Skip to main content

A comprehensive key reconnaissance framework for red team activities

Project description

keychecker 🗝️✨

unleash the potential of discovered keys in the wild with the keychecker
keychecker Logo

keychecker is a comprehensive key reconnaissance framework designed to facilitate the identification of potential usage locations and provide detailed insights into discovered keys during red team activities.

🚀 Features

  • Key Reconnaissance - keychecker employs advanced scanning techniques to identify potential places where keys can be potentially used.
  • Detailed Key Insights - keychecker goes beyond simple detection, providing in-depth information about the discovered keys, such as associated services, encryption algorithms, or any other information that can be fetched from the key.
  • Extensibility - keychecker is designed with extensibility in mind, allowing users to easily integrate custom modules for tailored reconnaissance and analysis.

🧙‍♂️ Getting Started

Prerequisites

Before installing keychecker, ensure that your system meets the following requirements:

  • Python Version: keychecker is compatible with Python 3.11 and above.
python --version
  • pip3 Version: pip version should be comptaible with Python3.11.

Installation

To install the project use the pip utility

pip install keychecker

Usage

To run keychecker in interactive mode, just run the following command -

keychecker

It will also generate a command that you can run to automatically generate the same desired output.

To run the command with flags, run the following command -

$ keychecker --help

|   _      _ |_   _   _ |   _  ._
|< (/_ \/ (_ | | (/_ (_ |< (/_ | 
       /                         1.0.0 
---

usage: keychecker [-h] {identify,ssh} ...

Identifies the key and enumerates it for details.

options:
  -h, --help      show this help message and exit

subcommands:
  {identify,ssh}  functionalities
    identify      Identify the type of key.
    ssh           Enumerate using SSH key.

For any issues/concerns reach out to keychecker@cyfinoid.com

🌟 Examples

keychecker ssh --input /Users/molly/wild_keys/id_rsa --gitlab --bruteforce --wordlist /Users/molly/wordlist.txt

This command examines the SSH key located at /Users/molly/wild_keys/id_rsa for it's association with any user in gitlab platform and if any user is found then it will bruteforce the private repositories of the user based on the wordlist provided.

You can also take an interactive approach by simply typing:

keychecker

This command will prompt you with questions and guide you through the process to obtain the results.

🤝 Contributing

Follow our Contribution Guidelines (TBD).

📜 License

This project is licensed under the GPL-3.0 - see the LICENSE file for enchanting details.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

keychecker-1.0.0.tar.gz (208.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

keychecker-1.0.0-py3-none-any.whl (23.0 kB view details)

Uploaded Python 3

File details

Details for the file keychecker-1.0.0.tar.gz.

File metadata

  • Download URL: keychecker-1.0.0.tar.gz
  • Upload date:
  • Size: 208.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.6

File hashes

Hashes for keychecker-1.0.0.tar.gz
Algorithm Hash digest
SHA256 03ece83540e6d8234eb55969e4217eb7ba96962f2dc78ee4d22972d30f30a561
MD5 00ec847cf57a0f9549f93b6013c53c45
BLAKE2b-256 3a9efec26e617218ba85e9a15148252b4bd3efed75a29fff887051d494c9f1db

See more details on using hashes here.

File details

Details for the file keychecker-1.0.0-py3-none-any.whl.

File metadata

  • Download URL: keychecker-1.0.0-py3-none-any.whl
  • Upload date:
  • Size: 23.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.6

File hashes

Hashes for keychecker-1.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 83c2dbd93ce5eb907d7ef1d9d0fae9a7bc3b04b826888549e00750f04396668c
MD5 30358e22675143ba98c737dbad0dbb9c
BLAKE2b-256 26711b0fb4e901bcb0676653fdf66672726c5b25acbec9d3cafe1ae995e04fc7

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page