Echo Cheats - God Mode, Infinite Cells & more

Echo Cheats - God Mode, Infinite Cells & more 2020-07-22

Hexui Undetected CSGO Cheats Sinkicheat PUBG Cheat
Echo Cheats

1595431364165.png


Features

  • God Mode
  • Infinite Cells
  • infinite stamina
  • infinite stealth
  • enemies never grab you

Sample Scripts
God Mode Cheat:
[ENABLE]

aobscanmodule(health1,Echo-Win64-Shipping.exe,F3 0F 10 83 40 09 00 00) // should be unique
alloc(newmem,$1000,"Echo-Win64-Shipping.exe"+1B4BAD)

label(code)
label(return)

newmem:

code:
mov [rbx+00000940],(float)-.01
  movss xmm0,[rbx+00000940]
  jmp return

health1:
  jmp newmem
  nop
  nop
  nop
return:
registersymbol(health1)

[DISABLE]

health1:
  db F3 0F 10 83 40 09 00 00

unregistersymbol(health1)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "Echo-Win64-Shipping.exe"+1B4BAD

"Echo-Win64-Shipping.exe"+1B4B86: F3 0F 59 C1                 -  mulss xmm0,xmm1
"Echo-Win64-Shipping.exe"+1B4B8A: F3 0F 58 F3                 -  addss xmm6,xmm3
"Echo-Win64-Shipping.exe"+1B4B8E: F3 0F 58 E8                 -  addss xmm5,xmm0
"Echo-Win64-Shipping.exe"+1B4B92: 0F 28 C4                    -  movaps xmm0,xmm4
"Echo-Win64-Shipping.exe"+1B4B95: 0F 14 C6                    -  unpcklps xmm0,xmm6
"Echo-Win64-Shipping.exe"+1B4B98: F2 0F 11 45 07              -  movsd [rbp+07],xmm0
"Echo-Win64-Shipping.exe"+1B4B9D: F3 0F 11 6D FF              -  movss [rbp-01],xmm5
"Echo-Win64-Shipping.exe"+1B4BA2: 8B 45 FF                    -  mov eax,[rbp-01]
"Echo-Win64-Shipping.exe"+1B4BA5: 89 45 0F                    -  mov [rbp+0F],eax
"Echo-Win64-Shipping.exe"+1B4BA8: E8 03 AB 4C 00              -  call Echo-Win64-Shipping.exe+67F6B0
// ---------- INJECTING HERE ----------
"Echo-Win64-Shipping.exe"+1B4BAD: F3 0F 10 83 40 09 00 00     -  movss xmm0,[rbx+00000940]
// ---------- DONE INJECTING  ----------
"Echo-Win64-Shipping.exe"+1B4BB5: 41 0F 2F C0                 -  comiss xmm0,xmm8
"Echo-Win64-Shipping.exe"+1B4BB9: 76 15                       -  jna Echo-Win64-Shipping.exe+1B4BD0
"Echo-Win64-Shipping.exe"+1B4BBB: 80 BB 51 09 00 00 00        -  cmp byte ptr [rbx+00000951],00
"Echo-Win64-Shipping.exe"+1B4BC2: 74 0C                       -  je Echo-Win64-Shipping.exe+1B4BD0
"Echo-Win64-Shipping.exe"+1B4BC4: F3 0F 5C C7                 -  subss xmm0,xmm7
"Echo-Win64-Shipping.exe"+1B4BC8: F3 0F 11 83 40 09 00 00     -  movss [rbx+00000940],xmm0
"Echo-Win64-Shipping.exe"+1B4BD0: 80 BB E8 08 00 00 01        -  cmp byte ptr [rbx+000008E8],01
"Echo-Win64-Shipping.exe"+1B4BD7: F3 44 0F 10 0D 14 49 E1 01  -  movss xmm9,[Echo-Win64-Shipping.exe+1FC94F4]
"Echo-Win64-Shipping.exe"+1B4BE0: F3 0F 10 3D 30 87 E0 01     -  movss xmm7,[Echo-Win64-Shipping.exe+1FBD318]
"Echo-Win64-Shipping.exe"+1B4BE8: 0F 85 1A 01 00 00           -  jne Echo-Win64-Shipping.exe+1B4D08
}
Infinite Cells:
[ENABLE]

