Dark Sector чит-файл №1

All hack:

This scripts like flexible code-injected. What allows a full introduction to the
process
game "Dark Sector" a modified executable file (patchs game, etc..)

"Active Cheat-codes"

Code:
[ENABLE]
aobscan(_faddress1,83xxxxxxxxxxxx0fxxxxxxxxxx8dxxxxxxxx8dxxxxxxe8xxxxxxxx80)
alloc(_newmem1,2048)
label(_returnhere1)
label(_Aoriginalcode)

label(_pId)
label(_cheatHealth)
registersymbol(_pId)
registersymbol(_cheatHealth)


aobscan(_faddress2,8bxxxxxxxxxx8bxx8bxx8bxxxxxxxxxx8dxxxxxxxxc7xxxxxxxxxxxxxxffxxd9)
label(_newmem2)
label(_returnhere2)
label(_originalcode2)

label(_pres)
registersymbol(_pres)

label(_cheatmoney)
registersymbol(_cheatmoney)


_newmem1:
mov [_pId],edx

_cheatHealth:
jmp short _Aoriginalcode
mov [edx+468],#100000
mov [edx+464],#100000

_Aoriginalcode:
cmp dword ptr [edx+00000468],00
jmp _returnhere1

_newmem2:
mov [_pres],eax

_cheatmoney:
jmp short _originalcode2
mov eax,[eax]
mov [eax+1d4],#1000000

_originalcode2:
mov eax,[ebx+9c]
jmp _returnhere2

_pres:
dd 0

_pId:
dd 0


_faddress1: // 00969FE2 = DS.exe+569FE2
jmp _newmem1
nop
nop
_returnhere1:


_faddress2: // 00969D8E = DS.exe+569D8E
jmp _newmem2
nop
_returnhere2:


[DISABLE]
{ aobscan(_faddress1,90900fxxxxxxxxxx8dxxxxxxxx8dxxxxxxe8xxxxxxxx80)

_faddress1-5:
cmp dword ptr [edx+00000468],00

unregistersymbol(_pId)
unregistersymbol(_cheatHealth)
dealloc(_newmem)

aobscan(_faddress2,908bxx8bxx8bxxxxxxxxxx8dxxxxxxxxc7xxxxxxxxxxxxxxffxxd9)

_faddress2-5:
mov eax,[ebx+0000009c]

unregistersymbol(_pres)
unregistersymbol(_cheatmoney) }


Health:

Code:
[ENABLE]
_cheatHealth:
db 90 90

[DISABLE]
_cheatHealth:
db eb 14


No Reload:

Code:
[ENABLE]
aobscan(_faddress,8bxx8bxxxxxxxxxx8dxxxxxxxx8bxxbbxxxxxxxxffxx8bxx8bxxe8xxxxxxxx84xx75xx83)
alloc(_newmem,2048)
label(_returnhere)
label(_originalcode)

_newmem:
mov eax,[eax]
mov byte [eax+3e8],#30
_originalcode:
mov eax,[esi]
mov edx,[eax+00000104]
jmp _returnhere

_faddress: // 0094D900 = DS.exe+54D900
jmp _newmem
nop
nop
nop
_returnhere:

[DISABLE]
aobscan(_faddress,9090908dxxxxxxxx8bxxbbxxxxxxxxffxx8bxx8bxxe8xxxxxxxx84xx75xx83)

_faddress-5:
mov eax,[esi]
mov edx,[eax+00000104]

dealloc(_newmem)
//Alt: db 8B 06 8B 90 04 01 00 00


Inf. Ammo

Code:
[ENABLE]
aobscan(_faddress,8bxxxxxxxxxxxx74xxxxxx8dxxxxxxxxxxbfxxxxxxxx8bxx85xx74xx83xxxx74)
alloc(_newmem,2048)
label(_returnhere)
label(_originalcode)

_newmem:
pushf
push eax
mov eax,[_pres]
or eax,eax
jz short _originalcode

cmp ecx,[eax]
jne short _originalcode
mov [ecx+ebp*8+00000394],#99999

_originalcode:
pop eax
popf
mov ebx,[ecx+ebp*8+394]
jmp _returnhere

_faddress: // 0094AE8C = DS.exe+54AE8C
jmp _newmem
nop
nop
_returnhere:

[DISABLE]
aobscan(_faddress,909074xxxxxx8dxxxxxxxxxxbfxxxxxxxx8bxx85xx74xx83xxxx74)

_faddress-5:
mov ebx,[ecx+ebp*8+00000394]

dealloc(_newmem)
//Alt: db 8B 9C E9 94 03 00 00


Inf. Money:

Code:
[ENABLE]
_cheatmoney:
db 90 90

[DISABLE]
_cheatmoney:
db eb 0c