[![Crates.io](https://img.shields.io/crates/v/toy-arms?style=for-the-badge)](https://crates.io/crates/toy-arms)
[![Docs.rs](https://img.shields.io/badge/docs.rs-66c2a5?style=for-the-badge&labelColor=555555&logoColor=white&logo=data:image/svg+xml;base64,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)](https://docs.rs/toy-arms)
# :crossed_swords: toy-arms
Huge thanks to my pal for this header [@suzuharuR](https://twitter.com/suzuharuR)
[Usage](#Usage) | [Examples](#fire-minimal-examples) | [Document](https://docs.rs/toy-arms)
# What's toy-arms?
This is a toolkit for those who are fed up with coding game hack with C++ but still wanna make it in an elegant way.
Since this library wraps many Windows API which frequently used, you can build hack without having to struggle with it.
By using this, many part of your stress while coding low level fashion won't come in.
But be informed that since I'm neither a pro rust coder nor a pro game hacker, this library still might contain some buggy code which causes unintentional behavior.
I'd be pleased if you help me improve toy-arms by spotting them and make PR or issue.
# :pushpin: Table of contents
- [:two_hearts: support me](#two_hearts-support-me)
- [:fire: Get started](#fire-get-started)
- [step1](#step1)
- [step2](#step2)
- [:scroll: Practical Examples](#scroll-practical-examples)
- [internal](#internal)
- [simplest dll](#simplest-dll-internal)
- [auto shoot](#auto-shoot-internal)
- [get localplayer health](#get-localplayer-health-internal)
- [pattern scanning](#pattern-scanning-internal)
- [external](#external)
- [auto shoot](#auto-shoot-external)
- [get localpalyer health](#get-localplayer-health-external)
- [pattern scanning](#pattern-scanning-external)
- [:card_file_box: Other examples?](#card_file_box-other-examples)
# :two_hearts: support me
**Donating me through GitHub sponsors** would be the best way to support me and this project.
You can also support me by **starring this project**, or any kind of **PR** that either refactoring this project, or adding new feature would pump me up!
# :fire: Get started
But before actually test the example, I'll show you some preparation steps you're supposed to know.
## step1
Firstly, include `toy-arms` in your dependencies' table in `Cargo.toml`.
As of now toy-arms has 2 features which are `internal` and `external`.
`internal` feature flag is on by default so you have to specify `external` when you wanna use it.
**for internal use:**
```toml
[dependencies]
toy-arms = "0.9.4"
# This annotation below is to tell the compiler to compile this into dll. MUST.
[lib]
crate-type = ["cdylib"]
```
**for external use:**
```toml
[dependencies]
toy-arms = {version = "0.9.4", features = ["external"]}
```
## step2
Secondly, sicne most of those tests are targeting the game "csgo.exe(x86)", you may have to build the code in x86 architecture depending on the example.
You can either specify in `.cargo/config.toml` as following:
```toml
[build]
target = "i686-pc-windows-msvc"
```
Or put `--target i686-pc-windows-msvc` flag everytime when you build the code.
# :scroll: Practical Examples
In this section I'll showcase you various examples for different situations with internal and external features. Find one fits your purpose.
Be informed that all these examples are happened to target **CSGO:counter strike global offencive**
, so be sure to get it and test with it.
## internal
Welcome to the examples of internal hack.
A dll file will be generated by build these examples, inject it with whatever dll injector you possess.
### simplest dll (internal)
With this crate, making the injectable dll which is the smallest possible is simple as this:
`cargo b --example in_simplest_dll --target i686-pc-windows-msvc`
```rust
// A neat macro which defines entry point instead of you.
// Also, you dont have to alloc/free console by yourself, console will show up when u compile into debug build.
toy_arms::create_entrypoint!(hack_main_thread);
// Main thread
fn hack_main_thread() {
// YOUR STUNNING CODE'S SUPPOSED TO BE HERE;
for i in 0..30000 {
println!("using toy-arms {}", i);
}
}
```
### auto shoot (internal)
This is the code that overwrites the value at `DW_FORCE_ATTACK` to 0x5 every loop in csgo.exe.
Note that you have to check if the address of `DW_FORCE_ATTACK` is up-to-date.