aobscanmodule(cell_charge1,Echo-Win64-Shipping.exe,F3 0F 58 B3 BC 03 00 00)
aobscanmodule(cell2,Echo-Win64-Shipping.exe,0F B6 81 B9 03 00 00 3A)
alloc(newmema,$1000,"Echo-Win64-Shipping.exe"+1A74D0)
alloc(newmem,$1000,"Echo-Win64-Shipping.exe"+1B2EB6)

label(code)
label(codea)
label(returna)
label(return)

newmem:

code:
mov [rbx+000003BC],(float)14
  addss xmm6,[rbx+000003BC]
  jmp return

cell_charge1:
  jmp newmem
  nop
  nop
  nop
return:
registersymbol(cell_charge1)

newmema:

codea:
//mov [rcx+00003B8],100
mov [rcx+00003B9],0A
  movzx eax,byte ptr [rcx+000003B9]
  jmp returna

cell2:
  jmp newmema
  nop
  nop
returna:
registersymbol(cell2)

[DISABLE]

cell_charge1:
  db F3 0F 58 B3 BC 03 00 00
cell2:
  db 0F B6 81 B9 03 00 00

unregistersymbol(cell2)
unregistersymbol(cell_charge1)
dealloc(newmem)
dealloc(newmema)
Infinite Stealth:
[ENABLE]

aobscanmodule(enemies_grab3,Echo-Win64-Shipping.exe,80 B8 28 09 00 00 00 74 0D) // should be unique
alloc(newmemb,$1000,"Echo-Win64-Shipping.exe"+1A6897)

label(codeb)
label(returnb)

newmemb:

codeb:
mov byte ptr [rax+00000928],00
  cmp byte ptr [rax+00000928],00
  jmp returnb

enemies_grab3:
  jmp newmemb
  nop
  nop
returnb:
registersymbol(enemies_grab3)

[DISABLE]

enemies_grab3:
  db 80 B8 28 09 00 00 00

unregistersymbol(enemies_grab3)
dealloc(newmemb)

{
// ORIGINAL CODE - INJECTION POINT: "Echo-Win64-Shipping.exe"+1A6897

"Echo-Win64-Shipping.exe"+1A6887: CC                    -  int 3
"Echo-Win64-Shipping.exe"+1A6888: CC                    -  int 3
"Echo-Win64-Shipping.exe"+1A6889: CC                    -  int 3
"Echo-Win64-Shipping.exe"+1A688A: CC                    -  int 3
"Echo-Win64-Shipping.exe"+1A688B: CC                    -  int 3
"Echo-Win64-Shipping.exe"+1A688C: CC                    -  int 3
"Echo-Win64-Shipping.exe"+1A688D: CC                    -  int 3
"Echo-Win64-Shipping.exe"+1A688E: CC                    -  int 3
"Echo-Win64-Shipping.exe"+1A688F: CC                    -  int 3
"Echo-Win64-Shipping.exe"+1A6890: 48 8B 81 48 01 00 00  -  mov rax,[rcx+00000148]
// ---------- INJECTING HERE ----------
"Echo-Win64-Shipping.exe"+1A6897: 80 B8 28 09 00 00 00  -  cmp byte ptr [rax+00000928],00
// ---------- DONE INJECTING  ----------
"Echo-Win64-Shipping.exe"+1A689E: 74 0D                 -  je Echo-Win64-Shipping.exe+1A68AD
"Echo-Win64-Shipping.exe"+1A68A0: 48 8B 81 30 01 00 00  -  mov rax,[rcx+00000130]
"Echo-Win64-Shipping.exe"+1A68A7: 48 85 C0              -  test rax,rax
"Echo-Win64-Shipping.exe"+1A68AA: 74 19                 -  je Echo-Win64-Shipping.exe+1A68C5
"Echo-Win64-Shipping.exe"+1A68AC: C3                    -  ret
"Echo-Win64-Shipping.exe"+1A68AD: 48 8B 81 38 01 00 00  -  mov rax,[rcx+00000138]
"Echo-Win64-Shipping.exe"+1A68B4: 48 85 C0              -  test rax,rax
"Echo-Win64-Shipping.exe"+1A68B7: 75 0E                 -  jne Echo-Win64-Shipping.exe+1A68C7
"Echo-Win64-Shipping.exe"+1A68B9: 48 8B 81 30 01 00 00  -  mov rax,[rcx+00000130]
"Echo-Win64-Shipping.exe"+1A68C0: 48 85 C0              -  test rax,rax
}
  • Like
Reactions: Kleon742
Author
ChrisFayte
Downloads
1
Views
68
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from ChrisFayte

Community Mods