Skip to main content

QT graphical interface for Hardsploit HW access

Project description




Hardsploit

The essential security auditing tool for Internet of Things devices you'll need in your toolbox





Board hardsploit



About the project

Hardsploit is an innovative hardware security testing platform designed to aid security researchers, engineers, and auditors in analyzing and evaluating the security of hardware devices.

Featuring a modular design, Hardsploit supports various interfaces like JTAG, SPI, I2C, and UART, allowing for extensive hardware testing and reverse engineering.

Main security audit functions:

  • Sniffer (Real-time communication monitoring)
  • Scanner (Automatic detection of JTAG, SPI, I2C, and UART interfaces on target devices.)
  • Injection (Data injection to test device responses.)
  • Memory dumping (Extracting the contents of a chip memory)
  • ...

Features:

  • Advanced Firmware Analysis: Detects and analyzes vulnerabilities in firmware.
  • Hardware Exploit Tools: Tools to exploit detected vulnerabilities.
  • Secure Firmware Update: Updates firmware while ensuring security and integrity.
  • Enhanced User Interface: More intuitive and interactive interface.
  • ...

Supported communication protocols:

  • UART (Universal Asynchronous Receiver-Transmitter)
  • SPI (Serial Peripheral Interface)
  • I2C (Inter-Integrated Circuit)
  • JTAG (Joint Test Action Group)
  • SWD (Serial Wire Debug)
  • NRF24L01 (Work in progress)
  • ...



Getting Started

This guide will help you quickly get started with Hardsploit, covering the necessary prerequisites and installation steps.

Pre-requisites

To be able to start using Hardsploit, make sure that you have the following prerequisites installed:

  • Python v3.9 or later
  • A Linux machine (tested on Ubuntu, Kali and Raspberry Pi OS)

Installation

  1. Install the Hardsploit GUI.

    pip install hardsploit-gui

  2. That's all! Now you can start hardsploit with the following command.

    harsploit

Create your own Hardsploit project

If you want to make your Hardsploit more personal, here is the guide.

Pre-requisites

To be able to develope your project, make sure that you have the following prerequisites:

  • Python v3.9 or later
  • A Linux machine (tested on Ubuntu, Kali, Debian and Raspberry Pi OS)
  • A virtual environment
  1. Install the Hardsploit api!

    1. Clone Hardsploit Api.

      git clone "https://github.com/serma-safety-security/hardsploit.git"

    2. Go in the cloned repository (Here, you can modifie the api)

      cd "Path/To/Hardsploit

    3. Build the API

      poetry build

    4. Install the API

      poetry install

  2. Install the Hardsploit gui

    1. Clone Hardsploit GUI.

      git clone "https://github.com/serma-safety-security/hardsploit-gui.git"

    2. Go in the cloned repository (Here, you can modifie the GUI)

      cd Path/to/hardsploit-gui

    3. Build the GUI

      poetry build

    4. Install the GUI

      poetry install

  3. Start Hardsploit

    poetry run hardsploit


Migration guide

  1. Click on the import button (or ctrl + V)
  2. Choose the old database (.sqlite3 file)
  3. Then press "Import"

This import button can also be use to import saved component, commands or both. Just select a .json file

To save multiple components, click on the export button.



Technologies used

This project has been developed using the following technologies:

  • Python (Programming language used for project development.)
  • PySide6 (Python framework for developing graphical user interfaces (GUI).)
  • Poetry (Dependency management tool for Python projects.)
  • Peewee (A small, expressive ORM (Object-Relational Mapping) library for Python.)


License

Hardsploit is licensed under *LGPLv3*. See the LICENSE file for more information.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

hardsploit_gui-2.0.0.tar.gz (283.0 kB view details)

Uploaded Source

Built Distribution

hardsploit_gui-2.0.0-py3-none-any.whl (159.4 kB view details)

Uploaded Python 3

File details

Details for the file hardsploit_gui-2.0.0.tar.gz.

File metadata

  • Download URL: hardsploit_gui-2.0.0.tar.gz
  • Upload date:
  • Size: 283.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.8.3 CPython/3.12.3 Linux/6.8.0-41-generic

File hashes

Hashes for hardsploit_gui-2.0.0.tar.gz
Algorithm Hash digest
SHA256 be0835707df24cdae6a4558fe377a1a0da5abb4f1753ddc3eb547a2365dee725
MD5 647d61996f20d6ee377f54a37dc9751b
BLAKE2b-256 85458446e69a03d868d2b7a06d960fd4bc26bc752b3d2c36688c47204b06279c

See more details on using hashes here.

File details

Details for the file hardsploit_gui-2.0.0-py3-none-any.whl.

File metadata

  • Download URL: hardsploit_gui-2.0.0-py3-none-any.whl
  • Upload date:
  • Size: 159.4 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.8.3 CPython/3.12.3 Linux/6.8.0-41-generic

File hashes

Hashes for hardsploit_gui-2.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 6dc72d56f96a193a6666c04dbc177fc17659b481acfc9a4d545359d912fe9349
MD5 cebdfc1571b8d2be61c9b730d6119a31
BLAKE2b-256 3be1a0723d6ab0780a986e2ce0d77bdbbbdc0499a7320ed5c3fb58eed96192b9

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page