Memory hacking library for windows.
```toml
[dependencies] faithe = "0.7.0"
[dependencies.faithe] git = "https://github.com/sy1ntexx/faithe" ```
```rust use faithe::types::accessrights::PROCESSALL_ACCESS; use faithe::process as ps;
let process = ps::Processes::new()? .find(|p| p.szexefile == "Process name.exe") .unwrap() .open(false, PROCESSALLACCESS)?; ```
rust
let process = get_process();
process
.modules()?
.for_each(|m| dbg!(m));
```rust
let process = getprocess();
let mut value = process.readprocess_memory::
process.writeprocessmemory(0xFF, value)?; ```
```rust use faithe::types::protectionflags::{PAGEEXECUTEREADWRITE, PAGEREADONLY}; use faithe::types::allocationtypes::{MEMCOMMIT, MEMRESERVE}; use faithe::types::freetypes::MEM_RELEASE;
let process = getprocess(); let mut chunk = process.virtualallocate( 0, 1000, MEMCOMMIT | MEMRESERVE, PAGEEXECUTEREADWRITE )?; let info = process.virtual_query(chunk)?;
process.virtualprotect(chunk, 1000, PAGEREADONLY)?; process.virtualfree(chunk, 0, MEMRELEASE)?; ```
```rust use faithe::pattern::Pattern;
let process = getprocess(); let address = process.findpattern( "Something.exe", // Available styles: IDA, Code, PiDB Pattern::fromidastyle("48 89 85 F0 00 00 00 4C 8B ? ? ? ? ? 48 8D") )?; ```
```rust use faithe::{interface, xstruct};
// Creates a trait that will emulate behavior of virtual functions in C++. struct CPlayer; interface! { trait IEntity(CPlayer) { extern "C" fn gethealth() -> i32 = 0; extern "C" fn sethealth(new: i32) = 1; } } /* class CPlayer { virtual int gethealth() = 0; virtual void sethealth(int new_value) = 0; }; */
// Creates struct with explicitly defined offsets. xstruct! { // STRUCT HAS SIZE OF ZERO. struct Foo { 0x0 @ a: u32, 0x16 @ b: bool }
// STRUCT HAS SIZE 20.
struct Bar(20) {
0x0 @ a: u32,
0x16 @ b: bool
}
}
// Creates a function with explicitly defined RVA relative to some module.
function! {
// Explicitly defined RVA offset relative to 01-hello
module.
extern FUNC: extern "C" fn(a: i32) = "01-hello.exe"@0x1900;
}
FUNC.call(5);
```