Just Cause 2 Cheat Table

Just Cause 2 Cheat Table 2020-07-23

Login to enable download
Hexui Undetected CSGO Cheats Sinkicheat PUBG Cheat
Just Cause 2 Cheat Table
1595533076452.png


Features
  • God mode
  • infinite ammo
  • bypass debugger
Cheat Scripts
infinite health cheat:
{ Game   : JustCause2.exe
  Version:
  Date   : 2018-04-06
  Author : ChrisPC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(health1,JustCause2.exe,F3 0F 10 80 B0 01 00 00) // should be unique
alloc(newmem,$1000)

label(code)
label(return)

newmem:

code:
movss xmm0,[eax+000001B8]
movss [eax+000001B0],xmm0
  movss xmm0,[eax+000001B0]
  jmp return

health1:
  jmp newmem
  nop
  nop
  nop
return:
registersymbol(health1)

[DISABLE]

health1:
  db F3 0F 10 80 B0 01 00 00

unregistersymbol(health1)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "JustCause2.exe"+633AE1

"JustCause2.exe"+633ABC: 50                          -  push eax
"JustCause2.exe"+633ABD: 68 D8 3C E3 00              -  push JustCause2.exe+A33CD8
"JustCause2.exe"+633AC2: 56                          -  push esi
"JustCause2.exe"+633AC3: E8 38 C4 06 00              -  call JustCause2.exe+69FF00
"JustCause2.exe"+633AC8: 83 C4 0C                    -  add esp,0C
"JustCause2.exe"+633ACB: 8B 15 24 FB 18 01           -  mov edx,[JustCause2.exe+D8FB24]
"JustCause2.exe"+633AD1: 8B 82 70 35 00 00           -  mov eax,[edx+00003570]
"JustCause2.exe"+633AD7: 85 C0                       -  test eax,eax
"JustCause2.exe"+633AD9: 74 19                       -  je JustCause2.exe+633AF4
"JustCause2.exe"+633ADB: 8B 88 3C 02 00 00           -  mov ecx,[eax+0000023C]
// ---------- INJECTING HERE ----------
"JustCause2.exe"+633AE1: F3 0F 10 80 B0 01 00 00     -  movss xmm0,[eax+000001B0]
// ---------- DONE INJECTING  ----------
"JustCause2.exe"+633AE9: F3 0F 5E 84 88 B4 01 00 00  -  divss xmm0,[eax+ecx*4+000001B4]
"JustCause2.exe"+633AF2: EB 08                       -  jmp JustCause2.exe+633AFC
"JustCause2.exe"+633AF4: F3 0F 10 05 68 06 E2 00     -  movss xmm0,[JustCause2.exe+A20668]
"JustCause2.exe"+633AFC: F3 0F 11 45 FC              -  movss [ebp-04],xmm0
"JustCause2.exe"+633B01: D9 45 FC                    -  fld dword ptr [ebp-04]
"JustCause2.exe"+633B04: 51                          -  push ecx
"JustCause2.exe"+633B05: D9 1C 24                    -  fstp dword ptr [esp]
"JustCause2.exe"+633B08: 56                          -  push esi
"JustCause2.exe"+633B09: E8 12 C0 06 00              -  call JustCause2.exe+69FB20
"JustCause2.exe"+633B0E: 83 C4 08                    -  add esp,08
}
infinite ammo:
[ENABLE]

aobscanmodule(ammo2,JustCause2.exe,83 86 E8 01 00 00 FF) // should be unique
alloc(newmem,$1000)

label(code)
label(return)
label(peb2)
registersymbol(peb2)

newmem:
push eax
mov eax,fs:[00000030]
mov [peb2],eax
pop eax


code:
  add dword ptr [esi+000001E8],00
  jmp return

  peb2:
  dd 0

ammo2:
  jmp newmem
  nop
  nop
return:
registersymbol(ammo2)

[DISABLE]

ammo2:
  db 83 86 E8 01 00 00 FF

unregistersymbol(ammo2)
unregistersymbol(peb2)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "JustCause2.exe"+2EC80B

"JustCause2.exe"+2EC7EE: 8D 86 64 01 00 00        -  lea eax,[esi+00000164]
"JustCause2.exe"+2EC7F4: 50                       -  push eax
"JustCause2.exe"+2EC7F5: 8B CE                    -  mov ecx,esi
"JustCause2.exe"+2EC7F7: E8 84 E6 00 00           -  call JustCause2.exe+2FAE80
"JustCause2.exe"+2EC7FC: 8B 4D FC                 -  mov ecx,[ebp-04]
"JustCause2.exe"+2EC7FF: 51                       -  push ecx
"JustCause2.exe"+2EC800: 8B CE                    -  mov ecx,esi
"JustCause2.exe"+2EC802: E8 B9 02 01 00           -  call JustCause2.exe+2FCAC0
"JustCause2.exe"+2EC807: 84 C0                    -  test al,al
"JustCause2.exe"+2EC809: 75 07                    -  jne JustCause2.exe+2EC812
// ---------- INJECTING HERE ----------
"JustCause2.exe"+2EC80B: 83 86 E8 01 00 00 FF     -  add dword ptr [esi+000001E8],-01
// ---------- DONE INJECTING  ----------
"JustCause2.exe"+2EC812: 8B 0D 30 04 19 01        -  mov ecx,[JustCause2.exe+D90430]
"JustCause2.exe"+2EC818: 85 C9                    -  test ecx,ecx
"JustCause2.exe"+2EC81A: 74 1F                    -  je JustCause2.exe+2EC83B
"JustCause2.exe"+2EC81C: 8B 41 10                 -  mov eax,[ecx+10]
"JustCause2.exe"+2EC81F: 85 C0                    -  test eax,eax
"JustCause2.exe"+2EC821: 8D 71 10                 -  lea esi,[ecx+10]
"JustCause2.exe"+2EC824: 74 0A                    -  je JustCause2.exe+2EC830
"JustCause2.exe"+2EC826: 8B 51 14                 -  mov edx,[ecx+14]
"JustCause2.exe"+2EC829: 2B D0                    -  sub edx,eax
"JustCause2.exe"+2EC82B: C1 FA 02                 -  sar edx,02
}
C++:
  • Like
Reactions: Kleon742
Author
ChrisFayte
Downloads
1
Views
27
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from ChrisFayte

Community Mods League of Legends Accounts