Thanks to visit codestin.com
Credit goes to github.com

Skip to content

cyfinoid/keychecker

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

44 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ”‘ KeyChecker

A fast CLI tool to fingerprint SSH private keys and identify which Git hosting accounts they unlock (GitHub, GitLab, Bitbucket, Codeberg, Gitea, Hugging Face).

πŸ”¬ Part of Cyfinoid Research's Software Supply Chain Security Research
This tool is created by Cyfinoid Research as part of our offensive tooling research focused on identification of next steps once an SSH private key is discovered. Learn more about our software supply chain security research and training programs.


✨ Features

πŸ” Key Intelligence

  • Multi-format support: OpenSSH, PEM, and DER private key formats
  • Key type detection: ed25519, rsa, ecdsa, dsa with security analysis
  • Security validation: Flags deprecated/insecure algorithms and weak key sizes
  • Passphrase detection: Identifies if private keys are encrypted
  • Metadata extraction: Public key, fingerprints (SHA256/MD5), and comments
  • Insight parsing: Extracts local username, hostname, and IP addresses from comments

🌐 Account Discovery

  • Multi-provider support: GitHub, GitLab, Bitbucket, Codeberg, Gitea, Hugging Face
  • Safe SSH handshakes: Read-only validation without triggering repo operations
  • Username extraction: Parses SSH identity banners to recover mapped usernames
  • Organization discovery: Identifies user membership in organizations (GitHub API)

πŸ“ Repository Discovery

  • Private repo detection: Uses git ls-remote probes with wordlists
  • Concurrent scanning: Configurable parallel connections for speed
  • Progress tracking: Real-time progress bars during discovery
  • API integration: GitHub token support for enhanced organization discovery

πŸ“Š Output Modes

  • Human-readable tables: Clean, formatted output by default
  • Exit codes: Automation-friendly return codes
  • Verbose logging: Debug and trace information
  • Public key export: Save derived public keys to files

πŸš€ Quick Start

Installation

# Using pipx (recommended for end users)
pipx install keychecker

# Using uv (recommended for developers)
uv add keychecker

# Using pip (legacy)
pip install --user keychecker

# From source (development)
git clone https://github.com/cyfinoid/keychecker
cd keychecker
./scripts/install.sh           # Install uv with pinned version & hashes
./scripts/setup-dev.sh         # Set up development environment

Basic Usage

# Analyze a private key and Validate against servers (default behavior)
keychecker ~/.ssh/id_ed25519

# Validate against specific servers only
keychecker ~/.ssh/id_ed25519 --validate github gitlab bitbucket codeberg gitea huggingface

# Validate against specific servers only
keychecker ~/.ssh/id_rsa --validate github gitlab huggingface

# Skip server validation (local analysis only)
keychecker ~/.ssh/id_ed25519 --no-validate

Repository Discovery

# Discover private repositories on GitHub
keychecker ~/.ssh/id_rsa --validate github --discovery repo_names.txt

# Discover private repositories on Hugging Face
keychecker ~/.ssh/id_rsa --validate huggingface --discovery repo_names.txt

# With GitHub API token for enhanced organization discovery
export GITHUB_TOKEN=ghp_your_token_here
keychecker ~/.ssh/id_rsa --validate github --discovery repo_names.txt

# Or pass token directly
keychecker ~/.ssh/id_rsa --validate github --discovery repo_names.txt --github-token ghp_your_token_here

πŸ“– Usage Reference

Command Line Options

keychecker INPUT [OPTIONS]

Positional Arguments:
  INPUT                 Path to private key file

Options:
  -i, --input PATH      Path to private key file (alternative to positional)
  
  --validate SERVERS    One or more servers to validate against
                        Choices: github, gitlab, bitbucket, codeberg, gitea, huggingface
  --no-validate         Skip server validation (local analysis only)
  
  --discovery FILE      Enable repository discovery with wordlist file
  
  --github-token TOKEN  GitHub API token for enhanced organization discovery
  --no-progress         Disable progress bars during repository discovery
  
  --public-out FILE     Save derived public key to file
  --no-banner           Suppress banner output
  
  --timeout SECONDS     Per-connection timeout (default: 5)
  --concurrency N       Parallel connections (default: 10)
  
