Hardcodes is a utility for searching strings hardcoded by developers in programs. It uses a modular tokenizer that can handle comments, any number of backslashes & nearly any syntax you throw at it.
Yes, it is designed to process any syntax and following languages are officially supported:
ada, applescript, c, c#, c++, coldfusion, golang, haskell, html, java, javascript, jsp, lua, pascal, perl, php, powershell, python, ruby, scala, sql, swift, xml
Installation
pip3 install hardcodes
git clone https://github.com/s0md3v/hardcodes
cd hardcodes && python3 setup.py install
Documentation
It is available as both a library as well as a command line program. The relevant documentation can be found below:
For Developers
The sample program below demonstrates usage of hardcodes
library
from hardcodes import search
string = “console.log(‘hello there’)”
result = search(string, lang=”common”, comments=”parse”)
print(result)
Output: [‘hello there’]
The arguments lang
and comments
are optional. Their use is explained below in the user documentation section.
For Users
cli.py
provides a grep-like command line interface to hardcodes
library. You will need to install the library first to use it.
python cli.py /path/to/file.ext
python cli.py -r /path/to/dir
python cli.py -o /path/to/file.ext
Specifying a language is optional and should be used only when the programming language of source is already known.
python cli.py -l ‘golang’ /path/to/file.go
With -c
option, you can specify
ignore
ignore the comments completelyparse
parse the comments like codestring
add comments to list of hardcoded stringspython cli.py -o /path/to/file.ext
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…