The Evil Within 2 Cheat Table

The Evil Within 2 Cheat Table 2020-07-23

Login to enable download
Hexui Undetected CSGO Cheats Sinkicheat PUBG Cheat
The Evil Within 2 Cheat Table

1595470746337.png


Features

  • God mode
  • fast movement speed
  • infinite stamina
  • infinite ammo
  • permanent stealth
  • no reload cheat
  • One hit kills hack
  • mass item pickup
  • infinite slown down time
  • ghost sensor
  • Teleporter

Scripts

Get player addresses:
[ENABLE]

aobscanmodule(health1,TEW2.exe,F3 0F 10 81 C4 0B 00 00) // should be unique
alloc(newmem,$1000,"TEW2.exe"+645F40)

label(code)
label(health_addy)
label(return)
label(speed)
registersymbol(health_addy)
registersymbol(speed)

newmem:
cmp r13,0
jne code
mov [health_addy],rcx
movss xmm0,[rcx+00000BC0]
movss [rcx+00000BC4],xmm0
cmp [speed],1
jne code
mov [rcx+828],(float)3
movss xmm0,[rcx+00000BC4]
  jmp return

speed:
dd 0

code:
  movss xmm0,[rcx+00000BC4]
  jmp return

health_addy:

health1:
  jmp newmem
  nop
  nop
  nop
return:
registersymbol(health1)

[DISABLE]

health1:
  db F3 0F 10 81 C4 0B 00 00

unregistersymbol(health1)
unregistersymbol(health_addy)
unregistersymbol(speed)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "TEW2.exe"+645F40

"TEW2.exe"+645F36: CC                       -  int 3
"TEW2.exe"+645F37: CC                       -  int 3
"TEW2.exe"+645F38: CC                       -  int 3
"TEW2.exe"+645F39: CC                       -  int 3
"TEW2.exe"+645F3A: CC                       -  int 3
"TEW2.exe"+645F3B: CC                       -  int 3
"TEW2.exe"+645F3C: CC                       -  int 3
"TEW2.exe"+645F3D: CC                       -  int 3
"TEW2.exe"+645F3E: CC                       -  int 3
"TEW2.exe"+645F3F: CC                       -  int 3
// ---------- INJECTING HERE ----------
"TEW2.exe"+645F40: F3 0F 10 81 C4 0B 00 00  -  movss xmm0,[rcx+00000BC4]
// ---------- DONE INJECTING  ----------
"TEW2.exe"+645F48: C3                       -  ret
"TEW2.exe"+645F49: CC                       -  int 3
"TEW2.exe"+645F4A: CC                       -  int 3
"TEW2.exe"+645F4B: CC                       -  int 3
"TEW2.exe"+645F4C: CC                       -  int 3
"TEW2.exe"+645F4D: CC                       -  int 3
"TEW2.exe"+645F4E: CC                       -  int 3
"TEW2.exe"+645F4F: CC                       -  int 3
"TEW2.exe"+645F50: 33 C0                    -  xor eax,eax
"TEW2.exe"+645F52: C7 42 04 00 00 80 3F     -  mov [rdx+04],3F800000
}
Infinite Stamina:
[ENABLE]

aobscanmodule(stamina_subtract,TEW2.exe,00 00 F3 0F 5C C8 F3 0F 11 8B D8 17 00 00) // should be unique
alloc(newmem,$1000,"TEW2.exe"+66601D)

label(code)
label(return)

newmem:

code:
  //subss xmm1,xmm0
  movss [rbx+000017D8],xmm1
  jmp return

stamina_subtract+02:
  jmp newmem
  nop
  nop
  nop
  nop
  nop
  nop
  nop
return:
registersymbol(stamina_subtract)

[DISABLE]

stamina_subtract+02:
  db F3 0F 5C C8 F3 0F 11 8B D8 17 00 00

unregistersymbol(stamina_subtract)
dealloc(newmem)

