lemmeknow
can be used for identifying mysterious text or to analyze hard-coded strings from captured network packets, malwares, or just about anything.
lemmeknow [OPTIONS] <TEXT/FILENAME>
JSON Output
If you want output in JSON format, then pass -j / --json
flag.
e.g.
lemmeknow UC11L3JDgDQMyH8iolKkVZ4w --json
Run
lemmeknow --help
for all options!
You can directly download executable and run it. No need for any installation.
Check releases here.
cargo install lemmeknow
Using Nix โ๏ธ
nix-env -iA nixpkgs.lemmeknow
Clone repository
git clone https://github.com/swanandx/lemmeknow && cd lemmeknow
then build and run
cargo run -- <TEXT/FILENAME> [OPTIONS]
OR
cargo build --release
cd target/release/
./lemmeknow <TEXT/FILENAME> [OPTIONS]
Want to use this as a crate in your project? or make a web api for it? No worries! Just add a entry in your Cargo.toml
[dependencies]
lemmeknow = { version = "0.7", default-features = false }
OR
[dependencies]
lemmeknow = { git = "https://github.com/swanandx/lemmeknow", default-features = false }
Refer to documentation for more info.
lemmeknow supports webassembly, that is, it can be compiled for wasm32-unknown-unknown
target!
e.g. lemmeknow-frontend
lemmeknow is around 33x faster than pywhat for a file of 8.7MB, and it is 3x faster for a single string!
Thanks to SkeletalDemise for the benchmarks and the whisker plots โจ
You can contribute by adding new regex, improving current regex, improving code performance or fixing minor bugs! Just open a issue or submit a PR.
This project is inspired by PyWhat! Thanks to developer of it for the awesome idea <3 .