Expand description
#Poggers A Work in Progress Memory (game cheating) Library for Rust
Safety
We do not wish to strive away from the safe nature of rust, so all the code in this library should be safe, and shouldn’t violate any of the rules of rust.
Introduction for windows
External
Poggers allows you to effortlessly make external cheats for games. This is made possible with currently two modules which we feel like are the most important. Those being the following:
- [
Self::mem::Windows::process::Process] - A wrapper around a process, allowing you to do basic things like read, write and change protections on memory.. - [
Self::mem::Windows::module::Module] - A wrapper around a module. With these two constructs it should make it pretty easy to safe and efficient external cheats.
Internal
Not complete.
Introduction for linux
Not complete.
Example
use poggers::mem::process::Process;
use poggers::mem::module::Module;
let process = Process::new("notepad.exe").unwrap();
let module = Module::new("user32.dll", &process).unwrap();
let what = module.scan_virtual("48 8B 05 ? ? ? ? 48 8B 88 ? ? ? ? 48 85 C9 74 0A").unwrap();
process.read::<u32>(what).unwrap();License
This project is licensed under the GPL-2.0 license.
Re-exports
pub use mem::*;Modules
Attribute Macros
This macro allows you to define a function which will be called upon dll injection