Just Cause 4 Cheat Table Trainer

Just Cause 4 Cheat Table Trainer 2020-07-23

Login to enable download
Hexui Undetected CSGO Cheats Sinkicheat PUBG Cheat
Just Cause 4 Cheat Table Trainer

1595532758465.png


Features
  • God mode
  • vehicle god mode
  • infinite ammo
  • no cooldowns
  • infinite wingsuit jet
  • coordinate lookup
  • grapple modifiers
Cheat Scripts
god mode cheat:
[ENABLE]

aobscanmodule(health1,JustCause4.exe,0F B7 9E AA 03 00 00) // should be unique
alloc(newmem,$1000,"JustCause4.exe"+A0B73B0)

label(code)
label(return)
label(hlth)
registersymbol(hlth)

newmem:
push rdx
mov dx,word ptr [rsi+000003AA]
mov word ptr [rsi+000003AC],dx
pop rdx

code:
mov [hlth],rsi
  movzx ebx,word ptr [rsi+000003AA]
  jmp return

  hlth:
  dq 0

health1:
  jmp newmem
  nop
  nop
return:
registersymbol(health1)

[DISABLE]

health1:
  db 0F B7 9E AA 03 00 00

unregistersymbol(health1)
unregistersymbol(hlth)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "JustCause4.exe"+A0B73B0

"JustCause4.exe"+A0B7382: E8 A9 33 1C F6           -  call JustCause4.exe+27A730
"JustCause4.exe"+A0B7387: 48 8D 57 28              -  lea rdx,[rdi+28]
"JustCause4.exe"+A0B738B: 4C 89 7C 24 20           -  mov [rsp+20],r15
"JustCause4.exe"+A0B7390: 48 8D 4F 10              -  lea rcx,[rdi+10]
"JustCause4.exe"+A0B7394: 45 31 C9                 -  xor r9d,r9d
"JustCause4.exe"+A0B7397: 4C 8D 05 02 CD 7A F8     -  lea r8,[JustCause4.exe+28640A0]
"JustCause4.exe"+A0B739E: E8 FD 98 1B F6           -  call JustCause4.exe+270CA0
"JustCause4.exe"+A0B73A3: C6 87 88 00 00 00 01     -  mov byte ptr [rdi+00000088],01
"JustCause4.exe"+A0B73AA: 48 8B 06                 -  mov rax,[rsi]
"JustCause4.exe"+A0B73AD: 48 89 F1                 -  mov rcx,rsi
// ---------- INJECTING HERE ----------
"JustCause4.exe"+A0B73B0: 0F B7 9E AA 03 00 00     -  movzx ebx,word ptr [rsi+000003AA]
// ---------- DONE INJECTING  ----------
"JustCause4.exe"+A0B73B7: FF 90 10 01 00 00        -  call qword ptr [rax+00000110]
"JustCause4.exe"+A0B73BD: 66 39 D8                 -  cmp ax,bx
"JustCause4.exe"+A0B73C0: 7D 6E                    -  jnl JustCause4.exe+A0B7430
"JustCause4.exe"+A0B73C2: 48 8B 06                 -  mov rax,[rsi]
"JustCause4.exe"+A0B73C5: 48 89 F1                 -  mov rcx,rsi
"JustCause4.exe"+A0B73C8: FF 90 18 01 00 00        -  call qword ptr [rax+00000118]
"JustCause4.exe"+A0B73CE: 84 C0                    -  test al,al
"JustCause4.exe"+A0B73D0: 75 5E                    -  jne JustCause4.exe+A0B7430
"JustCause4.exe"+A0B73D2: F3 0F 10 47 3C           -  movss xmm0,[rdi+3C]
"JustCause4.exe"+A0B73D7: 0F 2F 47 40              -  comiss xmm0,[rdi+40]
}
infinite ammo:
[ENABLE]

aobscanmodule(ammo1,JustCause4.exe,8B 68 70 85 ED)
alloc(newmem,$1000,"JustCause4.exe"+91FC176)

label(code)
label(return)
label(crammo)
label(cpammo)
registersymbol(crammo)
registersymbol(cpammo)

newmem:
mov [crammo],rbx
mov [cpammo],rax
push rdx
mov edx,[rax+70]
mov [rbx+53C],edx
pop rdx

code:
  mov ebp,[rax+70]
  test ebp,ebp
  jmp return

  crammo:
  dq 0

cpammo:
dq 0

ammo1:
  jmp newmem
return:
registersymbol(ammo1)

[DISABLE]

ammo1:
  db 8B 68 70 85 ED

unregistersymbol(ammo1)
unregistersymbol(crammo)
unregistersymbol(cpammo)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "JustCause4.exe"+91FC176

