alecto


Namealecto JSON
Version 2.1.6 PyPI version JSON
download
home_pagehttps://github.com/saphiraaa/NetherMath
SummaryAlecto is an advanced command-line tool for password hashing. With support for various hashing algorithms, including MD5, SHA-256, SHA-512, Argon2, and bcrypt, it offers flexibility and security. Users can choose algorithms, include custom salts, and specify hash lengths, making it a versatile solution for password hashing needs.
upload_time2023-11-23 14:20:51
maintainer
docs_urlNone
authorSaphiraaa
requires_python
license
keywords
VCS
bugtrack_url
requirements colorama numpy cryptography statistics scipy
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # Alecto: Advanced Password Hashing Tool

Alecto is an advanced command-line utility designed for sophisticated password hashing, offering a comprehensive set of features and algorithms to bolster security. Below, you'll find an in-depth guide on Alecto's features, advanced usage, supported algorithms, and practical examples.

## Features

### 1. **Extensive Algorithm Support**

Alecto boasts support for a diverse array of hashing algorithms, providing users with the flexibility to tailor their security measures to specific requirements. Here is a list of available algorithms:

- apr_md5_crypt
- argon2
- bcrypt
- bcrypt_sha256
- bigcrypt
- blake2b
- blake2s
- bsd_nthash
- bsdi_crypt
- cisco_type7
- crypt16
- cta_pbkdf2_sha1
- des_crypt
- django_pbkdf2_sha1
- django_pbkdf2_sha256
- django_salted_sha1
- dlitz_pbkdf2_sha1
- fshp
- grub_pbkdf2_sha512
- lmhash
- md4
- md5
- md5-sha1
- md5_crypt
- mssql2000
- mssql2005
- mysql323
- mysql41
- nthash
- oracle11
- pbkdf2_hmac_sha1
- pbkdf2_hmac_sha256
- pbkdf2_hmac_sha512
- pbkdf2_sha256
- phpass
- ripemd160
- scram
- scrypt
- sha128
- sha1_crypt
- sha224
- sha256
- sha256_crypt
- sha384
- sha3_224
- sha3_256
- sha3_384
- sha3_512
- sha512
- sha512_crypt
- shake_128
- shake_256
- sm3
- spookyhash
- sun_md5_crypt
- whirlpool
- xxhash
- bcrypt_sha256
- django_salted_sha1
- ldap_md5
- ldap_pbkdf2_sha1
- ldap_pbkdf2_sha256
- ldap_pbkdf2_sha512
- siphash

### 2. **Algorithm Specification**

Directly specify the hashing algorithm:

```bash
python alecto.py -a <algorithm> <password>
```

### 3. **Custom Salt Integration**

Elevate password security by introducing custom salts into the hashing process. Alecto seamlessly accommodates custom salts, providing users with granular control over the salting mechanism, a crucial aspect of robust password storage.

### 4. **Terminal Clarity Enhancement**

Alecto includes a terminal-clearing functionality, optimizing user experience by ensuring a clean and organized interface.

### 5. **Fine-tuned Hash Length Specification**

Specific to shake_128 and shake_256 algorithms, Alecto enables users to precisely specify the hash length using the `--hash-length` option. This advanced feature allows for tailoring hash outputs to exact requirements.

## Advanced Usage

### 1. **Parallel Salting**

For enhanced security, leverage both custom and default salts simultaneously:

```bash
python alecto.py <password> -a <algorithm> --salt --both-salt
```

### 2. **Custom Salt Usage**

Utilize a custom salt in the hashing process:

```bash
python alecto.py <password> -a <algorithm> --salt --custom-salt
```

### 3. **Custom Byte Length For SHAKE128 AND SHAKE256**

'''bash
python alecto.py <password> -a <shake128 or shake256> --hash-length <length>
'''
## Examples

### 1. **Custom Algorithm and Salt**

```bash
python alecto.py -a sha3_256 --custom-salt mypassword
```

### 2. **Parallel Salting with Shake_256**

```bash
python alecto.py -- salt --both-salt -a shake_256 --hash-length 64 mypassword
```
## Considerations

- When using a custom salt, it is seamlessly integrated into the hashing process.
- For algorithms like argon2 and bcrypt, employing a custom salt enhances overall security.
- Default salts are automatically generated when using the `--salt` or `--both-salt` options.

