Check whether your password has been pwnd
Project description
Check whether a password has been compromised
Query the have-i-been-pwned database for breaches that contain a given password. Returns the number of breaches found in the database:
$ pwny p@ssw0rd 51763 $ pwny aiPh1eehec8AhY2y 0
At no time the raw password is transferred to https://haveibeenpwned.com. Instead we use the generously offered API to deploy k-anonymity. I.e. we send the first five chars of the SHA1 hash of any given password. This way you can check new passwords without revealing them to the server (or any listening party).
little-pwny requires no additional packages, but it does not run on Python 2.x.
Install
with pip
Simply:
$ pip install little-pwny
From Source
Clone the source:
$ git clone https://github.com/ulif/little-pwny $ cd little-pwny
Create and activate a virtualenv:
$ virtualenv env $ source ./env/bin/activate.sh
Then, from this directory, install the package:
[venv] $ pip install -e .
Running Tests
We use tox and py.test for testing. So,:
$ pip install tox $ tox
should run all tests.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for little_pwny-0.1-py2.py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | e97ec4f4e23f5f7041b12560b28e8a1e7bdb3eb919b1393d43c146b2c30f1b7c |
|
MD5 | dda0da40c5f5242baf5fe98010e8ca08 |
|
BLAKE2b-256 | e14b8b4bd076203f5e08b625dce222775a1c3c3fac77e3879bc7ca196f5e6b39 |