`cargo b --example in_auto_shoot --target i686-pc-windows-msvc`
```rust
use toy_arms::VirtualKeyCode;
use toy_arms::external::Process;
use toy_arms::external::{ read, write };
fn main() {
// This const has to be up to date.
const DW_CLIENT_STATE: usize = 0x58CFC4;
const DW_CLIENT_STATE_STATE: usize = 0x108;
const DW_FORCE_ATTACK: usize = 0x31FE33C;
// Getting process information
let process = Process::from_process_name("csgo.exe");
println!(
"process id = {}, \nprocess handle = {:?}",
process.process_id, process.process_handle
);
// You can get module information by using get_module_info
let module_info = process.get_module_info("client.dll").unwrap();
println!("{}", module_info.module_name);
// read fetches the value at where the address is pointing.
// U have to specify the type of the value with turbofish
println!(
"{:x}",
read::(process.process_handle, read::(process.process_handle, process.get_module_base("engine.dll").unwrap() + DW_CLIENT_STATE).unwrap() as usize + DW_CLIENT_STATE_STATE).unwrap()
);
loop {
// write helps you tamper with the value.
write::(
process.process_handle,
process.get_module_base("client.dll").unwrap() + DW_FORCE_ATTACK as usize,
&mut 0x5,
)
.unwrap();
// Exit this loop by pressing INSERT
if toy_arms::detect_keypress(VirtualKeyCode::VK_INSERT) {
break;
}
}
}
```
### get localplayer health (internal)
While this code below will retrieve health value of LocalPlayer object in csgo.exe.
Note that you have to update the offset of `DW_LOCAL_PLAYER`.
`cargo b --example in_localplayer_health --target i686-pc-windows-msvc`
```rust
use toy_arms::GameObject;
use toy_arms::{cast, create_entrypoint, VirtualKeyCode};
use toy_arms::internal::Module;
use toy_arms_derive::GameObject;
create_entrypoint!(hack_main_thread);
// This macro provides from_raw() func that ensures the base address is not null.
#[derive(GameObject)]
struct LocalPlayer {
pointer: *const usize, // Denote the base address of LocalPlayer to use it later in get_health() function.
}
impl LocalPlayer {
unsafe fn get_health(&self) -> u16 {
*cast!(self.pointer as usize + 0x100, u16)
}
}
// This offset has to be up to date.
const DW_LOCAL_PLAYER: i32 = 0xDB25DC;
fn hack_main_thread() {
let module = Module::from_module_name("client.dll").unwrap();
unsafe {
//let dw_local_player = memory.read_mut::(0xDA244C);
loop {
if let Some(i) = LocalPlayer::from_raw(module.read(DW_LOCAL_PLAYER)) {
println!("health = {:?}", (*i).get_health());
};
if toy_arms::detect_keypress(VirtualKeyCode::VK_INSERT) {
break;
}
}
}
}
```
### pattern scanning (internal)
This is the pattern scanning example where the pattern is for dwForceAttack in csgo.
`cargo b --example in_pattern_scanning --target i686-pc-windows-msvc`
```rust
use toy_arms::{
detect_keypress,
internal::{
Module
},
VirtualKeyCode
};
toy_arms::create_entrypoint!(hack_main_thread);
const DW_FORCE_ATTACK_PATTERN: &str = "89 0D ? ? ? ? 8B 0D ? ? ? ? 8B F2 8B C1 83 CE 04";
fn hack_main_thread() {
let mut once = false;
let client = Module::from_module_name("client.dll").unwrap();
match client.find_pattern(DW_FORCE_ATTACK_PATTERN) {
Some(i) => println!("address: 0x{:x}", i),
None => println!("Pattern not found"),
}
match client.pattern_scan(
DW_FORCE_ATTACK_PATTERN,
2,
0,
) {
Some(i) => println!("address: 0x{:x}", i),
None => println!("Offset not found"),
}
loop {
if !once {
println!("Press INSERT to exit...");
once = !once;
}
// To exit this hack loop when you input INSEERT KEY
if detect_keypress(VirtualKeyCode::VK_INSERT) {
break;
}
}
}
```
## external
On the other hand, following code is how tamper with memory externally is like.
### auto shoot (external)
This is the code that overwrites the value at `DW_FORCE_ATTACK` to 0x5 every loop in csgo.exe.
Note that you have to check if the address of `DW_FORCE_ATTACK` is up-to-date.