{
// ORIGINAL CODE - INJECTION POINT: "TEW2.exe"+66601D

"TEW2.exe"+665FE3: F3 0F 59 35 71 43 FA 00  -  mulss xmm6,[TEW2.exe+160A35C]
"TEW2.exe"+665FEB: 48 8B 0D FE 30 7A 03     -  mov rcx,[TEW2.exe+3E090F0]
"TEW2.exe"+665FF2: 48 8B 01                 -  mov rax,[rcx]
"TEW2.exe"+665FF5: FF 90 B8 00 00 00        -  call qword ptr [rax+000000B8]
"TEW2.exe"+665FFB: 80 BB A6 D8 00 00 00     -  cmp byte ptr [rbx+0000D8A6],00
"TEW2.exe"+666002: F3 41 0F 59 C1           -  mulss xmm0,xmm9
"TEW2.exe"+666007: F3 0F 59 C6              -  mulss xmm0,xmm6
"TEW2.exe"+66600B: 74 08                    -  je TEW2.exe+666015
"TEW2.exe"+66600D: F3 0F 59 05 8F DA FD 00  -  mulss xmm0,[TEW2.exe+1643AA4]
"TEW2.exe"+666015: F3 0F 10 8B D8 17 00 00  -  movss xmm1,[rbx+000017D8]
// ---------- INJECTING HERE ----------
"TEW2.exe"+66601D: F3 0F 5C C8              -  subss xmm1,xmm0
"TEW2.exe"+666021: F3 0F 11 8B D8 17 00 00  -  movss [rbx+000017D8],xmm1
// ---------- DONE INJECTING  ----------
"TEW2.exe"+666029: 83 8B E8 5C 00 00 04     -  or dword ptr [rbx+00005CE8],04
"TEW2.exe"+666030: E9 04 01 00 00           -  jmp TEW2.exe+666139
"TEW2.exe"+666035: 80 BB 24 D3 00 00 00     -  cmp byte ptr [rbx+0000D324],00
"TEW2.exe"+66603C: 75 52                    -  jne TEW2.exe+666090
"TEW2.exe"+66603E: 8B 83 AC D3 00 00        -  mov eax,[rbx+0000D3AC]
"TEW2.exe"+666044: 85 C0                    -  test eax,eax
"TEW2.exe"+666046: 74 33                    -  je TEW2.exe+66607B
"TEW2.exe"+666048: 83 F8 0C                 -  cmp eax,0C
"TEW2.exe"+66604B: 74 2E                    -  je TEW2.exe+66607B
"TEW2.exe"+66604D: 0F B7 93 62 D2 00 00     -  movzx edx,word ptr [rbx+0000D262]
}
Permanent Stealth cheat:
[ENABLE]
aobscanmodule(stealth,TEW2.exe,7A 02 74 2B 0F 57 C0)
alloc(newmem,$100,"TEW2.exe"+8B54EB)
aobscanmodule(stealth2,TEW2.exe,F3 0F 11 89 C0 15 00 00)
alloc(newmema,$100,"TEW2.exe"+8B54F2)
aobscanmodule(stealth3,TEW2.exe,F3 0F 10 81 C0 15 00 00 0F 2E)
alloc(newmemb,$100,"TEW2.exe"+8B54E0)
aobscanmodule(jump_ghost,TEW2.exe,74 20 C7 87 68 25 00 00 CD CC CC 3D)
alloc(newmemc,$100,"TEW2.exe"+9B6120)
aobscanmodule(jump_ghost2,TEW2.exe,74 14 C7 87 68 25 00 00 00 00 80 3F)
alloc(newmemd,$100,"TEW2.exe"+9B5F7C)
aobscanmodule(stealth_eye1,TEW2.exe,F3 0F 11 83 20 18 00 00)
alloc(newmeme,$100,"TEW2.exe"+133A115)
label(code)
label(return)
label(codea)
label(returna)|
label(codeb)
label(returnb)
label(codec)
label(returnc)
label(coded)
label(returnd)
label(codee)
label(returne)

newmem:

code:
  //jp TEW2.AK::WriteBytesMem::Bytes+5F318F
  jmp TEW2.AK::WriteBytesMem::Bytes+5F31BA
  xorps xmm0,xmm0
  jmp return

stealth:
  jmp newmem
  nop
  nop
return:
registersymbol(stealth)

newmema:

codea:
mov [rcx+000015C0],00000000
 // movss [rcx+000015C0],xmm1
  jmp returna

stealth2:
  jmp newmema
  nop
  nop
  nop
returna:
registersymbol(stealth2)

newmemb:

