Hardcodes : Find Hardcoded Strings From Source Code

Hardcodes is a utility for searching strings hardcoded by developers in programs. It uses a modular tokenizer that can handle comments, any number of backslashes & nearly any syntax you throw at it.

Yes, it is designed to process any syntax and following languages are officially supported:

ada, applescript, c, c#, c++, coldfusion, golang, haskell, html, java, javascript, jsp, lua, pascal, perl, php, powershell, python, ruby, scala, sql, swift, xml

Installation

  • With pip

pip3 install hardcodes

  • or build from source

git clone https://github.com/s0md3v/hardcodes
cd hardcodes && python3 setup.py install

Documentation

It is available as both a library as well as a command line program. The relevant documentation can be found below:

For Developers

The sample program below demonstrates usage of hardcodes library

from hardcodes import search

string = “console.log(‘hello there’)”
result = search(string, lang=”common”, comments=”parse”)
print(result)

Output: [‘hello there’]

The arguments lang and comments are optional. Their use is explained below in the user documentation section.

For Users

cli.py provides a grep-like command line interface to hardcodes library. You will need to install the library first to use it.

  • Find Strings In A File

python cli.py /path/to/file.ext

  • Find strings in a directory, recursively

python cli.py -r /path/to/dir

  • Hide paths from output

python cli.py -o /path/to/file.ext

  • Specify programming language

Specifying a language is optional and should be used only when the programming language of source is already known.

python cli.py -l ‘golang’ /path/to/file.go

  • Specify comment behaviour

With -c option, you can specify

  • ignore ignore the comments completely
  • parse parse the comments like code
  • string add comments to list of hardcoded strings

python cli.py -o /path/to/file.ext

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago