Memory hacking library for windows.
toml
[dependencies.faithe]
git = "https://github.com/sy1ntexx/faithe"
```rust use faithe::types::accessrights::PROCESSALL_ACCESS; use faithe::process as ps;
let process = ps::Processes::new()? .find(|p| p.szexefile == "Process name.exe") .unwrap() .open(false, PROCESSALLACCESS)?; ```
rust
let process = get_process();
process
.modules()?
.for_each(|m| dbg!(m));
```rust
let process = getprocess();
let mut value = process.readprocess_memory::
process.writeprocessmemory(0xFF, value)?; ```
```rust use faithe::types::protectionflags::{PAGEEXECUTEREADWRITE, PAGEREADONLY}; use faithe::types::allocationtypes::{MEMCOMMIT, MEMRESERVE}; use faithe::types::freetypes::MEM_RELEASE;
let process = getprocess(); let mut chunk = process.virtualallocate( 0, 1000, MEMCOMMIT | MEMRESERVE, PAGEEXECUTEREADWRITE )?; let info = process.virtual_query(chunk)?;
process.virtualprotect(chunk, 1000, PAGEREADONLY)?; process.virtualfree(chunk, 0, MEMRELEASE)?; ```
```rust use faithe::pattern::Pattern;
let process = getprocess(); let address = process.findpattern( "Something.exe", // Available styles: IDA, Code, PiDB Pattern::fromidastyle("48 89 85 F0 00 00 00 4C 8B ? ? ? ? ? 48 8D") )?; ```
```rust use faithe::{interface, xstruct};
struct CEntity;
// Creates a trait that will emulate behavior of virtual functions in C++. interface! { trait IEntity { 0 @ fn gethealth() -> u32; 1 @ fn sethealth(newvalue: u32); } impl for CEntity; /* class IEntity { virtual int gethealth() = 0; virtual void sethealth(int newvalue) = 0; }; */ }
// Creates struct with explicitly defined offsets. xstruct! { struct CPlayer { // health will be availble at offset 0x100 0x100 @ health: u32, // stamina will be availble at offset 0x100 0x250 @ stamina: f32 } } ```