Crates.io | faithe |
lib.rs | faithe |
version | 0.8.0 |
source | src |
created_at | 2022-02-04 02:02:04.667629 |
updated_at | 2022-05-05 21:44:56.826207 |
description | Windows memory hacking library. |
homepage | |
repository | https://github.com/sy1ntexx/faithe |
max_upload_size | |
id | 526527 |
size | 84,321 |
Memory hacking library for windows.
# Latest version
[dependencies]
faithe = "0.7.0"
# Development version
[dependencies.faithe]
git = "https://github.com/sy1ntexx/faithe"
use faithe::types::access_rights::PROCESS_ALL_ACCESS;
use faithe::process as ps;
let process = ps::Processes::new()?
.find(|p| p.sz_exe_file == "Process name.exe")
.unwrap()
.open(false, PROCESS_ALL_ACCESS)?;
let process = get_process();
process
.modules()?
.for_each(|m| dbg!(m));
let process = get_process();
let mut value = process.read::<u32>(0xFF)?;
value += 100;
process.write(0xFF, value)?;
use faithe::types::allocation_types::{MEM_COMMIT, MEM_RESERVE};
use faithe::types::free_types::MEM_RELEASE;
use faithe::memory::MemoryProtection;
let process = get_process();
let mut chunk = process.allocate(
0,
1000,
MEM_COMMIT | MEM_RESERVE,
MemoryProtection::READ_WRITE_EXECUTE
)?;
let info = process.query(chunk)?;
process.protect(chunk, 1000, MemoryProtection::Read)?;
process.free(chunk, 0, MEM_RELEASE)?;
use faithe::pattern::Pattern;
let process = get_process();
let address = process.find_pattern(
"Something.exe",
// Available styles: IDA, Code, PiDB
Pattern::from_ida_style("48 89 85 F0 00 00 00 4C 8B ? ? ? ? ? 48 8D")
)?;
use faithe::{interface, xstruct};
// Creates a trait that will emulate behavior of virtual functions in C++.
struct CPlayer;
interface! {
trait IEntity(CPlayer) {
extern "C" fn get_health() -> i32 = 0;
extern "C" fn set_health(new: i32) = 1;
}
}
/*
class CPlayer {
virtual int get_health() = 0;
virtual void set_health(int new_value) = 0;
};
*/
// Creates a function with explicitly defined RVA relative to some module.
function! {
// Explicitly defined RVA offset relative to `01-hello` module.
extern FUNC: extern "C" fn(a: i32) = "01-hello.exe"@0x1900;
}
FUNC.call(5);