Hardcodes : Find Hardcoded Strings From Source Code

Hardcodes is a utility for searching strings hardcoded by developers in programs. It uses a modular tokenizer that can handle comments, any number of backslashes & nearly any syntax you throw at it.

Yes, it is designed to process any syntax and following languages are officially supported:

ada, applescript, c, c#, c++, coldfusion, golang, haskell, html, java, javascript, jsp, lua, pascal, perl, php, powershell, python, ruby, scala, sql, swift, xml

Installation

  • With pip

pip3 install hardcodes

  • or build from source

git clone https://github.com/s0md3v/hardcodes
cd hardcodes && python3 setup.py install

Documentation

It is available as both a library as well as a command line program. The relevant documentation can be found below:

For Developers

The sample program below demonstrates usage of hardcodes library

from hardcodes import search

string = “console.log(‘hello there’)”
result = search(string, lang=”common”, comments=”parse”)
print(result)

Output: [‘hello there’]

The arguments lang and comments are optional. Their use is explained below in the user documentation section.

For Users

cli.py provides a grep-like command line interface to hardcodes library. You will need to install the library first to use it.

  • Find Strings In A File

python cli.py /path/to/file.ext

  • Find strings in a directory, recursively

python cli.py -r /path/to/dir

  • Hide paths from output

python cli.py -o /path/to/file.ext

  • Specify programming language

Specifying a language is optional and should be used only when the programming language of source is already known.

python cli.py -l ‘golang’ /path/to/file.go

  • Specify comment behaviour

With -c option, you can specify

  • ignore ignore the comments completely
  • parse parse the comments like code
  • string add comments to list of hardcoded strings

python cli.py -o /path/to/file.ext

R K

Recent Posts

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

1 week ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

2 weeks ago