Resource icon

Just Deserts Cheats 2020-07-23

Hexui Undetected CSGO Cheats PUBG Accounts
Just Deserts is a sci-fi action dating sim where you play as a soldier who must protect a city from a mysterious alien attack while simultaneously need to catch the core of your fantasy girl(s)! There are five courageous women in this game; furthermore, it has seven endings. There are 29 days in this game, Day 29 being the last day and then it ends. To expand your adoration rank, you need to do action with the champion you pick, go with them to work, have supper with them, or do a mission for them. You can likewise give a gift, each character favoring a specific item. You can use the money cheat to buy more gifts. There are five stages in-game: Morning, Afternoon, Night, Evening, and Midnight.

P.S: There are unreleased CG on this game, not sure on the off chance that they will refresh some time on it. To see the CG, unload the archive. rpa, and go to the folder pictures/cg/​

There are four love levels specifically: Normal, Like, Love, and Infatuated. Ordinary is 0-499, Like is 500-1199, Love is 1200-2499, and Infatuated is 2500. To go to the following adoration rank, you have to date that courageous woman. You can use our Just Deserts cheat table to increase your health and money, making it much easier to rank up.​

On the off chance that you replay the game, you won't battle the last chief; it will simply skip. You can even now fight it when you skip the story on Day 29 (except if they fix this one). The Player Stats have it's a maximum breaking point. Wellbeing max is 10,000, exactness max is 1,100, speed max is 500, nimbleness max is 200, energy max is 1,300. You can download the cheat table by clicking the green download button at the top right of the page.​


Just Deserts Cheats
1595545620714.png


Cheat Trainer Features
  • Infinite health
  • infinite money
Cheat Engine Scripts
god mode:
[ENABLE]

aobscanmodule(health1,python27.dll,8B 78 08 8D 74 24 18) // should be unique
alloc(newmem,$1000)

label(code)
label(return)
label(health_base)
registersymbol(health_base)

newmem:
cmp [eax+0C],01
jg code
mov [health_base],eax
code:

  mov edi,[eax+08]
  lea esi,[esp+18]
  jmp return

  health_base:
  dd 0

health1:
  jmp newmem
  nop
  nop
return:
registersymbol(health1)

[DISABLE]

health1:
  db 8B 78 08 8D 74 24 18

unregistersymbol(health1)
unregistersymbol(health_base)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "python27.dll"+A0874

"python27.dll"+A085D: CC                 -  int 3
"python27.dll"+A085E: CC                 -  int 3
"python27.dll"+A085F: CC                 -  int 3
"python27.dll"+A0860: 83 EC 14           -  sub esp,14
"python27.dll"+A0863: A1 9C 59 24 1E     -  mov eax,[python27.dll+24599C]
"python27.dll"+A0868: 33 C4              -  xor eax,esp
"python27.dll"+A086A: 89 44 24 10        -  mov [esp+10],eax
"python27.dll"+A086E: 8B 44 24 18        -  mov eax,[esp+18]
"python27.dll"+A0872: 56                 -  push esi
"python27.dll"+A0873: 57                 -  push edi
// ---------- INJECTING HERE ----------
"python27.dll"+A0874: 8B 78 08           -  mov edi,[eax+08]
"python27.dll"+A0877: 8D 74 24 18        -  lea esi,[esp+18]
// ---------- DONE INJECTING  ----------
"python27.dll"+A087B: 8B CF              -  mov ecx,edi
"python27.dll"+A087D: 85 FF              -  test edi,edi
"python27.dll"+A087F: 7D 02              -  jnl python27.dll+A0883
"python27.dll"+A0881: F7 D9              -  neg ecx
"python27.dll"+A0883: 53                 -  push ebx
"python27.dll"+A0884: B8 CD CC CC CC     -  mov eax,CCCCCCCD
"python27.dll"+A0889: F7 E1              -  mul ecx
"python27.dll"+A088B: C1 EA 03           -  shr edx,03
"python27.dll"+A088E: 8A C2              -  mov al,dl
"python27.dll"+A0890: B3 0A              -  mov bl,0A
}
money cheat lookup:
[ENABLE]

aobscanmodule(money1,python27.dll,8B 78 08 85 FF 0F 9C) // should be unique
alloc(newmem,$1000)

label(code)
label(return)
label(money_base)
registersymbol(money_base)

newmem:

code:
mov [money_base],eax
  mov edi,[eax+08]
  test edi,edi
  jmp return

money_base:
dd 0

money1:
  jmp newmem
return:
registersymbol(money1)

[DISABLE]

money1:
  db 8B 78 08 85 FF

unregistersymbol(money1)
unregistersymbol(money_base)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "python27.dll"+A08EC

"python27.dll"+A08D3: A1 9C 59 24 1E  -  mov eax,[python27.dll+24599C]
"python27.dll"+A08D8: 33 C4           -  xor eax,esp
"python27.dll"+A08DA: 89 44 24 2C     -  mov [esp+2C],eax
"python27.dll"+A08DE: 8B 44 24 34     -  mov eax,[esp+34]
"python27.dll"+A08E2: 53              -  push ebx
"python27.dll"+A08E3: 8B 5C 24 3C     -  mov ebx,[esp+3C]
"python27.dll"+A08E7: 55              -  push ebp
"python27.dll"+A08E8: 56              -  push esi
"python27.dll"+A08E9: 33 C9           -  xor ecx,ecx
"python27.dll"+A08EB: 57              -  push edi
// ---------- INJECTING HERE ----------
"python27.dll"+A08EC: 8B 78 08        -  mov edi,[eax+08]
"python27.dll"+A08EF: 85 FF           -  test edi,edi
// ---------- DONE INJECTING  ----------
"python27.dll"+A08F1: 0F 9C C1        -  setl cl
"python27.dll"+A08F4: 33 D2           -  xor edx,edx
"python27.dll"+A08F6: 85 FF           -  test edi,edi
"python27.dll"+A08F8: 0F 94 C2        -  sete dl
"python27.dll"+A08FB: 8D 74 24 3A     -  lea esi,[esp+3A]
"python27.dll"+A08FF: 89 4C 24 10     -  mov [esp+10],ecx
"python27.dll"+A0903: 8B EA           -  mov ebp,edx
"python27.dll"+A0905: 83 FB 0A        -  cmp ebx,0A
"python27.dll"+A0908: 75 1C           -  jne python27.dll+A0926
"python27.dll"+A090A: 50              -  push eax
}
Author
ChrisFayte
Downloads
1
Views
180
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from ChrisFayte

Community Mods