**NOTE:** Some hashes is not available on the system so if you face an error like unsupported algorithm it's probably because your system don't have that algorithm.

**Disclaimer:** Alecto is intended for educational and security research purposes. Users are advised to employ the tool responsibly and adhere to ethical guidelines.

            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/saphiraaa/NetherMath",
    "name": "alecto",
    "maintainer": "",
    "docs_url": null,
    "requires_python": "",
    "maintainer_email": "",
    "keywords": "",
    "author": "Saphiraaa",
    "author_email": "fredmarkivand@gmail.com",
    "download_url": "https://files.pythonhosted.org/packages/51/72/44394e3b81f4c330f120fa2b74cc37d80c64f8af1086c41b7f682025c521/alecto-2.1.6.tar.gz",
    "platform": null,
    "description": "# Alecto: Advanced Password Hashing Tool\n\nAlecto is an advanced command-line utility designed for sophisticated password hashing, offering a comprehensive set of features and algorithms to bolster security. Below, you'll find an in-depth guide on Alecto's features, advanced usage, supported algorithms, and practical examples.\n\n## Features\n\n### 1. **Extensive Algorithm Support**\n\nAlecto boasts support for a diverse array of hashing algorithms, providing users with the flexibility to tailor their security measures to specific requirements. Here is a list of available algorithms:\n\n- apr_md5_crypt\n- argon2\n- bcrypt\n- bcrypt_sha256\n- bigcrypt\n- blake2b\n- blake2s\n- bsd_nthash\n- bsdi_crypt\n- cisco_type7\n- crypt16\n- cta_pbkdf2_sha1\n- des_crypt\n- django_pbkdf2_sha1\n- django_pbkdf2_sha256\n- django_salted_sha1\n- dlitz_pbkdf2_sha1\n- fshp\n- grub_pbkdf2_sha512\n- lmhash\n- md4\n- md5\n- md5-sha1\n- md5_crypt\n- mssql2000\n- mssql2005\n- mysql323\n- mysql41\n- nthash\n- oracle11\n- pbkdf2_hmac_sha1\n- pbkdf2_hmac_sha256\n- pbkdf2_hmac_sha512\n- pbkdf2_sha256\n- phpass\n- ripemd160\n- scram\n- scrypt\n- sha128\n- sha1_crypt\n- sha224\n- sha256\n- sha256_crypt\n- sha384\n- sha3_224\n- sha3_256\n- sha3_384\n- sha3_512\n- sha512\n- sha512_crypt\n- shake_128\n- shake_256\n- sm3\n- spookyhash\n- sun_md5_crypt\n- whirlpool\n- xxhash\n- bcrypt_sha256\n- django_salted_sha1\n- ldap_md5\n- ldap_pbkdf2_sha1\n- ldap_pbkdf2_sha256\n- ldap_pbkdf2_sha512\n- siphash\n\n### 2. **Algorithm Specification**\n\nDirectly specify the hashing algorithm:\n\n```bash\npython alecto.py -a <algorithm> <password>\n```\n\n### 3. **Custom Salt Integration**\n\nElevate password security by introducing custom salts into the hashing process. Alecto seamlessly accommodates custom salts, providing users with granular control over the salting mechanism, a crucial aspect of robust password storage.\n\n### 4. **Terminal Clarity Enhancement**\n\nAlecto includes a terminal-clearing functionality, optimizing user experience by ensuring a clean and organized interface.\n\n### 5. **Fine-tuned Hash Length Specification**\n\nSpecific to shake_128 and shake_256 algorithms, Alecto enables users to precisely specify the hash length using the `--hash-length` option. This advanced feature allows for tailoring hash outputs to exact requirements.