![]() |
![]()
| ![]() |
![]()
NAME
SYNOPSIS
DESCRIPTIONThe SHA1 hashes of these passwords have been published at https://haveibeenpwned.com/ If any of the checked passwords is found in the database, it is
printed on standard output and the exit status of
The database can be downloaded to a local directory or it can be queried by a method that does not make the hash queried known to the remote server. The remote query is performed if the pawned password database has not been fetched and stored on the local system. While the remote accesses are not as fast as a local lookup, they will query an always up-to-date database and allow to avoid the download and storage of this huge database. Instead of plain passwords, SHA1 hashes of passwords may be supplied. Matches will be reported, but there is no provision to report the plain text password corresponding to a given SHA1 hash. If the option FILES
EXIT STATUS
If the EXAMPLESDownload the pwned password hash files: pwned-check -u Check passwords passed on standard input against pwned password database: echo badpasswd | pwned-check
|