`cargo r --example ex_auto_shoot --features external --no-default-features`
```rust
use toy_arms::VirtualKeyCode;
use toy_arms::external::Process;
use toy_arms::external::{ read, write };
fn main() {
// This const has to be up to date.
const DW_CLIENT_STATE: usize = 0x58CFC4;
const DW_CLIENT_STATE_STATE: usize = 0x108;
const DW_FORCE_ATTACK: usize = 0x31FE33C;
// Getting process information
let process = Process::from_process_name("csgo.exe");
println!(
"process id = {}, \nprocess handle = {:?}",
process.process_id, process.process_handle
);
// You can get module information by using get_module_info
let module_info = process.get_module_info("client.dll").unwrap();
println!("{}", module_info.module_name);
// read fetches the value at where the address is pointing.
// U have to specify the type of the value with turbofish
println!(
"{:x}",
read::(process.process_handle, read::(process.process_handle, process.get_module_base("engine.dll").unwrap() + DW_CLIENT_STATE).unwrap() as usize + DW_CLIENT_STATE_STATE).unwrap()
);
loop {
// write helps you tamper with the value.
write::(
process.process_handle,
process.get_module_base("client.dll").unwrap() + DW_FORCE_ATTACK as usize,
&mut 0x5,
)
.unwrap();
// Exit this loop by pressing INSERT
if toy_arms::detect_keypress(VirtualKeyCode::VK_INSERT) {
break;
}
}
}
```
### get localplayer health (external)
Retrieving local player health demo is present as below.
Quick tip: You don't wanna use usize as the pointer type cuz external program itself is going to be 64bit,
therefore the buffer size will be 8bytes whereas the actual pointer is 4bytes. Use u32 or DWORD instead.
`cargo r --example ex_get_localplayer_health --features external --no-default-features`
```rust
use toy_arms::external::{Module, Process, read};
use toy_arms::external::error::TAExternalError::ReadMemoryFailed;
const DW_LOCAL_PLAYER: u32 = 0xDB35DC;
fn main() {
let csgo: Process;
match Process::from_process_name("csgo.exe") {
Ok(p) => csgo = p,
Err(e) => {
println!("{}", e);
return;
},
}
let client: Module;
match csgo.get_module_info("client.dll") {
Ok(m) => client = m,
Err(e) => {
println!("{}", e);
return;
},
}
println!("module_base: {:x}", client.module_base_address);
println!("localplayer pointer: 0x{:x}", client.module_base_address + DW_LOCAL_PLAYER as usize);
let localplayer = read::(csgo.process_handle, client.module_base_address + DW_LOCAL_PLAYER as usize);
match localplayer {
Ok(l) => {
println!("localplayer address: 0x{:x}", l);
// 0x100 is the offset of the health in player entity class.
let health = read::(csgo.process_handle, l as usize + 0x100);
match health {
// This is what we wanted.
Ok(h) => println!("localplayer's health: {}", h),
Err(ReadMemoryFailed(e)) => println!("{}", e),
Err(_) => println!("some error"),
}
},
Err(e) => println!("error: {}", e),
}
}
```
### pattern scanning (external)
This is the pattern scanning example where the pattern is for dwForceAttack in csgo.
`cargo r --example ex_pattern_scanning --features external --no-default-features`
```rust
use toy_arms::{ VirtualKeyCode };
use toy_arms::external::Process;
const DW_FORCE_ATTACK_PATTERN: &str = "89 0D ? ? ? ? 8B 0D ? ? ? ? 8B F2 8B C1 83 CE 04";
fn main() {
let mut once = false;
// Getting process information
let process = Process::from_process_name("csgo.exe");
// You can get module information by using get_client
let client = process.get_module_info("client.dll").unwrap();
let address = client.find_pattern(DW_FORCE_ATTACK_PATTERN);
match address {
Some(i) => println!("found pattern at 0x{:x}", i),
None => println!("NOTHING FOUND"),
}
let offset = client.pattern_scan(
DW_FORCE_ATTACK_PATTERN,
2,
0,
);
match offset {
Some(i) => println!("found offset at 0x{:x}", i),
None => println!("NOTHING FOUND"),
}
loop {
if !once {
println!("Press INSERT to exit...");
once = !once;
}
// Exit this loop by pressing INSERT
if toy_arms::detect_keydown!(VirtualKeyCode::VK_INSERT) {
break;
}
}
}
```
# :card_file_box: Other examples?
Yes you have! Take a look at [examples directory](https://github.com/s3pt3mb3r/toy-arms/tree/master/examples), you'll see more examples!
However, you may need to update offsets which some examples contain with your own hands.
Refer to [hazedumper](https://github.com/frk1/hazedumper/blob/master/csgo.hpp) as always for latest offsets of CSGO.
To build examples in x86 arch:
```shell
cargo build --example EXAMPLE_NAME --target i686-pc-windows-msvc
```