Hardcodes : Find Hardcoded Strings From Source Code

Hardcodes is a utility for searching strings hardcoded by developers in programs. It uses a modular tokenizer that can handle comments, any number of backslashes & nearly any syntax you throw at it.

Yes, it is designed to process any syntax and following languages are officially supported:

ada, applescript, c, c#, c++, coldfusion, golang, haskell, html, java, javascript, jsp, lua, pascal, perl, php, powershell, python, ruby, scala, sql, swift, xml

Installation

  • With pip

pip3 install hardcodes

  • or build from source

git clone https://github.com/s0md3v/hardcodes
cd hardcodes && python3 setup.py install

Documentation

It is available as both a library as well as a command line program. The relevant documentation can be found below:

For Developers

The sample program below demonstrates usage of hardcodes library

from hardcodes import search

string = “console.log(‘hello there’)”
result = search(string, lang=”common”, comments=”parse”)
print(result)

Output: [‘hello there’]

The arguments lang and comments are optional. Their use is explained below in the user documentation section.

For Users

cli.py provides a grep-like command line interface to hardcodes library. You will need to install the library first to use it.

  • Find Strings In A File

python cli.py /path/to/file.ext

  • Find strings in a directory, recursively

python cli.py -r /path/to/dir

  • Hide paths from output

python cli.py -o /path/to/file.ext

  • Specify programming language

Specifying a language is optional and should be used only when the programming language of source is already known.

python cli.py -l ‘golang’ /path/to/file.go

  • Specify comment behaviour

With -c option, you can specify

  • ignore ignore the comments completely
  • parse parse the comments like code
  • string add comments to list of hardcoded strings

python cli.py -o /path/to/file.ext

R K

Recent Posts

Networking Devices 101: Understanding Routers, Switches, Hubs, and More

What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…

5 hours ago

Sock Puppets in OSINT: How to Build and Use Research Accounts

Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…

6 hours ago

What is SIEM? Complete Guide to Security Information and Event Management

Introduction As cyber threats grow more sophisticated, organizations need more than just firewalls and antivirus…

16 hours ago

Website OSINT: Tools and Techniques for Reconnaissance

Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…

1 day ago

Top OSINT Tools to Find Emails, Usernames and Passwords

Introduction In the world of cybersecurity, knowledge is power. One of the most powerful skillsets…

2 days ago

Google Dorking in Cybersecurity: A Complete Guide

Introduction In the vast ocean of the internet, the most powerful tool you already have…

2 days ago