\n\n## Advanced Usage\n\n### 1. **Parallel Salting**\n\nFor enhanced security, leverage both custom and default salts simultaneously:\n\n```bash\npython alecto.py <password> -a <algorithm> --salt --both-salt\n```\n\n### 2. **Custom Salt Usage**\n\nUtilize a custom salt in the hashing process:\n\n```bash\npython alecto.py <password> -a <algorithm> --salt --custom-salt\n```\n\n### 3. **Custom Byte Length For SHAKE128 AND SHAKE256**\n\n'''bash\npython alecto.py <password> -a <shake128 or shake256> --hash-length <length>\n'''\n## Examples\n\n### 1. **Custom Algorithm and Salt**\n\n```bash\npython alecto.py -a sha3_256 --custom-salt mypassword\n```\n\n### 2. **Parallel Salting with Shake_256**\n\n```bash\npython alecto.py -- salt --both-salt -a shake_256 --hash-length 64 mypassword\n```\n## Considerations\n\n- When using a custom salt, it is seamlessly integrated into the hashing process.\n- For algorithms like argon2 and bcrypt, employing a custom salt enhances overall security.\n- Default salts are automatically generated when using the `--salt` or `--both-salt` options.\n\n**NOTE:** Some hashes is not available on the system so if you face an error like unsupported algorithm it's probably because your system don't have that algorithm.\n\n**Disclaimer:** Alecto is intended for educational and security research purposes. Users are advised to employ the tool responsibly and adhere to ethical guidelines.\n",
    "bugtrack_url": null,
    "license": "",
    "summary": "Alecto is an advanced command-line tool for password hashing. With support for various hashing algorithms, including MD5, SHA-256, SHA-512, Argon2, and bcrypt, it offers flexibility and security. Users can choose algorithms, include custom salts, and specify hash lengths, making it a versatile solution for password hashing needs.",
    "version": "2.1.6",
    "project_urls": {
        "Homepage": "https://github.com/saphiraaa/NetherMath"
    },
    "split_keywords": [],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "517244394e3b81f4c330f120fa2b74cc37d80c64f8af1086c41b7f682025c521",
                "md5": "dce12d0c63fff1f68486b668e976e44c",
                "sha256": "793a050d9ae80548c93033e1b08b166cfd612085c63b0ef632bcec906579982b"
            },
            "downloads": -1,
            "filename": "alecto-2.1.6.tar.gz",
            "has_sig": false,
            "md5_digest": "dce12d0c63fff1f68486b668e976e44c",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": null,
            "size": 6065,
            "upload_time": "2023-11-23T14:20:51",
            "upload_time_iso_8601": "2023-11-23T14:20:51.238511Z",
            "url": "https://files.pythonhosted.org/packages/51/72/44394e3b81f4c330f120fa2b74cc37d80c64f8af1086c41b7f682025c521/alecto-2.1.6.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2023-11-23 14:20:51",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "saphiraaa",
    "github_project": "NetherMath",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": false,
    "requirements": [
        {
            "name": "colorama",
            "specs": [
                [
                    "==",
                    "0.4.4"
                ]
            ]
        },
        {
            "name": "numpy",
            "specs": [
                [
                    "==",
                    "1.21.0"
                ]
            ]
        },
        {
            "name": "cryptography",
            "specs": [
                [
                    "==",
                    "41.0.1"
                ]
            ]
        },
        {
            "name": "statistics",
            "specs": [
                [
                    "==",
                    "1.0.3.5"
                ]
            ]
        },
        {
            "name": "scipy",
            "specs": [
                [
                    "==",
                    "1.11.1"
                ]
            ]
        }
    ],
    "lcname": "alecto"
}
        
Elapsed time: 0.20075s