Skip to main content

Ultra-fast flag & string hunter for mixed/Unicode encodings

Project description

SmartHunter 🔍

License: MIT PyPI version Python Versions

SmartHunter is a high-performance tool designed to scan binaries, firmware, and any byte source for hidden strings and flags in multiple encoding formats. Built with CTF competitions and security research in mind, it features intelligent string detection, automatic flag pattern recognition, and scoring mechanisms.

00002345 [base64] (score: 0.95) 'flag{h1dd3n_1n_pl41n_s1ght}'
000047A9 [hex] (score: 0.85) 'secret_key_found_in_binary'
0000F5C8 [base32] (score: 0.80) 'CTF{d3c0d3_m3_1f_y0u_c4n}'

✨ Features

  • Multi-Encoding Support: Detect strings in 13 different encoding formats:

    • Base64 (Standard and URL-safe)
    • Base32
    • Base85
    • Hexadecimal
    • URL encoding (%XX)
    • Octal
    • Decimal
    • UTF-16 (both endianness)
    • Morse code
    • Braille
    • BaseXX (hidden flags in text)
    • Cleartext (ASCII)
  • Smart Detection:

    • Confidence scoring algorithm
    • Automatic flag pattern boosting (flag{}, CTF{}, etc.)
    • Deduplication of results
    • Configurable thresholds
  • Performance Optimized:

    • Efficient regular expressions
    • Fast byte manipulation
    • Memory-mapped file access for large binaries
  • Flexible Output:

    • Clean mode for high-confidence results only
    • Adjustable confidence threshold
    • Customizable min/max length filtering
    • JSON export for further analysis

🚀 Installation

From PyPI

pip install smarthunter

From Source

git clone https://github.com/yourname/smarthunter.git
cd smarthunter
pip install -e .

📋 Usage

Basic Usage

# Scan a file and display all found strings
smarthunter sample.bin

# Use clean mode to show only high-confidence results (score >= 0.8)
smarthunter sample.bin --clean

# Set a custom confidence threshold (0.0-1.0)
smarthunter sample.bin --threshold 0.7

# Control string length filtering
smarthunter sample.bin --min 6 --max 120

# Export results to JSON for further analysis
smarthunter sample.bin --out results.json

# Directly decode an encoded string (new in v1.0.1)
smarthunter --decode "%66%6c%61%67%7b%68%69%64%64%65%6e%5f%69%6e%5f%75%72%6c%5f%65%6e%63%6f%64%69%6e%67%7d"

# Decode hex string directly
smarthunter --decode "73 65 63 72 65 74 5f 6d 65 73 73 61 67 65 5f 69 6e 5f 68 65 78 5f 66 6f 72 6d 61 74"

Command-Line Options

Option Description
--clean Show only high-confidence results (score >= 0.8)
--threshold FLOAT Set minimum confidence score (0.0-1.0)
--min INT Minimum length of decoded string (default: 4)
--max INT Maximum length of decoded string (default: 120)
--out FILE Save results to JSON file
--decode Decode string directly instead of scanning file

💻 Python API

SmartHunter can be easily integrated into your Python projects:

from smarthunter import scan_file

# Scan a file and process results
results = scan_file("firmware.bin")

# Results are sorted by confidence score
for result in results:
    print(f"Found at 0x{result['offset']:08x}: {result['text']}")
    print(f"  Encoding: {result['codec']}")
    print(f"  Confidence: {result['score']:.2f}")

# Filter by confidence score
high_confidence = [r for r in results if r['score'] >= 0.8]

# Find likely flags
flags = [r for r in results if 'flag{' in r['text'].lower()]

🔍 Examples

Finding Hidden Flags in CTF Challenges

SmartHunter excels at finding hidden flags in CTF challenges:

# Scan a CTF binary and output high-confidence results
smarthunter challenge.bin --clean

Analyzing Firmware for Secrets

# Search for secrets in firmware with minimum length of 8 characters
smarthunter firmware.bin --min 8 --threshold 0.6 --out firmware_secrets.json

Scanning Text Files for Steganography

# Check if a text file contains hidden messages
smarthunter steg_message.txt --threshold 0.7

Direct Decoding of Encoded Strings

# Decode URL-encoded string
smarthunter --decode "%66%6c%61%67%7b%68%69%64%64%65%6e%5f%69%6e%5f%75%72%6c%5f%65%6e%63%6f%64%69%6e%67%7d"

# Decode hexadecimal string
smarthunter --decode "73 65 63 72 65 74 5f 6d 65 73 73 61 67 65"

# Decode Base64 string
smarthunter --decode "ZmxhZ3t0aGlzX2lzX2JhcTY0X2VuY29kZWRfZmxhZ30="

🔧 How It Works

SmartHunter works by:

  1. Memory-mapping the target file for efficient access
  2. Applying optimized detection algorithms for each encoding format
  3. Scoring detected strings based on multiple factors:
    • Printable character ratio
    • Pattern matches (flags, keys, etc.)
    • String length
  4. Filtering and deduplicating results
  5. Ranking findings by confidence score

📝 License

This project is licensed under the MIT License - see the LICENSE file for details.

🤝 Contributing

Contributions are welcome! Feel free to:

  • Report bugs
  • Suggest features
  • Add new decoders
  • Improve performance
  • Submit pull requests

📚 Acknowledgments

  • Inspired by CTF challenges and the need for better binary string extraction tools
  • Special thanks to the security and CTF community

Made with ❤️ for security researchers and CTF players

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

smarthunter-1.0.2.tar.gz (16.9 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

smarthunter-1.0.2-py3-none-any.whl (19.7 kB view details)

Uploaded Python 3

File details

Details for the file smarthunter-1.0.2.tar.gz.

File metadata

  • Download URL: smarthunter-1.0.2.tar.gz
  • Upload date:
  • Size: 16.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.10.6

File hashes

Hashes for smarthunter-1.0.2.tar.gz
Algorithm Hash digest
SHA256 e5f5eb26c91aa3fe6c395a808d08bceb8eac58902d47f9810ebb8989ef1c08c0
MD5 a6d50202d6ba49e8f1820504b3ad904d
BLAKE2b-256 7af53646085c98d8cb6ffa59c68d71082c9c59d1e2600401908950fe0f81e8ef

See more details on using hashes here.

File details

Details for the file smarthunter-1.0.2-py3-none-any.whl.

File metadata

  • Download URL: smarthunter-1.0.2-py3-none-any.whl
  • Upload date:
  • Size: 19.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.10.6

File hashes

Hashes for smarthunter-1.0.2-py3-none-any.whl
Algorithm Hash digest
SHA256 160eff8b6aee23c78fb8121dada1994e92a2fe6f7e78ca2deff38866ae4fdcc9
MD5 65d2fba881026a7bff3491f96c1ef658
BLAKE2b-256 218550d6a7521e8615410a98badafbb22363a335404a49de1e805ef630a7cb3b

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page