Delete 'have_I_b33n_pwned.py'
This commit is contained in:
parent
51fa474a43
commit
bb98e14450
@ -1,93 +0,0 @@
|
||||
#!/usr/bin/env python
|
||||
|
||||
# have_I_b33n_pwned.py
|
||||
# Check if your password (hash) appears in the leaked password database
|
||||
# of haveibeenpwned.com
|
||||
#
|
||||
# Copyright (C) 2019 willipink.eu
|
||||
# Author Moritz Münch moritzmuench@mailbox.org
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
# updater script for nextcloud
|
||||
#
|
||||
# TODO
|
||||
# - add feature: also check for email breaches
|
||||
# - add feature: keepass integration? isnt there something like this already?
|
||||
|
||||
|
||||
|
||||
from sys import argv, stdout
|
||||
from hashlib import sha1
|
||||
from getpass import getpass
|
||||
from requests import get
|
||||
|
||||
RED = "\033[1;31m"
|
||||
GREEN = "\033[0;32m"
|
||||
RESET = "\033[0;0m"
|
||||
API = 'https://api.pwnedpasswords.com/range/'
|
||||
ROW = '{:<30}{:<10}{:<45}'
|
||||
HIDDEN = False
|
||||
|
||||
|
||||
def header():
|
||||
print()
|
||||
print(ROW.format('password', 'leaked', 'sha1'))
|
||||
print('-' * 80)
|
||||
|
||||
|
||||
def prompt_password():
|
||||
print()
|
||||
password = getpass('Tell me your password: ')
|
||||
global HIDDEN
|
||||
HIDDEN = True
|
||||
header()
|
||||
query(password)
|
||||
|
||||
|
||||
def query(password):
|
||||
password_hash = sha1(password.encode('UTF-8')).hexdigest().upper()
|
||||
request = password_hash[:5]
|
||||
response = get(API + request).text
|
||||
hash_searched = 'not yet'
|
||||
for answer in response.splitlines():
|
||||
data = answer.split(':')
|
||||
combined_hash = request + data[0]
|
||||
if password_hash == combined_hash:
|
||||
hash_searched = int(data[1])
|
||||
break
|
||||
|
||||
if hash_searched == 'not yet':
|
||||
stdout.write(GREEN)
|
||||
else:
|
||||
stdout.write(RED)
|
||||
|
||||
if HIDDEN:
|
||||
password = '*' * len(password)
|
||||
|
||||
print(ROW.format(password, hash_searched, password_hash))
|
||||
stdout.write(RESET)
|
||||
|
||||
if HIDDEN:
|
||||
prompt_password()
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
if len(argv) < 2:
|
||||
prompt_password()
|
||||
else:
|
||||
header()
|
||||
for password in argv[1:]:
|
||||
query(password)
|
||||
print()
|
||||
exit(0)
|
Loading…
x
Reference in New Issue
Block a user