Check whether your password has been pwnd
Project description
Check whether a password has been compromised
Query the have-i-been-pwned database for breaches that contain a given password. Returns the number of breaches found in the database:
$ pwny p@ssw0rd 51763 $ pwny aiPh1eehec8AhY2y 0
Please note, that the executable script is called pwny.
At no time the raw password is transferred to https://haveibeenpwned.com. Instead we use the generously offered haveibeenpwned.com-API to deploy k-anonymity. I.e. we send the first five chars of the SHA1 hash of any given password. This way you can check new passwords without revealing them to the server (or any listening party).
little-pwny requires no additional packages. It requires Python 3.x.
Install
with pip
Simply:
$ pip install little-pwny
From Source
Clone the source:
$ git clone https://github.com/ulif/little-pwny $ cd little-pwny
Create and activate a virtualenv:
$ virtualenv env $ source ./env/bin/activate.sh
Then, from this directory, install the package:
[venv] $ pip install -e .
Running Tests
We use tox and py.test for testing. So,:
$ pip install tox $ tox
should run all tests.
Changes
0.2 (2019-12-12)
Officially also support Python 3.5 and 3.7
Add support for commandline option –version.
Add support for commandline option –help.
0.1 (2019-10-31)
Initial release.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for little_pwny-0.2-py2.py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 1c09fcb860bb4176095f1c655f01ea1e41366e4e885766d62cf13de401d13ba3 |
|
MD5 | 62926f7707cd5bae895ef0183d7f6885 |
|
BLAKE2b-256 | 9e6446856dca9e4e5ae92953a4c573741dd204035de350085fdd1ee1d98f17d7 |