Just Cause 4 Cheat Table Trainer

Just Cause 4 Cheat Table Trainer 2020-07-23

Hexui Undetected CSGO Cheats PUBG Accounts
Just Cause 4 was released in 2018 by avalanche Studios as an action adventure video game. It is the fourth release of the Just Cause series. The player is given a third person perspective and the control of the leading character named Rico Rodríguez. The game is set in an open world environment and the plot is set in the fictional nation of Solís. There are ragged landscapes featuring snow, mountains and deserts and the hostile weather brings thunderstorms and tornadoes. Rico can fly with a wingsuit and grappling hook and has to complete his mission making use of the arsenal of weapons provided in the game including Wind Guns and the Lightning Guns. There is also a variety of vehicles which help Rico complete his missions and defeat the Black Hand Army.

Just Cause 4 Cheat Table Trainer

1595532758465.png


We have the perfect recipe for an action packed gameplay. Experience the fun and exhilaration in Just Cause 4 you have never experienced before with our Just Cause 4 Cheat Table. We have formulated the most demanded cheat codes and squeezed them into one cheat engine for your convenience. All you have to do is get our Just Cause 4 hacks and use them all. No one can stop you from being the master of this action game now. You will have infinite supply of ammo with the use of the infinite ammo cheat code. You can become immortal in this survival game by using the God Modes hack. Not only this, you can use the super awesome wingsuit jet whenever you want by simply enabling the infinite wingsuit jet cheat code. This cheat also features the no cooldowns, coordinate lookups, grapple modifiers and vehicle god mode hacks too. Just download the Just Cause 4 Cheat Table at the top of the page and get them all!

Cheat Trainer Features
  • God mode
  • vehicle god mode
  • infinite ammo
  • no cooldowns
  • infinite wingsuit jet
  • coordinate lookup
  • grapple modifiers
Cheat Engine Scripts
god mode cheat:
[ENABLE]

aobscanmodule(health1,JustCause4.exe,0F B7 9E AA 03 00 00) // should be unique
alloc(newmem,$1000,"JustCause4.exe"+A0B73B0)

label(code)
label(return)
label(hlth)
registersymbol(hlth)

newmem:
push rdx
mov dx,word ptr [rsi+000003AA]
mov word ptr [rsi+000003AC],dx
pop rdx

code:
mov [hlth],rsi
  movzx ebx,word ptr [rsi+000003AA]
  jmp return

  hlth:
  dq 0

health1:
  jmp newmem
  nop
  nop
return:
registersymbol(health1)

[DISABLE]

health1:
  db 0F B7 9E AA 03 00 00

unregistersymbol(health1)
unregistersymbol(hlth)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "JustCause4.exe"+A0B73B0

"JustCause4.exe"+A0B7382: E8 A9 33 1C F6           -  call JustCause4.exe+27A730
"JustCause4.exe"+A0B7387: 48 8D 57 28              -  lea rdx,[rdi+28]
"JustCause4.exe"+A0B738B: 4C 89 7C 24 20           -  mov [rsp+20],r15
"JustCause4.exe"+A0B7390: 48 8D 4F 10              -  lea rcx,[rdi+10]
"JustCause4.exe"+A0B7394: 45 31 C9                 -  xor r9d,r9d
"JustCause4.exe"+A0B7397: 4C 8D 05 02 CD 7A F8     -  lea r8,[JustCause4.exe+28640A0]
"JustCause4.exe"+A0B739E: E8 FD 98 1B F6           -  call JustCause4.exe+270CA0
"JustCause4.exe"+A0B73A3: C6 87 88 00 00 00 01     -  mov byte ptr [rdi+00000088],01
"JustCause4.exe"+A0B73AA: 48 8B 06                 -  mov rax,[rsi]
"JustCause4.exe"+A0B73AD: 48 89 F1                 -  mov rcx,rsi
// ---------- INJECTING HERE ----------
"JustCause4.exe"+A0B73B0: 0F B7 9E AA 03 00 00     -  movzx ebx,word ptr [rsi+000003AA]
// ---------- DONE INJECTING  ----------
"JustCause4.exe"+A0B73B7: FF 90 10 01 00 00        -  call qword ptr [rax+00000110]
"JustCause4.exe"+A0B73BD: 66 39 D8                 -  cmp ax,bx
"JustCause4.exe"+A0B73C0: 7D 6E                    -  jnl JustCause4.exe+A0B7430
"JustCause4.exe"+A0B73C2: 48 8B 06                 -  mov rax,[rsi]
"JustCause4.exe"+A0B73C5: 48 89 F1                 -  mov rcx,rsi
"JustCause4.exe"+A0B73C8: FF 90 18 01 00 00        -  call qword ptr [rax+00000118]
"JustCause4.exe"+A0B73CE: 84 C0                    -  test al,al
"JustCause4.exe"+A0B73D0: 75 5E                    -  jne JustCause4.exe+A0B7430
"JustCause4.exe"+A0B73D2: F3 0F 10 47 3C           -  movss xmm0,[rdi+3C]
"JustCause4.exe"+A0B73D7: 0F 2F 47 40              -  comiss xmm0,[rdi+40]
}
infinite ammo:
[ENABLE]