  -v, --verbose         Enable debug/trace logs
  -V, --version         Show version number and exit
  -h, --help            Show help message

Examples

# Basic key analysis
keychecker ~/.ssh/id_ed25519

# Validate against GitHub only
keychecker ~/.ssh/id_rsa --validate github

# Validate against Hugging Face only
keychecker ~/.ssh/id_rsa --validate huggingface

# Discover repositories with custom wordlist
keychecker ~/.ssh/id_rsa --validate github --discovery my_repos.txt

# Discover repositories on Hugging Face
keychecker ~/.ssh/id_rsa --validate huggingface --discovery my_repos.txt

# Save public key to file
keychecker ~/.ssh/id_ed25519 --public-out my_key.pub

# Verbose output with custom timeout
keychecker ~/.ssh/id_rsa --validate github --timeout 10 --verbose

# Check version
keychecker --version

🌍 Supported Servers

Server Host Features Notes
GitHub [email protected] Username extraction, Organization discovery SaaS platform
GitLab [email protected] Username extraction SaaS and Selfhostable platform
Bitbucket [email protected] Key confirmation SaaS Platform
Codeberg [email protected] Username extraction SaaS based on forgejo
Gitea [email protected] Username extraction Saas based on Gitea
Hugging Face [email protected] Username extraction AI/ML model hosting platform

πŸ“‹ Example Output

Key Analysis

πŸ”‘ KeyChecker - SSH Key Analysis Tool
=====================================

Key: ~/.ssh/id_ed25519
Type: ed25519
Bits: 256
Passphrase: NO
Public: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAI... comment='user@hostname'
Comment: user@hostname
SHA256: SHA256:abc123...
MD5: MD5:12:34:56:78:9a:bc:de:f0

Insights: local_user=user, host=hostname

Server Validation

Validation:
- github: username=john_doe βœ…
- gitlab: username=jane_smith βœ…
- bitbucket: auth success, username=? (repo path required)
- huggingface: username=anantshri βœ…

Repository Discovery

Organization Discovery:
- Personal repositories: john_doe
- Organizations: acme-corp, open-source-proj

Repository Discovery:
Found 3 accessible repositories:
- john_doe/secret-project (private)
- acme-corp/internal-tools (private)
- acme-corp/api-service (private)

πŸ” Security Notes

  • Read-only operations: No repositorywrite operations performed
  • Local processing: Private keys are processed in-memory, never uploaded
  • Authorized use only: Only use against keys you own or are authorized to test
  • SSH handshake logging: Some providers may log SSH connections - use responsibly

πŸ›  Development

Setup Development Environment

git clone https://github.com/cyfinoid/keychecker
cd keychecker

# Install uv (if not already installed)
./scripts/install.sh

# Set up development environment
./scripts/setup-dev.sh

# Run tests
./scripts/test.sh

# Run demo
uv run python examples/demo.py

Project Structure

keychecker/
β”œβ”€β”€ keychecker/
β”‚   β”œβ”€β”€ core/           # Core analysis and validation logic
β”‚   β”œβ”€β”€ plugins/        # Git hosting provider implementations
β”‚   β”œβ”€β”€ utils/          # Output formatting and utilities
β”‚   β”œβ”€β”€ cli.py          # Command-line interface
β”‚   └── __main__.py     # Entry point
β”œβ”€β”€ examples/           # Usage examples and sample data
β”œβ”€β”€ tests/              # Test suite
└── docs/               # Documentation

Adding New Providers

KeyChecker uses a plugin architecture for Git hosting providers. To add a new provider:

  1. Create a new provider class in keychecker/plugins/
  2. Inherit from BaseGitProvider
  3. Implement required methods: validate_key(), identify_user(), discover_organizations()
  4. Register the provider in keychecker/plugins/__init__.py

Development Scripts

The project includes shell scripts to automate common tasks:

# Install uv (if needed)
./scripts/install.sh

# Set up development environment
./scripts/setup-dev.sh

# Run tests and quality checks
./scripts/test.sh

# Clean development environment
./scripts/clean.sh

# Build package for distribution
./scripts/build.sh

# Update version number
./scripts/version.sh 1.0.2

Release Workflow

# Test publication workflow (recommended)
# 1. Use GitHub Actions to publish to TestPyPI:
#    - Go to Actions tab β†’ "Publish to PyPI" β†’ "Run workflow"
#    - Enter a test version (e.g., 1.0.2-rc1)
#    - This will test installation with pip, pipx, and uv (with --pre flag for pre-releases)
# 2. Create a GitHub release to publish to PyPI:
#    - Version consistency is automatically verified
#    - Production publication with full testing (stable versions only)