"JustCause4.exe"+91FC152: 48 8B 80 38 06 00 00     -  mov rax,[rax+00000638]
"JustCause4.exe"+91FC159: 48 8B 08                 -  mov rcx,[rax]
"JustCause4.exe"+91FC15C: 48 85 C9                 -  test rcx,rcx
"JustCause4.exe"+91FC15F: 74 6A                    -  je JustCause4.exe+91FC1CB
"JustCause4.exe"+91FC161: E8 1A 0F 4B F7           -  call JustCause4.exe+6AD080
"JustCause4.exe"+91FC166: 89 C5                    -  mov ebp,eax
"JustCause4.exe"+91FC168: EB 0F                    -  jmp JustCause4.exe+91FC179
"JustCause4.exe"+91FC16A: 48 8B 83 28 05 00 00     -  mov rax,[rbx+00000528]
"JustCause4.exe"+91FC171: 48 85 C0                 -  test rax,rax
"JustCause4.exe"+91FC174: 74 55                    -  je JustCause4.exe+91FC1CB
// ---------- INJECTING HERE ----------
"JustCause4.exe"+91FC176: 8B 68 70                 -  mov ebp,[rax+70]
"JustCause4.exe"+91FC179: 85 ED                    -  test ebp,ebp
// ---------- DONE INJECTING  ----------
"JustCause4.exe"+91FC17B: 74 4E                    -  je JustCause4.exe+91FC1CB
"JustCause4.exe"+91FC17D: 83 BB 60 02 00 00 00     -  cmp dword ptr [rbx+00000260],00
"JustCause4.exe"+91FC184: 74 2B                    -  je JustCause4.exe+91FC1B1
"JustCause4.exe"+91FC186: 48 8B 83 E8 02 00 00     -  mov rax,[rbx+000002E8]
"JustCause4.exe"+91FC18D: 48 85 C0                 -  test rax,rax
"JustCause4.exe"+91FC190: 74 1F                    -  je JustCause4.exe+91FC1B1
"JustCause4.exe"+91FC192: 80 B8 D1 03 00 00 00     -  cmp byte ptr [rax+000003D1],00
"JustCause4.exe"+91FC199: 74 16                    -  je JustCause4.exe+91FC1B1
"JustCause4.exe"+91FC19B: 48 8B 80 38 06 00 00     -  mov rax,[rax+00000638]
"JustCause4.exe"+91FC1A2: 48 8B 08                 -  mov rcx,[rax]
}
infinite wingsuit jet fuel:
{ Game   : JustCause4.exe
  Version:
  Date   : 2018-12-30
  Author : ChrisFaytePC

  This script does blah blah blah
}

[ENABLE]

aobscanmodule(flying1,JustCause4.exe,F3 41 0F 10 84 1C 18 FD FF FF)
aobscanmodule(fuel_subt,JustCause4.exe,F3 0F 5C C6 F3 0F 5F C3)
alloc(newmem,$1000,"JustCause4.exe"+C62E87)
label(code)
label(return)
registersymbol(fuel_subt)

newmem:

code:
mov [r12+rbx-000002E8],(float)1
  movss xmm0,[r12+rbx-000002E8]
  jmp return

flying1:
  jmp newmem
  nop
  nop
  nop
  nop
  nop
return:
registersymbol(flying1)

fuel_subt:
db 90 90 90 90
fuel_subt+43:
db 90 90 90 90 90 90

[DISABLE]

flying1:
  db F3 41 0F 10 84 1C 18 FD FF FF
fuel_subt:
  db F3 0F 5C C6 F3 0F 5F C3
fuel_subt+43:
  db 0F 83 11 01 00 00

unregistersymbol(fuel_subt)
unregistersymbol(flying1)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "JustCause4.exe"+C62E87

"JustCause4.exe"+C62E58: BA 30 00 00 00                 -  mov edx,00000030
"JustCause4.exe"+C62E5D: 44 8D 42 D1                    -  lea r8d,[rdx-2F]
"JustCause4.exe"+C62E61: 48 8D 4C 24 40                 -  lea rcx,[rsp+40]
"JustCause4.exe"+C62E66: E8 AD AC CD 00                 -  call JustCause4.exe+193DB18
"JustCause4.exe"+C62E6B: 33 FF                          -  xor edi,edi
"JustCause4.exe"+C62E6D: 48 8D 9E E8 02 00 00           -  lea rbx,[rsi+000002E8]
"JustCause4.exe"+C62E74: 4C 2B E6                       -  sub r12,rsi
"JustCause4.exe"+C62E77: 4C 8D 35 92 60 B9 FF           -  lea r14,[JustCause4.exe+7F8F10]
"JustCause4.exe"+C62E7E: 83 FF 03                       -  cmp edi,03
"JustCause4.exe"+C62E81: 0F 8D 20 01 00 00              -  jnl JustCause4.exe+C62FA7
// ---------- INJECTING HERE ----------
"JustCause4.exe"+C62E87: F3 41 0F 10 84 1C 18 FD FF FF  -  movss xmm0,[r12+rbx-000002E8]
// ---------- DONE INJECTING  ----------
"JustCause4.exe"+C62E91: 0F 2E 03                       -  ucomiss xmm0,[rbx]
"JustCause4.exe"+C62E94: 75 09                          -  jne JustCause4.exe+C62E9F
"JustCause4.exe"+C62E96: 45 84 FF                       -  test r15l,r15l
"JustCause4.exe"+C62E99: 0F 84 F9 00 00 00              -  je JustCause4.exe+C62F98
"JustCause4.exe"+C62E9F: F3 0F 11 03                    -  movss [rbx],xmm0
"JustCause4.exe"+C62EA3: 4C 89 74 24 20                 -  mov [rsp+20],r14
"JustCause4.exe"+C62EA8: 4C 8D 0D 11 3C B9 FF           -  lea r9,[JustCause4.exe+7F6AC0]
"JustCause4.exe"+C62EAF: BA 30 00 00 00                 -  mov edx,00000030
"JustCause4.exe"+C62EB4: 44 8D 42 D3                    -  lea r8d,[rdx-2D]
"JustCause4.exe"+C62EB8: 48 8D 4D B0                    -  lea rcx,[rbp-50]
}
  • Like
Reactions: Kleon742
Author
ChrisFayte
Downloads
0
Views
34
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from ChrisFayte

Community Mods League of Legends Accounts