Catherine Cheat Table - unlimited retries, points & credits cheats

Catherine Cheat Table - unlimited retries, points & credits cheats 2020-07-21

Login to enable download
Hexui Undetected CSGO Cheats Sinkicheat PUBG Cheat
Catherine Cheat Table

1595375013545.png


Features

  • Unlimited retries
  • massive points
  • arcade game credits
  • Power increases
  • Unlimited points
Sample Scripts

Unlimited Retries:
[ENABLE]
globalalloc(retry_dsp,4)
aobscanmodule(retry_hook1,Catherine.exe,8B 97 CC 00 00 00 83 C4 20 85)
aobscanmodule(internal_retry,Catherine.exe,0F 4E F2 83 7D 08 00)
alloc(newmema,$1000)
alloc(newmem,$1000)
label(code)
label(return)
label(codea)
label(returna)

retry_dsp:
dd 0

newmem:

code:
mov [retry_dsp],edi
  mov edx,[edi+000000CC]
  jmp return

retry_hook1:
  jmp newmem
  nop
return:
registersymbol(retry_hook1)

newmema:

codea:
  mov esi,[retry_dsp]
  mov esi,[esi+CC]
  cmp dword ptr [ebp+08],00
  jmp returna

internal_retry:
  jmp newmema
  nop
  nop
returna:
registersymbol(internal_retry)

[DISABLE]

retry_hook1:
  db 8B 97 CC 00 00 00
internal_retry:
  db 0F 4E F2 83 7D 08 00

unregistersymbol(internal_retry)
unregistersymbol(retry_hook1)
dealloc(newmem)
dealloc(newmema)

{
// ORIGINAL CODE - INJECTION POINT: "Catherine.exe"+2D5C1D

"Catherine.exe"+2D5BF2: C7 44 24 08 00 00 80 3F        -  mov [esp+08],3F800000
"Catherine.exe"+2D5BFA: C7 44 24 04 00 00 80 3F        -  mov [esp+04],3F800000
"Catherine.exe"+2D5C02: F3 0F 11 04 24                 -  movss [esp],xmm0
"Catherine.exe"+2D5C07: 6A 1F                          -  push 1F
"Catherine.exe"+2D5C09: 6A 2B                          -  push 2B
"Catherine.exe"+2D5C0B: FF 75 F0                       -  push [ebp-10]
"Catherine.exe"+2D5C0E: 51                             -  push ecx
"Catherine.exe"+2D5C0F: 8B CE                          -  mov ecx,esi
"Catherine.exe"+2D5C11: C7 04 24 00 00 00 00           -  mov [esp],00000000
"Catherine.exe"+2D5C18: E8 93 5F F3 FF                 -  call Catherine.exe+20BBB0
// ---------- INJECTING HERE ----------
"Catherine.exe"+2D5C1D: 8B 97 CC 00 00 00              -  mov edx,[edi+000000CC]
// ---------- DONE INJECTING  ----------
"Catherine.exe"+2D5C23: 83 C4 20                       -  add esp,20
"Catherine.exe"+2D5C26: 85 D2                          -  test edx,edx
"Catherine.exe"+2D5C28: 0F 88 E5 00 00 00              -  js Catherine.exe+2D5D13
"Catherine.exe"+2D5C2E: 83 BF D0 00 00 00 00           -  cmp dword ptr [edi+000000D0],00
"Catherine.exe"+2D5C35: 0F 85 D8 00 00 00              -  jne Catherine.exe+2D5D13
"Catherine.exe"+2D5C3B: F3 0F 10 45 F8                 -  movss xmm0,[ebp-08]
"Catherine.exe"+2D5C40: 81 CB 00 4D 4D 4D              -  or ebx,4D4D4D00
"Catherine.exe"+2D5C46: F3 0F 10 1D 94 8D 42 01        -  movss xmm3,[Catherine.exe+7F8D94]
"Catherine.exe"+2D5C4E: F3 0F 10 15 50 95 42 01        -  movss xmm2,[Catherine.exe+7F9550]
"Catherine.exe"+2D5C56: 6A 00                          -  push 00
}
Massive Points:
{ Game   : Catherine.exe
  Version:
  Date   : 2019-01-11
  Author : ChrisFaytePC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(timer_score,Catherine.exe,8B 4E 14 8B 46 10) // should be unique
alloc(newmem,$1000)

label(code)
label(code2)
label(return)

newmem:
cmp [esi+14],#99999
jge code
mov [esi+14],#99999
mov [esi+20],#99999
code:
cmp [esi+10],#99999
jge code2
mov [esi+10],#99999
code2:
  mov ecx,[esi+14]
  mov eax,[esi+10]
  jmp return

timer_score:
  jmp newmem
  nop
return:
registersymbol(timer_score)

timer_score+06:
db 90 90

[DISABLE]

timer_score:
  db 8B 4E 14 8B 46 10
timer_score+06:
db 2B C1

unregistersymbol(timer_score)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "Catherine.exe"+2D3562