Alternatives

# Manual publication (alternative)
export TESTPYPI_API_TOKEN=your_token
./scripts/publish-testpypi.sh

export PYPI_API_TOKEN=your_token
./scripts/publish-pypi.sh

See scripts/README.md for detailed script documentation.


πŸ“Š Exit Codes

Code Meaning
0 Success
1 Runtime/IO/argument error
2 All servers unreachable
3 Repository discovery attempted, no repositories found
4 Key parsed but flagged (deprecated/insecure)

πŸ—ΊοΈ Roadmap

  • Self-hosted environments: Support for custom GitLab, Bitbucket, and Gitea instances
  • Arbitrary hosts: Generic SSH server validation with custom host/port configuration
  • Host discovery: Automatic detection of Git server type and capabilities
  • Cloud Git platforms: Support for Azure DevOps, AWS CodeCommit, Google Cloud Source Repositories
  • Enterprise platforms: Integration with enterprise Git solutions
  • Public repository filtering: Skip public repositories during discovery (no point in bruteforcing)
  • Intelligent wordlists: Generate repository name candidates based on discovered organizations
  • Rate limit awareness: Adaptive discovery speed based on server rate limits

Quality of Life Improvement

  • OIDC Publication: Move publication and release to OIDC aware setup

πŸ€– AI-Assisted Development

This project was developed with the assistance of AI tools, most notably Cursor IDE, Claude Code, and Qwen3-Coder. These tools helped accelerate development and improve velocity. All AI-generated code has been carefully reviewed and validated through human inspection to ensure it aligns with the project’s intended functionality and quality standards.


🀝 Contributing

We welcome contributions! Please see our Contributing Guidelines for details.

Development Setup

# Clone and setup
git clone https://github.com/cyfinoid/keychecker
cd keychecker

# Install uv and setup development environment
./scripts/install.sh
./scripts/setup-dev.sh

# Run tests
./scripts/test.sh

Development Workflow

  1. Fork the repository
  2. Create a feature branch
  3. Make your changes
  4. Add tests for new functionality
  5. Run the test suite: ./scripts/test.sh
  6. Submit a pull request

For detailed development instructions, see scripts/README.md.


πŸ’¬ Community & Discussion

Join our Discord server for discussions, questions, and collaboration:

Join our Discord Server

Connect with other security researchers, share your findings, and get help with KeyChecker usage and development.


πŸ™ Acknowledgments & Contributions

Contributors

We'd like to thank the following contributors for their valuable input and support:

  • Kumar Ashwin - Initial ideation and help with PoC building

πŸ“„ License

This project is licensed under the GNU General Public License v3 (GPLv3) - see the LICENSE file for details.


⚠️ Disclaimer

This tool is designed for security auditing and penetration testing of systems you own or have explicit permission to test. Always ensure you have proper authorization before using this tool against any systems or keys you don't own.

The authors are not responsible for any misuse of this software.


πŸ”¬ Cyfinoid Research

Cutting-Edge Software Supply Chain Security Research

Pioneering advanced software supply chain security research and developing innovative offensive security tools for the community.

This tool is part of our free research toolkit - helping security researchers and penetration testers identify next steps after discovering SSH private keys.

🌐 Software Supply Chain Focus

Specializing in software supply chain attacks, CI/CD pipeline security, and offensive security research.

Our research tools help organizations understand their software supply chain vulnerabilities and develop effective defense strategies.

πŸŽ“ Learn & Explore

Explore our professional training programs, latest research insights, and free open source tools developed from our cutting-edge cybersecurity research.

Upcoming Trainings | Read Our Blog | Open Source by Cyfinoid

Hands-on training in software supply chain security, CI/CD pipeline attacks, and offensive security techniques

Β© 2025 Cyfinoid Research. KeyChecker - Free Software Supply Chain Security Research Tool

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Packages

No packages published