Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/jef/gh-audit-org-keys
π Provides list of public SSH keys of an organization
https://github.com/jef/gh-audit-org-keys
github-api john-the-ripper openssl security ssh
Last synced: 2 months ago
JSON representation
π Provides list of public SSH keys of an organization
- Host: GitHub
- URL: https://github.com/jef/gh-audit-org-keys
- Owner: jef
- License: mit
- Created: 2020-06-26T22:00:53.000Z (over 4 years ago)
- Default Branch: main
- Last Pushed: 2023-04-04T15:56:39.000Z (almost 2 years ago)
- Last Synced: 2024-07-30T18:46:55.293Z (6 months ago)
- Topics: github-api, john-the-ripper, openssl, security, ssh
- Language: Go
- Homepage: https://jef.buzz/audit-org-keys
- Size: 119 KB
- Stars: 5
- Watchers: 1
- Forks: 0
- Open Issues: 5
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- Funding: .github/FUNDING.yml
- License: LICENSE.md
- Codeowners: .github/CODEOWNERS
Awesome Lists containing this project
README
# gh-audit-org-keys [![Release](https://github.com/jef/gh-audit-org-keys/actions/workflows/release.yaml/badge.svg)](https://github.com/jef/gh-vanity/actions/workflows/release.yaml)
The point of this project is to help demonstrate that users of GitHub could potentially fall victim to getting their private SSH key cracked. This based on the size and complexity of the key the user generates.
Programs like `ssh2john` from **John the Ripper** can best demonstrate how fast an SSH private key can be solved from a _not so_ complex algorithm with low key lengths (think RSA < 1024 bits).
## Installation
1. Install the `gh` cli - see the [installation](https://github.com/cli/cli#installation)
_Installation requires a minimum version (2.0.0) of the GitHub CLI that supports extensions._
2. Install this extension:
```shell
gh extension install jef/gh-audit-org-keys
```Manual Installation
Requirements: `cli/cli` and `go`.
1. Clone the repository
```shell
# git
git clone [email protected]:jef/gh-audit-org-keys.git# GitHub CLI
gh repo clone jef/gh-audit-org-keys
```2. `cd` into it
```shell
cd gh-audit-org-keys
```3. Build it
```shell
make build
```4. Install it locally
```shell
gh extension install .
```## Usage
To run:
```shell
gh audit-org-keys
```To upgrade:
```sh
gh extension upgrade audit-org-keys
```### Examples
- `gh audit-org-keys --organization="actions"`
- `gh audit-org-keys --organization="actions" --show-users="all"`### Acknowledgments
- [Auditing GitHub usersβ SSH key quality](https://blog.benjojo.co.uk/post/auditing-github-users-keys)
- [Openwall - John the Ripper](https://www.openwall.com/john/)
- [magnumripper/JohnTheRipper](https://github.com/magnumripper/JohnTheRipper)