codeb:
mov [rcx+000015C0],00000000
  movss xmm0,[rcx+000015C0]
  jmp returnb

stealth3:
  jmp newmemb
  nop
  nop
  nop
returnb:
registersymbol(stealth3)

newmemc:

codec:
  jmp TEW2.AK::WriteBytesMem::Count+F83B2
  mov [rdi+00002568],3DCCCCCD
  jmp returnc

jump_ghost:
  jmp newmemc
  nop
  nop
  nop
  nop
  nop
  nop
  nop
returnc:
registersymbol(jump_ghost)

newmemd:

coded:
  jmp TEW2.AK::WriteBytesMem::Count+F8202
  mov [rdi+00002568],3F800000
  jmp returnd

jump_ghost2:
  jmp newmemd
  nop
  nop
  nop
  nop
  nop
  nop
  nop
returnd:
registersymbol(jump_ghost2)

newmeme:

codee:
  mov [rbx+00001820],00000000

  jmp returne

stealth_eye1:
  jmp newmeme
  nop
  nop
  nop
returne:
registersymbol(stealth_eye1)

[DISABLE]

stealth:
  db 7A 02 74 2B 0F 57 C0
stealth2:
  db F3 0F 11 89 C0 15 00 00
stealth3:
  db F3 0F 10 81 C0 15 00 00
jump_ghost:
  db 74 20 C7 87 68 25 00 00 CD CC CC 3D
jump_ghost2:
  db 74 14 C7 87 68 25 00 00 00 00 80 3F
stealth_eye1:
  db F3 0F 11 83 20 18 00 00

unregistersymbol(jump_ghost2)
unregistersymbol(jump_ghost)
unregistersymbol(stealth3)
unregistersymbol(stealth)
unregistersymbol(stealth2)
unregistersymbol(stealth_eye1)
dealloc(newmeme)
dealloc(newmema)
dealloc(newmem)
dealloc(newmemb)
dealloc(newmemc)
dealloc(newmemd)


{
// ORIGINAL CODE - INJECTION POINT: "TEW2.exe"+8B54EB

"TEW2.exe"+8B54D8: CC                             -  int 3
"TEW2.exe"+8B54D9: CC                             -  int 3
"TEW2.exe"+8B54DA: CC                             -  int 3
"TEW2.exe"+8B54DB: CC                             -  int 3
"TEW2.exe"+8B54DC: CC                             -  int 3
"TEW2.exe"+8B54DD: CC                             -  int 3
"TEW2.exe"+8B54DE: CC                             -  int 3
"TEW2.exe"+8B54DF: CC                             -  int 3
"TEW2.exe"+8B54E0: F3 0F 10 81 C0 15 00 00        -  movss xmm0,[rcx+000015C0]
"TEW2.exe"+8B54E8: 0F 2E C1                       -  ucomiss xmm0,xmm1
// ---------- INJECTING HERE ----------
"TEW2.exe"+8B54EB: 7A 02                          -  jp TEW2.exe+8B54EF
"TEW2.exe"+8B54ED: 74 2B                          -  je TEW2.exe+8B551A
"TEW2.exe"+8B54EF: 0F 57 C0                       -  xorps xmm0,xmm0
// ---------- DONE INJECTING  ----------
"TEW2.exe"+8B54F2: F3 0F 11 89 C0 15 00 00        -  movss [rcx+000015C0],xmm1
"TEW2.exe"+8B54FA: 0F 2F 81 CC 15 00 00           -  comiss xmm0,[rcx+000015CC]
"TEW2.exe"+8B5501: 76 0D                          -  jna TEW2.exe+8B5510
"TEW2.exe"+8B5503: 8B 81 C4 15 00 00              -  mov eax,[rcx+000015C4]
"TEW2.exe"+8B5509: 89 81 C8 15 00 00              -  mov [rcx+000015C8],eax
"TEW2.exe"+8B550F: C3                             -  ret
"TEW2.exe"+8B5510: C7 81 C8 15 00 00 00 00 00 00  -  mov [rcx+000015C8],00000000
"TEW2.exe"+8B551A: C3                             -  ret
"TEW2.exe"+8B551B: CC                             -  int 3
"TEW2.exe"+8B551C: CC                             -  int 3
}
  • Love
Reactions: Kleon742
Author
ChrisFayte
Downloads
1
Views
84
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from ChrisFayte

Community Mods