Faithe

Memory hacking library for windows.

Instalation

toml [dependencies.faithe] git = "https://github.com/sy1ntexx/faithe"

Opening processes

```rust use faithe::types::accessrights::PROCESSALL_ACCESS; use faithe::process as ps;

let process = ps::Processes::new()? .find(|p| p.szexefile == "Process name.exe") .unwrap() .open(false, PROCESSALLACCESS)?; ```

Modules iterating

rust let process = get_process(); process .modules()? .for_each(|m| dbg!(m));

Reading / Writing memory

```rust let process = getprocess(); let mut value = process.readprocess_memory::(0xFF)?; value += 100;

process.writeprocessmemory(0xFF, value)?; ```

Allocating / Freeing / Protecting / Querying memory

```rust use faithe::types::protectionflags::{PAGEEXECUTEREADWRITE, PAGEREADONLY}; use faithe::types::allocationtypes::{MEMCOMMIT, MEMRESERVE}; use faithe::types::freetypes::MEM_RELEASE;

let process = getprocess(); let mut chunk = process.virtualallocate( 0, 1000, MEMCOMMIT | MEMRESERVE, PAGEEXECUTEREADWRITE )?; let info = process.virtual_query(chunk)?;

process.virtualprotect(chunk, 1000, PAGEREADONLY)?; process.virtualfree(chunk, 0, MEMRELEASE)?; ```

Searching for patterns

```rust use faithe::pattern::Pattern;

let process = getprocess(); let address = process.findpattern( "Something.exe", // Available styles: IDA, Code, PiDB Pattern::fromidastyle("48 89 85 F0 00 00 00 4C 8B ? ? ? ? ? 48 8D") )?; ```

Macros

```rust use faithe::{interface, xstruct};

struct CEntity;

// Creates a trait that will emulate behavior of virtual functions in C++. interface! { trait IEntity { 0 @ fn gethealth() -> u32; 1 @ fn sethealth(newvalue: u32); } impl for CEntity; /* class IEntity { virtual int gethealth() = 0; virtual void sethealth(int newvalue) = 0; }; */ }

// Creates struct with explicitly defined offsets. xstruct! { struct CPlayer { // health will be availble at offset 0x100 0x100 @ health: u32, // stamina will be availble at offset 0x100 0x250 @ stamina: f32 } } ```