1

Re: Mortal Kombat 11 - table v: 1.0.4 CT

Post by hvl »

And steam version of the game crashing for me. Could it be because of krypt unlocker script?
reinstalling game for now. Windows 10 user

sworder
Noobzor
Noobzor
Posts: 8
Joined: Sat Feb 24, 2018 10:43 pm
Reputation: 0

Re: Mortal Kombat 11 - table v: 1.0.4 CT

Post by sworder »

Thanks for the table! Btw, the game got updated on Steam. Version 1.0.4 doesn`t work anymore.

User avatar
SunBeam
Administration
Administration
Posts: 4915
Joined: Sun Feb 04, 2018 7:16 pm
Reputation: 4608

Re: Mortal Kombat 11 - table v: 1.0.4 CT

Post by SunBeam »

...it works. Not EVERYTHING, but it works.

theoxzisis
What is cheating?
What is cheating?
Posts: 2
Joined: Tue Apr 30, 2019 8:03 pm
Reputation: 0

Re: Mortal Kombat 11 - table v: 1.0.4 CT

Post by theoxzisis »

ShyTwig16 wrote:
Tue Apr 30, 2019 1:52 am
Use this at your own risk, but "Premium Shop" items for 1 time crystal. Might even want to give it a day see if I get banned, up to you.

Code: Select all

{
	Process			: MK11.exe  -  (x64)
	Module			: MK11.exe
	Game Title		: Mortal Kombat 11
	Game Version	: 1.0.0.0
	CE Version		: 6.83
	Script Version	: 0.0.1
	Date			: 04/29/19
	Author			: ShyTwig16
	Name			: StoreCostHook

	Store Cost Hook
}

{$STRICT}

define(address, MK11.exe+A9E3CC)
define(bytes, 48 63 F0 85 FF)

////
//// ------------------------------ ENABLE ------------------------------
[ENABLE]
aobScanModule(aobStoreCostHook, MK11.exe, 49xxxxE8xxxxxxxx48xxxx85xx79xx41)
define(injStoreCostHook, aobStoreCostHook+8)
assert(injStoreCostHook, bytes)
registerSymbol(injStoreCostHook)

alloc(memStoreCostHook, 0x400, injStoreCostHook)

label(intStoreCostHook)
registerSymbol(intStoreCostHook)

label(ptrStoreCostHook)
registerSymbol(ptrStoreCostHook)

label(n_code)
label(o_code)
label(exit)
label(return)

memStoreCostHook:
	intStoreCostHook:
		dd (int)1
	align 10
	ptrStoreCostHook:
		dq 0
	align 10 CC
	n_code:
		cmp r14,0
		jne o_code
			mov [ptrStoreCostHook],ecx
			mov eax,[intStoreCostHook]
			mov [rcx+8],eax
	o_code:
		movsxd  rsi,eax
		test edi,edi
	exit:
		jmp return


////
//// ---------- Injection Point ----------
injStoreCostHook:
	jmp n_code
	return:


////
//// ------------------------------ DISABLE ------------------------------
[DISABLE]
////
//// ---------- Injection Point ----------
injStoreCostHook:
	db bytes

unregisterSymbol(injStoreCostHook)

unregisterSymbol(intStoreCostHook)

unregisterSymbol(ptrStoreCostHook)

dealloc(memStoreCostHook)