aobscanmodule(ammo1,JustCause4.exe,8B 68 70 85 ED)
alloc(newmem,$1000,"JustCause4.exe"+91FC176)

label(code)
label(return)
label(crammo)
label(cpammo)
registersymbol(crammo)
registersymbol(cpammo)

newmem:
mov [crammo],rbx
mov [cpammo],rax
push rdx
mov edx,[rax+70]
mov [rbx+53C],edx
pop rdx

code:
  mov ebp,[rax+70]
  test ebp,ebp
  jmp return

  crammo:
  dq 0

cpammo:
dq 0

ammo1:
  jmp newmem
return:
registersymbol(ammo1)

[DISABLE]

ammo1:
  db 8B 68 70 85 ED

unregistersymbol(ammo1)
unregistersymbol(crammo)
unregistersymbol(cpammo)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "JustCause4.exe"+91FC176

"JustCause4.exe"+91FC152: 48 8B 80 38 06 00 00     -  mov rax,[rax+00000638]
"JustCause4.exe"+91FC159: 48 8B 08                 -  mov rcx,[rax]
"JustCause4.exe"+91FC15C: 48 85 C9                 -  test rcx,rcx
"JustCause4.exe"+91FC15F: 74 6A                    -  je JustCause4.exe+91FC1CB
"JustCause4.exe"+91FC161: E8 1A 0F 4B F7           -  call JustCause4.exe+6AD080
"JustCause4.exe"+91FC166: 89 C5                    -  mov ebp,eax
"JustCause4.exe"+91FC168: EB 0F                    -  jmp JustCause4.exe+91FC179
"JustCause4.exe"+91FC16A: 48 8B 83 28 05 00 00     -  mov rax,[rbx+00000528]
"JustCause4.exe"+91FC171: 48 85 C0                 -  test rax,rax
"JustCause4.exe"+91FC174: 74 55                    -  je JustCause4.exe+91FC1CB
// ---------- INJECTING HERE ----------
"JustCause4.exe"+91FC176: 8B 68 70                 -  mov ebp,[rax+70]
"JustCause4.exe"+91FC179: 85 ED                    -  test ebp,ebp
// ---------- DONE INJECTING  ----------
"JustCause4.exe"+91FC17B: 74 4E                    -  je JustCause4.exe+91FC1CB
"JustCause4.exe"+91FC17D: 83 BB 60 02 00 00 00     -  cmp dword ptr [rbx+00000260],00
"JustCause4.exe"+91FC184: 74 2B                    -  je JustCause4.exe+91FC1B1
"JustCause4.exe"+91FC186: 48 8B 83 E8 02 00 00     -  mov rax,[rbx+000002E8]
"JustCause4.exe"+91FC18D: 48 85 C0                 -  test rax,rax
"JustCause4.exe"+91FC190: 74 1F                    -  je JustCause4.exe+91FC1B1
"JustCause4.exe"+91FC192: 80 B8 D1 03 00 00 00     -  cmp byte ptr [rax+000003D1],00
"JustCause4.exe"+91FC199: 74 16                    -  je JustCause4.exe+91FC1B1
"JustCause4.exe"+91FC19B: 48 8B 80 38 06 00 00     -  mov rax,[rax+00000638]
"JustCause4.exe"+91FC1A2: 48 8B 08                 -  mov rcx,[rax]
}
infinite wingsuit jet fuel:
{ Game   : JustCause4.exe
  Version:
  Date   : 2018-12-30
  Author : ChrisFaytePC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(flying1,JustCause4.exe,F3 41 0F 10 84 1C 18 FD FF FF)
aobscanmodule(fuel_subt,JustCause4.exe,F3 0F 5C C6 F3 0F 5F C3)
alloc(newmem,$1000,"JustCause4.exe"+C62E87)
label(code)
label(return)
registersymbol(fuel_subt)

