Just Cause 2 Cheat Table

Just Cause 2 Cheat Table 2020-07-23

Hexui Undetected CSGO Cheats PUBG Accounts
Just Cause 2 is an action adventure video game from Avalanche Studios. It gives players control of the leading character Rico Rodriguez with a third person perspective. The plot of the game is set on a fictional island of Panau, which turns out to be an explosive playground for the player. Since the game features an open world environment, the gamers can explore freely while they are not on missions. However, Agent Rico’s mission is to end the dictatorship in Panau and free the island from hostile rule.

The game features three distinctive categories of missions namely, Agency missions, faction missions and Stronghold missions. There are a variety of landscapes and also an arsenal of weapons for players to enjoy.

Just Cause 2 is a power packed video game designed to leave its players exhilarated. However, there are some restrictions in the gameplay which are a real pain in the neck.

Gamers always seek full enthrallment, but a few inflictions in video games kill the possibility! And this is exactly why we find our solutions in cheat engines, to maximize our gaming experience and play by our own rules. Unfortunately, some games may detect the buggers and get you in trouble. So what next? Will this stop you from using cheat codes in the game? No!

You can download our Just Cause 2 Cheat Table, which is specially formulated with the most demanded hacks and a bypass debugger. The bypass debugger will help you use cheat codes undetected by the game, it will cloak your hacks so that you can sneakily win your way through. Once you are cloaked you can use the other cheat codes in our Just Cause 2 Cheat Table, such as get an unlimited supply of ammo with the use of ‘infinite ammo’ cheat codes or become inexorable by enabling God mode. Simply download our Just Cause 2 cheats using the green button at the top of the page and get them all.

1595533076452.png


Cheat Trainer Features
  • God mode
  • infinite ammo
  • bypass debugger
Cheat Engine Scripts
infinite health cheat:
{ Game   : JustCause2.exe
  Version:
  Date   : 2018-04-06
  Author : ChrisPC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(health1,JustCause2.exe,F3 0F 10 80 B0 01 00 00) // should be unique
alloc(newmem,$1000)

label(code)
label(return)

newmem:

code:
movss xmm0,[eax+000001B8]
movss [eax+000001B0],xmm0
  movss xmm0,[eax+000001B0]
  jmp return

health1:
  jmp newmem
  nop
  nop
  nop
return:
registersymbol(health1)

[DISABLE]

health1:
  db F3 0F 10 80 B0 01 00 00

unregistersymbol(health1)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "JustCause2.exe"+633AE1

"JustCause2.exe"+633ABC: 50                          -  push eax
"JustCause2.exe"+633ABD: 68 D8 3C E3 00              -  push JustCause2.exe+A33CD8
"JustCause2.exe"+633AC2: 56                          -  push esi
"JustCause2.exe"+633AC3: E8 38 C4 06 00              -  call JustCause2.exe+69FF00
"JustCause2.exe"+633AC8: 83 C4 0C                    -  add esp,0C
"JustCause2.exe"+633ACB: 8B 15 24 FB 18 01           -  mov edx,[JustCause2.exe+D8FB24]
"JustCause2.exe"+633AD1: 8B 82 70 35 00 00           -  mov eax,[edx+00003570]
"JustCause2.exe"+633AD7: 85 C0                       -  test eax,eax
"JustCause2.exe"+633AD9: 74 19                       -  je JustCause2.exe+633AF4
"JustCause2.exe"+633ADB: 8B 88 3C 02 00 00           -  mov ecx,[eax+0000023C]
// ---------- INJECTING HERE ----------
"JustCause2.exe"+633AE1: F3 0F 10 80 B0 01 00 00     -  movss xmm0,[eax+000001B0]
// ---------- DONE INJECTING  ----------
"JustCause2.exe"+633AE9: F3 0F 5E 84 88 B4 01 00 00  -  divss xmm0,[eax+ecx*4+000001B4]
"JustCause2.exe"+633AF2: EB 08                       -  jmp JustCause2.exe+633AFC
"JustCause2.exe"+633AF4: F3 0F 10 05 68 06 E2 00     -  movss xmm0,[JustCause2.exe+A20668]
"JustCause2.exe"+633AFC: F3 0F 11 45 FC              -  movss [ebp-04],xmm0
"JustCause2.exe"+633B01: D9 45 FC                    -  fld dword ptr [ebp-04]
"JustCause2.exe"+633B04: 51                          -  push ecx
"JustCause2.exe"+633B05: D9 1C 24                    -  fstp dword ptr [esp]
"JustCause2.exe"+633B08: 56                          -  push esi
"JustCause2.exe"+633B09: E8 12 C0 06 00              -  call JustCause2.exe+69FB20
"JustCause2.exe"+633B0E: 83 C4 08                    -  add esp,08
}
infinite ammo:
[ENABLE]