{
//// Injection Point: MK11.exe+A9E3CC  -  0000000140A9E3CC
//// AOB address: 0000000140A9E3C4  -  MK11.exe+A9E3C4
//// Process: MK11.exe  -  0000000140000000
//// Module: MK11.exe  -  0000000140000000
//// Module Size: 0000000018215000
MK11.exe+A9E382:  48 8B CA                    -  mov rcx,rdx                        
MK11.exe+A9E385:  E8 E6A14100                 -  call 140EB8570                     
MK11.exe+A9E38A:  48 8D 4C 24 40              -  lea rcx,[rsp+40]                   
MK11.exe+A9E38F:  E8 1CE04000                 -  call 140EAC3B0                     
MK11.exe+A9E394:  90                          -  nop                                
MK11.exe+A9E395:  EB 2D                       -  jmp 140A9E3C4                      
MK11.exe+A9E397:  85 FF                       -  test edi,edi                       
MK11.exe+A9E399:  79 05                       -  jns 140A9E3A0                      
MK11.exe+A9E39B:  41 8B C6                    -  mov eax,r14d                       
MK11.exe+A9E39E:  EB 0A                       -  jmp 140A9E3AA                      
MK11.exe+A9E3A0:  B8 01000000                 -  mov eax,00000001                   
MK11.exe+A9E3A5:  3B F8                       -  cmp edi,eax                        
MK11.exe+A9E3A7:  0F4C C7                     -  cmovl eax,edi                      
MK11.exe+A9E3AA:  48 98                       -  cdqe                               
MK11.exe+A9E3AC:  48 6B C8 38                 -  imul rcx,rax,38                    
MK11.exe+A9E3B0:  48 8D 15 8D118501           -  lea rdx,[1422EF544]                [00000000]
MK11.exe+A9E3B7:  4A 8B 8C 21 80000000        -  mov rcx,[rcx+r12+00000080]         
MK11.exe+A9E3BF:  E8 5C81ACFF                 -  call 140566520                     
MK11.exe+A9E3C4:  49 8B CF                    -  mov rcx,r15                        <<<--- AOB Starts Here
MK11.exe+A9E3C7:  E8 84D89EFF                 -  call 14048BC50                     
////  INJECTING START  ----------------------------------------------------------
MK11.exe+A9E3CC:  48 63 F0                    -  movsxd  rsi,eax                    
MK11.exe+A9E3CF:  85 FF                       -  test edi,edi                       
////  INJECTING END  ----------------------------------------------------------
MK11.exe+A9E3D1:  79 05                       -  jns 140A9E3D8                      
MK11.exe+A9E3D3:  41 8B DE                    -  mov ebx,r14d                       
MK11.exe+A9E3D6:  EB 0A                       -  jmp 140A9E3E2                      
MK11.exe+A9E3D8:  BB 01000000                 -  mov ebx,00000001                   
MK11.exe+A9E3DD:  3B FB                       -  cmp edi,ebx                        
MK11.exe+A9E3DF:  0F4C DF                     -  cmovl ebx,edi                      
MK11.exe+A9E3E2:  BA 01000000                 -  mov edx,00000001                   
MK11.exe+A9E3E7:  48 8D 4C 24 40              -  lea rcx,[rsp+40]                   
MK11.exe+A9E3EC:  E8 DFAE4000                 -  call 140EA92D0                     
MK11.exe+A9E3F1:  90                          -  nop                                
MK11.exe+A9E3F2:  45 33 C0                    -  xor r8d,r8d                        
MK11.exe+A9E3F5:  48 8D 15 94878601           -  lea rdx,[142306B90]                ["DigitSeparator"]
MK11.exe+A9E3FC:  48 8D 0D 15AA8501           -  lea rcx,[1422F8E18]                ["General"]
MK11.exe+A9E403:  E8 B8944500                 -  call 140EF78C0                     
MK11.exe+A9E408:  4C 8B C0                    -  mov r8,rax                         
MK11.exe+A9E40B:  48 8B CE                    -  mov rcx,rsi                        
MK11.exe+A9E40E:  48 8D 54 24 40              -  lea rdx,[rsp+40]                   
MK11.exe+A9E413:  E8 98D5FCFF                 -  call 140A6B9B0                     
MK11.exe+A9E418:  48 8D 4C 24 40              -  lea rcx,[rsp+40]                   
//// Template: I2CEA_AOBFullInjectionWithValues
//// Generated with: I2 Cheat Engine Auto Assembler Script Template Generator
//// Code Happy, Code Freely, Be Awesome.
}

How do I use this script ?
Thanks

Holly
Novice Cheater
Novice Cheater
Posts: 15
Joined: Tue Apr 30, 2019 10:59 am
Reputation: 4

Re: Mortal Kombat 11 - table v: 1.0.4 CT

Post by Holly »

theoxzisis wrote:
Tue Apr 30, 2019 8:05 pm
ShyTwig16 wrote:
Tue Apr 30, 2019 1:52 am
Use this at your own risk, but "Premium Shop" items for 1 time crystal. Might even want to give it a day see if I get banned, up to you.

Code: Select all

{
	Process			: MK11.exe  -  (x64)
	Module			: MK11.exe
	Game Title		: Mortal Kombat 11
	Game Version	: 1.0.0.0
	CE Version		: 6.83
	Script Version	: 0.0.1
	Date			: 04/29/19
	Author			: ShyTwig16
	Name			: StoreCostHook

	Store Cost Hook
}

{$STRICT}

define(address, MK11.exe+A9E3CC)
define(bytes, 48 63 F0 85 FF)

