lemmeknow
lemmeknow
can be used for identifying mysterious text or to analyze hard-coded strings from captured network packets, malwares, or just about anything.
π§° Usage
lemmeknow [OPTIONS] <TEXT/FILENAME>
JSON Output
If you want output in JSON format, then pass -j / --json
flag.
e.g.
lemmeknow UC11L3JDgDQMyH8iolKkVZ4w --json
Run
lemmeknow --help
for all options!
π Installation
Download executable π
You can directly download executable and run it. No need for any installation.
Check releases here.
cargo
π¦
Using cargo install lemmeknow
Nix βοΈ
Usingnix-env -iA nixpkgs.lemmeknow
Build it from source π―
Clone repository
git clone https://github.com/swanandx/lemmeknow && cd lemmeknow
then build and run
cargo run -- <TEXT/FILENAME> [OPTIONS]
OR
cargo build --release
cd target/release/
./lemmeknow <TEXT/FILENAME> [OPTIONS]
π API
Want to use this as a crate in your project? or make a web api for it? No worries! Just add a entry in your Cargo.toml
[dependencies]
lemmeknow = { version = "0.7", default-features = false }
OR
[dependencies]
lemmeknow = { git = "https://github.com/swanandx/lemmeknow", default-features = false }
Refer to documentation for more info.
lemmeknow supports webassembly, that is, it can be compiled for wasm32-unknown-unknown
target!
e.g. lemmeknow-frontend
βοΈ Benchmarks
lemmeknow is around 33x faster than pywhat for a file of 8.7MB, and it is 3x faster for a single string!
Thanks to SkeletalDemise for the benchmarks and the whisker plots β¨
π§ Contributing
You can contribute by adding new regex, improving current regex, improving code performance or fixing minor bugs! Just open a issue or submit a PR.
π Acknowledgement
This project is inspired by PyWhat! Thanks to developer of it for the awesome idea <3 .