aobscanmodule(ammo2,JustCause2.exe,83 86 E8 01 00 00 FF) // should be unique
alloc(newmem,$1000)

label(code)
label(return)
label(peb2)
registersymbol(peb2)

newmem:
push eax
mov eax,fs:[00000030]
mov [peb2],eax
pop eax


code:
  add dword ptr [esi+000001E8],00
  jmp return

  peb2:
  dd 0

ammo2:
  jmp newmem
  nop
  nop
return:
registersymbol(ammo2)

[DISABLE]

ammo2:
  db 83 86 E8 01 00 00 FF

unregistersymbol(ammo2)
unregistersymbol(peb2)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "JustCause2.exe"+2EC80B

"JustCause2.exe"+2EC7EE: 8D 86 64 01 00 00        -  lea eax,[esi+00000164]
"JustCause2.exe"+2EC7F4: 50                       -  push eax
"JustCause2.exe"+2EC7F5: 8B CE                    -  mov ecx,esi
"JustCause2.exe"+2EC7F7: E8 84 E6 00 00           -  call JustCause2.exe+2FAE80
"JustCause2.exe"+2EC7FC: 8B 4D FC                 -  mov ecx,[ebp-04]
"JustCause2.exe"+2EC7FF: 51                       -  push ecx
"JustCause2.exe"+2EC800: 8B CE                    -  mov ecx,esi
"JustCause2.exe"+2EC802: E8 B9 02 01 00           -  call JustCause2.exe+2FCAC0
"JustCause2.exe"+2EC807: 84 C0                    -  test al,al
"JustCause2.exe"+2EC809: 75 07                    -  jne JustCause2.exe+2EC812
// ---------- INJECTING HERE ----------
"JustCause2.exe"+2EC80B: 83 86 E8 01 00 00 FF     -  add dword ptr [esi+000001E8],-01
// ---------- DONE INJECTING  ----------
"JustCause2.exe"+2EC812: 8B 0D 30 04 19 01        -  mov ecx,[JustCause2.exe+D90430]
"JustCause2.exe"+2EC818: 85 C9                    -  test ecx,ecx
"JustCause2.exe"+2EC81A: 74 1F                    -  je JustCause2.exe+2EC83B
"JustCause2.exe"+2EC81C: 8B 41 10                 -  mov eax,[ecx+10]
"JustCause2.exe"+2EC81F: 85 C0                    -  test eax,eax
"JustCause2.exe"+2EC821: 8D 71 10                 -  lea esi,[ecx+10]
"JustCause2.exe"+2EC824: 74 0A                    -  je JustCause2.exe+2EC830
"JustCause2.exe"+2EC826: 8B 51 14                 -  mov edx,[ecx+14]
"JustCause2.exe"+2EC829: 2B D0                    -  sub edx,eax
"JustCause2.exe"+2EC82B: C1 FA 02                 -  sar edx,02
}
C++:
  • Like
Reactions: Kleon742
Author
ChrisFayte
Downloads
4
Views
188
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from ChrisFayte

Community Mods