////
//// ------------------------------ ENABLE ------------------------------
[ENABLE]
aobScanModule(aobStoreCostHook, MK11.exe, 49xxxxE8xxxxxxxx48xxxx85xx79xx41)
define(injStoreCostHook, aobStoreCostHook+8)
assert(injStoreCostHook, bytes)
registerSymbol(injStoreCostHook)

alloc(memStoreCostHook, 0x400, injStoreCostHook)

label(intStoreCostHook)
registerSymbol(intStoreCostHook)

label(ptrStoreCostHook)
registerSymbol(ptrStoreCostHook)

label(n_code)
label(o_code)
label(exit)
label(return)

memStoreCostHook:
	intStoreCostHook:
		dd (int)1
	align 10
	ptrStoreCostHook:
		dq 0
	align 10 CC
	n_code:
		cmp r14,0
		jne o_code
			mov [ptrStoreCostHook],ecx
			mov eax,[intStoreCostHook]
			mov [rcx+8],eax
	o_code:
		movsxd  rsi,eax
		test edi,edi
	exit:
		jmp return


////
//// ---------- Injection Point ----------
injStoreCostHook:
	jmp n_code
	return:


////
//// ------------------------------ DISABLE ------------------------------
[DISABLE]
////
//// ---------- Injection Point ----------
injStoreCostHook:
	db bytes

unregisterSymbol(injStoreCostHook)

unregisterSymbol(intStoreCostHook)

unregisterSymbol(ptrStoreCostHook)

dealloc(memStoreCostHook)

{
//// Injection Point: MK11.exe+A9E3CC  -  0000000140A9E3CC
//// AOB address: 0000000140A9E3C4  -  MK11.exe+A9E3C4
//// Process: MK11.exe  -  0000000140000000
//// Module: MK11.exe  -  0000000140000000
//// Module Size: 0000000018215000
MK11.exe+A9E382:  48 8B CA                    -  mov rcx,rdx                        
MK11.exe+A9E385:  E8 E6A14100                 -  call 140EB8570                     
MK11.exe+A9E38A:  48 8D 4C 24 40              -  lea rcx,[rsp+40]                   
MK11.exe+A9E38F:  E8 1CE04000                 -  call 140EAC3B0                     
MK11.exe+A9E394:  90                          -  nop                                
MK11.exe+A9E395:  EB 2D                       -  jmp 140A9E3C4                      
MK11.exe+A9E397:  85 FF                       -  test edi,edi                       
MK11.exe+A9E399:  79 05                       -  jns 140A9E3A0                      
MK11.exe+A9E39B:  41 8B C6                    -  mov eax,r14d                       
MK11.exe+A9E39E:  EB 0A                       -  jmp 140A9E3AA                      
MK11.exe+A9E3A0:  B8 01000000                 -  mov eax,00000001                   
MK11.exe+A9E3A5:  3B F8                       -  cmp edi,eax                        
MK11.exe+A9E3A7:  0F4C C7                     -  cmovl eax,edi                      
MK11.exe+A9E3AA:  48 98                       -  cdqe                               
MK11.exe+A9E3AC:  48 6B C8 38                 -  imul rcx,rax,38                    
MK11.exe+A9E3B0:  48 8D 15 8D118501           -  lea rdx,[1422EF544]                [00000000]
MK11.exe+A9E3B7:  4A 8B 8C 21 80000000        -  mov rcx,[rcx+r12+00000080]         
MK11.exe+A9E3BF:  E8 5C81ACFF                 -  call 140566520                     
MK11.exe+A9E3C4:  49 8B CF                    -  mov rcx,r15                        <<<--- AOB Starts Here
MK11.exe+A9E3C7:  E8 84D89EFF                 -  call 14048BC50                     
////  INJECTING START  ----------------------------------------------------------
MK11.exe+A9E3CC:  48 63 F0                    -  movsxd  rsi,eax                    
MK11.exe+A9E3CF:  85 FF                       -  test edi,edi                       
////  INJECTING END  ----------------------------------------------------------
MK11.exe+A9E3D1:  79 05                       -  jns 140A9E3D8                      
MK11.exe+A9E3D3:  41 8B DE                    -  mov ebx,r14d                       
MK11.exe+A9E3D6:  EB 0A                       -  jmp 140A9E3E2                      
MK11.exe+A9E3D8:  BB 01000000                 -  mov ebx,00000001                   
MK11.exe+A9E3DD:  3B FB                       -  cmp edi,ebx                        
MK11.exe+A9E3DF:  0F4C DF                     -  cmovl ebx,edi                      
MK11.exe+A9E3E2:  BA 01000000                 -  mov edx,00000001                   
MK11.exe+A9E3E7:  48 8D 4C 24 40              -  lea rcx,[rsp+40]                   
MK11.exe+A9E3EC:  E8 DFAE4000                 -  call 140EA92D0                     
MK11.exe+A9E3F1:  90                          -  nop                                
MK11.exe+A9E3F2:  45 33 C0                    -  xor r8d,r8d                        
MK11.exe+A9E3F5:  48 8D 15 94878601           -  lea rdx,[142306B90]                ["DigitSeparator"]
MK11.exe+A9E3FC:  48 8D 0D 15AA8501           -  lea rcx,[1422F8E18]                ["General"]
MK11.exe+A9E403:  E8 B8944500                 -  call 140EF78C0                     
MK11.exe+A9E408:  4C 8B C0                    -  mov r8,rax                         
MK11.exe+A9E40B:  48 8B CE                    -  mov rcx,rsi                        
MK11.exe+A9E40E:  48 8D 54 24 40              -  lea rdx,[rsp+40]                   
MK11.exe+A9E413:  E8 98D5FCFF                 -  call 140A6B9B0                     
MK11.exe+A9E418:  48 8D 4C 24 40              -  lea rcx,[rsp+40]                   
//// Template: I2CEA_AOBFullInjectionWithValues
//// Generated with: I2 Cheat Engine Auto Assembler Script Template Generator
//// Code Happy, Code Freely, Be Awesome.
}