"Catherine.exe"+2D353B: 8B 55 FC                 -  mov edx,[ebp-04]
"Catherine.exe"+2D353E: 83 C4 04                 -  add esp,04
"Catherine.exe"+2D3541: D9 E8                    -  fld1
"Catherine.exe"+2D3543: 0F 57 D2                 -  xorps xmm2,xmm2
"Catherine.exe"+2D3546: DE E1                    -  fsubrp st(1),st(0)
"Catherine.exe"+2D3548: D9 5D F4                 -  fstp dword ptr [ebp-0C]
"Catherine.exe"+2D354B: F3 0F 10 5D F4           -  movss xmm3,[ebp-0C]
"Catherine.exe"+2D3550: F3 0F 11 9E 7C 03 00 00  -  movss [esi+0000037C],xmm3
"Catherine.exe"+2D3558: EB 08                    -  jmp Catherine.exe+2D3562
"Catherine.exe"+2D355A: F3 0F 10 9E 7C 03 00 00  -  movss xmm3,[esi+0000037C]
// ---------- INJECTING HERE ----------
"Catherine.exe"+2D3562: 8B 4E 14                 -  mov ecx,[esi+14]
"Catherine.exe"+2D3565: 8B 46 10                 -  mov eax,[esi+10]
// ---------- DONE INJECTING  ----------
"Catherine.exe"+2D3568: 2B C1                    -  sub eax,ecx
"Catherine.exe"+2D356A: 66 0F 6E C1              -  movd xmm0,ecx
"Catherine.exe"+2D356E: 0F 5B C0                 -  cvtdq2ps xmm0,xmm0
"Catherine.exe"+2D3571: 66 0F 6E C8              -  movd xmm1,eax
"Catherine.exe"+2D3575: 0F 5B C9                 -  cvtdq2ps xmm1,xmm1
"Catherine.exe"+2D3578: F3 0F 59 CB              -  mulss xmm1,xmm3
"Catherine.exe"+2D357C: F3 0F 58 C8              -  addss xmm1,xmm0
"Catherine.exe"+2D3580: F3 0F 2C C1              -  cvttss2si eax,xmm1
"Catherine.exe"+2D3584: 89 46 20                 -  mov [esi+20],eax
"Catherine.exe"+2D3587: 8B 46 04                 -  mov eax,[esi+04]
}
Arcade game points:
{ Game   : Catherine.exe
  Version:
  Date   : 2019-01-11
  Author : ChrisFaytePC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(credits,Catherine.exe,48 89 87 FC 76 00 00 8D) // should be unique
alloc(newmem,$1000)

label(code)
label(return)

newmem:

code:
  //dec eax
  mov [edi+000076FC],eax
  jmp return

credits:
  jmp newmem
  nop
  nop
return:
registersymbol(credits)

[DISABLE]

credits:
  db 48 89 87 FC 76 00 00

unregistersymbol(credits)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "Catherine.exe"+2D851D

"Catherine.exe"+2D8502: 8B 87 FC 76 00 00        -  mov eax,[edi+000076FC]
"Catherine.exe"+2D8508: 85 C0                    -  test eax,eax
"Catherine.exe"+2D850A: 75 11                    -  jne Catherine.exe+2D851D
"Catherine.exe"+2D850C: 8D 48 1C                 -  lea ecx,[eax+1C]
"Catherine.exe"+2D850F: E8 9C 5D 0B 00           -  call Catherine.exe+38E2B0
"Catherine.exe"+2D8514: 5F                       -  pop edi
"Catherine.exe"+2D8515: 5E                       -  pop esi
"Catherine.exe"+2D8516: B8 01 00 00 00           -  mov eax,00000001
"Catherine.exe"+2D851B: 5B                       -  pop ebx
"Catherine.exe"+2D851C: C3                       -  ret
// ---------- INJECTING HERE ----------
"Catherine.exe"+2D851D: 48                       -  dec eax
"Catherine.exe"+2D851E: 89 87 FC 76 00 00        -  mov [edi+000076FC],eax
// ---------- DONE INJECTING  ----------
"Catherine.exe"+2D8524: 8D 8B F8 00 00 00        -  lea ecx,[ebx+000000F8]
"Catherine.exe"+2D852A: E8 01 8B 0B 00           -  call Catherine.exe+391030
"Catherine.exe"+2D852F: 8B 0D 30 EA 54 01        -  mov ecx,[Catherine.exe+91EA30]
"Catherine.exe"+2D8535: 6A 00                    -  push 00
"Catherine.exe"+2D8537: 6A 3C                    -  push 3C
"Catherine.exe"+2D8539: 6A 3C                    -  push 3C
"Catherine.exe"+2D853B: 68 15 27 00 00           -  push 00002715
"Catherine.exe"+2D8540: 8D 89 F8 00 00 00        -  lea ecx,[ecx+000000F8]
"Catherine.exe"+2D8546: E8 85 86 0B 00           -  call Catherine.exe+390BD0
"Catherine.exe"+2D854B: B9 01 00 00 00           -  mov ecx,00000001
}
  • Like
Reactions: Kleon742
Author
ChrisFayte
Downloads
0
Views
47
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from ChrisFayte

Community Mods