A comprehensive key reconnaissance framework for red team activities
Project description
keychecker 🗝️✨
unleash the potential of discovered keys in the wild with the keychecker
keychecker is a comprehensive key reconnaissance framework designed to facilitate the identification of potential usage locations and provide detailed insights into discovered keys during red team activities.
🚀 Features
- Key Reconnaissance - keychecker employs advanced scanning techniques to identify potential places where keys can be potentially used.
- Detailed Key Insights - keychecker goes beyond simple detection, providing in-depth information about the discovered keys, such as associated services, encryption algorithms, or any other information that can be fetched from the key.
- Extensibility - keychecker is designed with extensibility in mind, allowing users to easily integrate custom modules for tailored reconnaissance and analysis.
🧙♂️ Getting Started
Prerequisites
Before installing keychecker, ensure that your system meets the following requirements:
- Python Version: keychecker is compatible with Python 3.11 and above.
python --version
- pip3 Version:
pipversion should be comptaible with Python3.11.
Installation
To install the project use the pip utility
pip install keychecker
Usage
To run keychecker in interactive mode, just run the following command -
keychecker
It will also generate a command that you can run to automatically generate the same desired output.
To run the command with flags, run the following command -
$ keychecker --help
| _ _ |_ _ _ | _ ._
|< (/_ \/ (_ | | (/_ (_ |< (/_ |
/ 1.0.0
---
usage: keychecker [-h] {identify,ssh} ...
Identifies the key and enumerates it for details.
options:
-h, --help show this help message and exit
subcommands:
{identify,ssh} functionalities
identify Identify the type of key.
ssh Enumerate using SSH key.
For any issues/concerns reach out to keychecker@cyfinoid.com
🌟 Examples
keychecker ssh --input /Users/molly/wild_keys/id_rsa --gitlab --bruteforce --wordlist /Users/molly/wordlist.txt
This command examines the SSH key located at /Users/molly/wild_keys/id_rsa for it's association with any user in gitlab platform and if any user is found then it will bruteforce the private repositories of the user based on the wordlist provided.
You can also take an interactive approach by simply typing:
keychecker
This command will prompt you with questions and guide you through the process to obtain the results.
🤝 Contributing
Follow our Contribution Guidelines (TBD).
📜 License
This project is licensed under the GPL-3.0 - see the LICENSE file for enchanting details.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file keychecker-1.0.0.tar.gz.
File metadata
- Download URL: keychecker-1.0.0.tar.gz
- Upload date:
- Size: 208.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.6
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
03ece83540e6d8234eb55969e4217eb7ba96962f2dc78ee4d22972d30f30a561
|
|
| MD5 |
00ec847cf57a0f9549f93b6013c53c45
|
|
| BLAKE2b-256 |
3a9efec26e617218ba85e9a15148252b4bd3efed75a29fff887051d494c9f1db
|
File details
Details for the file keychecker-1.0.0-py3-none-any.whl.
File metadata
- Download URL: keychecker-1.0.0-py3-none-any.whl
- Upload date:
- Size: 23.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.6
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
83c2dbd93ce5eb907d7ef1d9d0fae9a7bc3b04b826888549e00750f04396668c
|
|
| MD5 |
30358e22675143ba98c737dbad0dbb9c
|
|
| BLAKE2b-256 |
26711b0fb4e901bcb0676653fdf66672726c5b25acbec9d3cafe1ae995e04fc7
|