How do I use this script ?
Thanks
Using google helps.
Anyway open cheat engine, open mk's process, hit ctrl+alt+A, paste the code, execute.

Does anyone know if the teleport script still work? mine doesn't seem to.

maine
Novice Cheater
Novice Cheater
Posts: 16
Joined: Mon Apr 29, 2019 2:35 pm
Reputation: 0

Re: Mortal Kombat 11 - table v: 1.0.4 CT

Post by maine »

getting this error with the new update:

I2CETLogger::CETlog - ERROR: aobScan:
Error with "RoundTimerHook.CEA", AOB pattern not found: "8B8148070000C34Cxxxxxx48xxxxxx48"

I2CETLogger::CETlog - ERROR: autoAssembleFile:
Error assembling file: "RoundTimerHook.CEA"

I2CETLogger::CETlog - ERROR: autoAssembleFile:
Error assembling file: "_Main.CEA"

funbalanced
Noobzor
Noobzor
Posts: 5
Joined: Tue Apr 30, 2019 9:24 pm
Reputation: 0

Re: Mortal Kombat 11 - table v: 1.0.4 CT

Post by funbalanced »

Thank you so much for the table! I will get much more enjoyment out of the game thanks to it.

I used to premium shop script and that worked flawlessly. I get the same errors as the previous post when I try to use any of the scripts, but if I enable the scripts in the Debug section they work fine - namely the Krypt ones and the Blindfold.

TimFun13
Expert Cheater
Expert Cheater
Posts: 1353
Joined: Fri Mar 03, 2017 12:31 am
Reputation: 7

Re: Mortal Kombat 11 - table v: 1.0.5 CT

Post by TimFun13 »

Table Updated:
  • v 1.0.5:
    • Table Updated to latest Steam version.
    • Added:
      • Premium Shop Cost Hook ( Use This At Your Own Risk! )

Kerio
Noobzor
Noobzor
Posts: 5
Joined: Wed Jun 21, 2017 2:56 pm
Reputation: 2

Re: Mortal Kombat 11 - table v: 1.0.5 CT

Post by Kerio »

Thank you very much for your work on this table. It's definitely appreciated.

Also, just thought I'd mention that there's an easy way to open the "head chests" outside the entrance of Goro's Lair, for those who want quick access to the victory poses and Shang Tsung's throne room without teleporting.
It's a bug and easily/quickly done.
Enter the Krypt, walk up to the chest in question until you see the "Locked" sign pop up, exit the Krypt and then reenter it, but keep holding X (on PS controller, A on XBox) and don't let the button go until you reach the same chest and it will open.
Counts as a legit opening, so 10 heads open the throne room, 15 open the 2nd floor door and 25 open the 1st floor door on the left.
Might work with other locked objects as well. Doors etc.

And a small hint if you can't find Jacqui's stuff in the throne room: it's not in any chest. Instead you'll find a lion statue in the back left corner of the room to the left that you can only see when you use the blindfold. Smash it and you get her items/intro/victory.

KS212
Expert Cheater
Expert Cheater
Posts: 1134
Joined: Fri Mar 03, 2017 5:29 pm
Reputation: 140

Re: Mortal Kombat 11 - table v: 1.0.5 CT

Post by KS212 »

O hay... they actually patched, holy shit. Anyone banned yet? :D

Post Reply