newmem:

code:
mov [r12+rbx-000002E8],(float)1
  movss xmm0,[r12+rbx-000002E8]
  jmp return

flying1:
  jmp newmem
  nop
  nop
  nop
  nop
  nop
return:
registersymbol(flying1)

fuel_subt:
db 90 90 90 90
fuel_subt+43:
db 90 90 90 90 90 90

[DISABLE]

flying1:
  db F3 41 0F 10 84 1C 18 FD FF FF
fuel_subt:
  db F3 0F 5C C6 F3 0F 5F C3
fuel_subt+43:
  db 0F 83 11 01 00 00

unregistersymbol(fuel_subt)
unregistersymbol(flying1)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "JustCause4.exe"+C62E87

"JustCause4.exe"+C62E58: BA 30 00 00 00                 -  mov edx,00000030
"JustCause4.exe"+C62E5D: 44 8D 42 D1                    -  lea r8d,[rdx-2F]
"JustCause4.exe"+C62E61: 48 8D 4C 24 40                 -  lea rcx,[rsp+40]
"JustCause4.exe"+C62E66: E8 AD AC CD 00                 -  call JustCause4.exe+193DB18
"JustCause4.exe"+C62E6B: 33 FF                          -  xor edi,edi
"JustCause4.exe"+C62E6D: 48 8D 9E E8 02 00 00           -  lea rbx,[rsi+000002E8]
"JustCause4.exe"+C62E74: 4C 2B E6                       -  sub r12,rsi
"JustCause4.exe"+C62E77: 4C 8D 35 92 60 B9 FF           -  lea r14,[JustCause4.exe+7F8F10]
"JustCause4.exe"+C62E7E: 83 FF 03                       -  cmp edi,03
"JustCause4.exe"+C62E81: 0F 8D 20 01 00 00              -  jnl JustCause4.exe+C62FA7
// ---------- INJECTING HERE ----------
"JustCause4.exe"+C62E87: F3 41 0F 10 84 1C 18 FD FF FF  -  movss xmm0,[r12+rbx-000002E8]
// ---------- DONE INJECTING  ----------
"JustCause4.exe"+C62E91: 0F 2E 03                       -  ucomiss xmm0,[rbx]
"JustCause4.exe"+C62E94: 75 09                          -  jne JustCause4.exe+C62E9F
"JustCause4.exe"+C62E96: 45 84 FF                       -  test r15l,r15l
"JustCause4.exe"+C62E99: 0F 84 F9 00 00 00              -  je JustCause4.exe+C62F98
"JustCause4.exe"+C62E9F: F3 0F 11 03                    -  movss [rbx],xmm0
"JustCause4.exe"+C62EA3: 4C 89 74 24 20                 -  mov [rsp+20],r14
"JustCause4.exe"+C62EA8: 4C 8D 0D 11 3C B9 FF           -  lea r9,[JustCause4.exe+7F6AC0]
"JustCause4.exe"+C62EAF: BA 30 00 00 00                 -  mov edx,00000030
"JustCause4.exe"+C62EB4: 44 8D 42 D3                    -  lea r8d,[rdx-2D]
"JustCause4.exe"+C62EB8: 48 8D 4D B0                    -  lea rcx,[rbp-50]
}
Author
ChrisFayte
Downloads
6
Views
289
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from ChrisFayte

Community Mods