Resource icon

Just Deserts Cheats 2020-07-23

Login to enable download
Hexui Undetected CSGO Cheats Sinkicheat PUBG Cheat
Just Deserts Cheats
1595545620714.png


Features
  • Infinite health
  • infinite money
Cheat Scripts
god mode:
[ENABLE]

aobscanmodule(health1,python27.dll,8B 78 08 8D 74 24 18) // should be unique
alloc(newmem,$1000)

label(code)
label(return)
label(health_base)
registersymbol(health_base)

newmem:
cmp [eax+0C],01
jg code
mov [health_base],eax
code:

  mov edi,[eax+08]
  lea esi,[esp+18]
  jmp return

  health_base:
  dd 0

health1:
  jmp newmem
  nop
  nop
return:
registersymbol(health1)

[DISABLE]

health1:
  db 8B 78 08 8D 74 24 18

unregistersymbol(health1)
unregistersymbol(health_base)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "python27.dll"+A0874

"python27.dll"+A085D: CC                 -  int 3
"python27.dll"+A085E: CC                 -  int 3
"python27.dll"+A085F: CC                 -  int 3
"python27.dll"+A0860: 83 EC 14           -  sub esp,14
"python27.dll"+A0863: A1 9C 59 24 1E     -  mov eax,[python27.dll+24599C]
"python27.dll"+A0868: 33 C4              -  xor eax,esp
"python27.dll"+A086A: 89 44 24 10        -  mov [esp+10],eax
"python27.dll"+A086E: 8B 44 24 18        -  mov eax,[esp+18]
"python27.dll"+A0872: 56                 -  push esi
"python27.dll"+A0873: 57                 -  push edi
// ---------- INJECTING HERE ----------
"python27.dll"+A0874: 8B 78 08           -  mov edi,[eax+08]
"python27.dll"+A0877: 8D 74 24 18        -  lea esi,[esp+18]
// ---------- DONE INJECTING  ----------
"python27.dll"+A087B: 8B CF              -  mov ecx,edi
"python27.dll"+A087D: 85 FF              -  test edi,edi
"python27.dll"+A087F: 7D 02              -  jnl python27.dll+A0883
"python27.dll"+A0881: F7 D9              -  neg ecx
"python27.dll"+A0883: 53                 -  push ebx
"python27.dll"+A0884: B8 CD CC CC CC     -  mov eax,CCCCCCCD
"python27.dll"+A0889: F7 E1              -  mul ecx
"python27.dll"+A088B: C1 EA 03           -  shr edx,03
"python27.dll"+A088E: 8A C2              -  mov al,dl
"python27.dll"+A0890: B3 0A              -  mov bl,0A
}
money cheat lookup:
[ENABLE]

aobscanmodule(money1,python27.dll,8B 78 08 85 FF 0F 9C) // should be unique
alloc(newmem,$1000)

label(code)
label(return)
label(money_base)
registersymbol(money_base)

newmem:

code:
mov [money_base],eax
  mov edi,[eax+08]
  test edi,edi
  jmp return

money_base:
dd 0

money1:
  jmp newmem
return:
registersymbol(money1)

[DISABLE]

money1:
  db 8B 78 08 85 FF

unregistersymbol(money1)
unregistersymbol(money_base)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "python27.dll"+A08EC

"python27.dll"+A08D3: A1 9C 59 24 1E  -  mov eax,[python27.dll+24599C]
"python27.dll"+A08D8: 33 C4           -  xor eax,esp
"python27.dll"+A08DA: 89 44 24 2C     -  mov [esp+2C],eax
"python27.dll"+A08DE: 8B 44 24 34     -  mov eax,[esp+34]
"python27.dll"+A08E2: 53              -  push ebx
"python27.dll"+A08E3: 8B 5C 24 3C     -  mov ebx,[esp+3C]
"python27.dll"+A08E7: 55              -  push ebp
"python27.dll"+A08E8: 56              -  push esi
"python27.dll"+A08E9: 33 C9           -  xor ecx,ecx
"python27.dll"+A08EB: 57              -  push edi
// ---------- INJECTING HERE ----------
"python27.dll"+A08EC: 8B 78 08        -  mov edi,[eax+08]
"python27.dll"+A08EF: 85 FF           -  test edi,edi
// ---------- DONE INJECTING  ----------
"python27.dll"+A08F1: 0F 9C C1        -  setl cl
"python27.dll"+A08F4: 33 D2           -  xor edx,edx
"python27.dll"+A08F6: 85 FF           -  test edi,edi
"python27.dll"+A08F8: 0F 94 C2        -  sete dl
"python27.dll"+A08FB: 8D 74 24 3A     -  lea esi,[esp+3A]
"python27.dll"+A08FF: 89 4C 24 10     -  mov [esp+10],ecx
"python27.dll"+A0903: 8B EA           -  mov ebp,edx
"python27.dll"+A0905: 83 FB 0A        -  cmp ebx,0A
"python27.dll"+A0908: 75 1C           -  jne python27.dll+A0926
"python27.dll"+A090A: 50              -  push eax
}
Author
ChrisFayte
Downloads
1
Views
88
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from ChrisFayte

Community Mods