Skip to main content

API for Hardsploit HW access

Project description




Hardsploit

The essential security auditing tool for Internet of Things devices you'll need in your toolbox





Board hardsploit



About the project

Hardsploit is an innovative hardware security testing platform designed to aid security researchers, engineers, and auditors in analyzing and evaluating the security of hardware devices.

Featuring a modular design, Hardsploit supports various interfaces like JTAG, SPI, I2C, and UART, allowing for extensive hardware testing and reverse engineering.

Main security audit functions:

  • Sniffer (Real-time communication monitoring)
  • Scanner (Automatic detection of JTAG, SPI, I2C, and UART interfaces on target devices.)
  • Injection (Data injection to test device responses.)
  • Memory dumping (Extracting the contents of a chip memory)
  • ...

Features:

  • Advanced Firmware Analysis: Detects and analyzes vulnerabilities in firmware.
  • Hardware Exploit Tools: Tools to exploit detected vulnerabilities.
  • Secure Firmware Update: Updates firmware while ensuring security and integrity.
  • Enhanced User Interface: More intuitive and interactive interface.
  • ...

Supported communication protocols:

  • UART (Universal Asynchronous Receiver-Transmitter)
  • SPI (Serial Peripheral Interface)
  • I2C (Inter-Integrated Circuit)
  • JTAG (Joint Test Action Group)
  • SWD (Serial Wire Debug)
  • NRF24L01 (Work in progress)
  • ...


Getting Started

This guide will help you quickly get started with Hardsploit, covering the necessary prerequisites and installation steps.

Pre-requisites

To be able to start using Hardsploit, make sure that you have the following prerequisites installed:

  • Python v3.9 or later
  • A Linux machine (tested on Ubuntu, Kali and Raspberry Pi OS)

Installation

  1. Install the hardsploit API.

    pip install hardsploit

  2. To learn more about how to use the API, check our Wiki

Add permission for non root user to use USB

  1. Copy file in data folder to udevadm system folder /lib/udev/rules.d/.

    sudo cp data/50-Hardsploit.rules /lib/udev/rules.d/.

  2. Verify that user is in plugdev group

    groups "user"

  3. Else add user to plugdev groupe

    adduser "user" plugdev

  4. Force system context reload

    sudo udevadm control --reload
    sudo udevadm trigger

If this does not work then reboot.


Graphical User Interface

A more user friendly way to use Hardsploit!

You can find our GUI here!


Technologies used

This project has been developed using the following technologies:

  • Python (Programming language used for project development.)
  • Poetry (Dependency management tool for Python projects.)
  • Pyusb (Library for USB access on Python, allowing easy communication with USB devices.)
  • Colorama (Library for colored terminal text in Python, enhancing readability of console output.)


License

Hardsploit is licensed under *LGPLv3*. See the LICENSE file for more information.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

hardsploit-2.0.0.tar.gz (350.9 kB view details)

Uploaded Source

Built Distribution

hardsploit-2.0.0-py3-none-any.whl (353.4 kB view details)

Uploaded Python 3

File details

Details for the file hardsploit-2.0.0.tar.gz.

File metadata

  • Download URL: hardsploit-2.0.0.tar.gz
  • Upload date:
  • Size: 350.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.8.3 CPython/3.12.3 Linux/6.8.0-41-generic

File hashes

Hashes for hardsploit-2.0.0.tar.gz
Algorithm Hash digest
SHA256 fd3bc68b84b4a4bf6002a4a7acdd571b6d7c8968f13c05341487d76047aa97db
MD5 edfd793b8b96604c01dfa777830f853a
BLAKE2b-256 bf38d660831294e8eaedc8a3c950096ee597bf772d4b44f1fb4512734d148792

See more details on using hashes here.

File details

Details for the file hardsploit-2.0.0-py3-none-any.whl.

File metadata

  • Download URL: hardsploit-2.0.0-py3-none-any.whl
  • Upload date:
  • Size: 353.4 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.8.3 CPython/3.12.3 Linux/6.8.0-41-generic

File hashes

Hashes for hardsploit-2.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 655107b5e521a6e4b90c60335bf62d24a1ee75c95879b19ddc334920ae3a7a99
MD5 76d035210ae3af9b3c502f1e5c0685fd
BLAKE2b-256 5456d3ea437267233d100b5597b7d86e7b191d1c428e6ac36b7c3194132e0519

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page