API for Hardsploit HW access
Project description
Table of contents
About the projectHardsploit is an innovative hardware security testing platform designed to aid security researchers, engineers, and auditors in analyzing and evaluating the security of hardware devices. Featuring a modular design, Hardsploit supports various interfaces like JTAG, SPI, I2C, and UART, allowing for extensive hardware testing and reverse engineering. Main security audit functions:
Features:
Supported communication protocols:
|
Getting Started
This guide will help you quickly get started with Hardsploit, covering the necessary prerequisites and installation steps.
Pre-requisites
To be able to start using Hardsploit, make sure that you have the following prerequisites installed:
- Python v3.9 or later
- A Linux machine (tested on Ubuntu, Kali and Raspberry Pi OS)
Installation
-
Install the hardsploit API.
pip install hardsploit
-
To learn more about how to use the API, check our Wiki
Add permission for non root user to use USB
-
Copy file in data folder to udevadm system folder /lib/udev/rules.d/.
sudo cp data/50-Hardsploit.rules /lib/udev/rules.d/.
-
Verify that user is in plugdev group
groups "user"
-
Else add user to plugdev groupe
adduser "user" plugdev
-
Force system context reload
sudo udevadm control --reload
sudo udevadm trigger
If this does not work then reboot.
Technologies used
This project has been developed using the following technologies:
- Python (Programming language used for project development.)
- Poetry (Dependency management tool for Python projects.)
- Pyusb (Library for USB access on Python, allowing easy communication with USB devices.)
- Colorama (Library for colored terminal text in Python, enhancing readability of console output.)
License
Hardsploit is licensed under *LGPLv3*. See the LICENSE file for more information.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file hardsploit-2.0.0.tar.gz
.
File metadata
- Download URL: hardsploit-2.0.0.tar.gz
- Upload date:
- Size: 350.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/1.8.3 CPython/3.12.3 Linux/6.8.0-41-generic
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | fd3bc68b84b4a4bf6002a4a7acdd571b6d7c8968f13c05341487d76047aa97db |
|
MD5 | edfd793b8b96604c01dfa777830f853a |
|
BLAKE2b-256 | bf38d660831294e8eaedc8a3c950096ee597bf772d4b44f1fb4512734d148792 |
File details
Details for the file hardsploit-2.0.0-py3-none-any.whl
.
File metadata
- Download URL: hardsploit-2.0.0-py3-none-any.whl
- Upload date:
- Size: 353.4 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/1.8.3 CPython/3.12.3 Linux/6.8.0-41-generic
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 655107b5e521a6e4b90c60335bf62d24a1ee75c95879b19ddc334920ae3a7a99 |
|
MD5 | 76d035210ae3af9b3c502f1e5c0685fd |
|
BLAKE2b-256 | 5456d3ea437267233d100b5597b7d86e7b191d1c428e6ac36b7c3194132e0519 |