Hayasaka generates secure keys from your command line.
$ npm i hayasaka -g
You must install Hayasaka globally to be able to use it from the command line.
-s, --strength
: The strength of the key(s). See Key Strengths.-n, --number
: The number of keys to generate. Defaults to, and must be at least, 1.-c, --copy
: Copy the key to the clipboard.-f, --file
: The file to write the key to.-r, --redact
: Redact the key from the console.-h, --help
: Show the help message.
Hayasaka supports 10 key strengths - four "standard" strengths and six "special" strengths.
Strength | Description | Length | Example | URL Safe? |
---|---|---|---|---|
decent |
Short keys suitable for securing your personal devices. | 10 | 1SVVvjDwsN |
Yes |
good |
More robust keys, suitable for securing things like web hosting accounts. | 15 | M%:?!J2+CjGifL* |
No |
great |
Very robust keys, suitable for administrative passwords or almost anything else. | 30 | 8$A>Blm?dzkzEPa0!8HET)rNe2'LS_ |
No |
epic |
Extremely robust keys, suitable for any 256-bit key requirement that cannot be satisfied by the previous strengths. | 32 | bPXapgKhC9PMXkxNwAvSjA54gBVnA7kn |
Yes |
Strength | Description | Length | Example | URL Safe? |
---|---|---|---|---|
wpa160 |
160-bit WPA encryption keys. | 20 | u}EE_B`Wvir>Xt&|6|D[ |
No |
wpa504 |
504-bit WPA encryption keys. | 63 | =sK(g,<L?q|$M^VMOuaBMe-D*<==13L59N5S0,DX4`zDBRz[4S>PP_p$p4`P(EG |
No |
wep64 |
64-bit WEP encryption keys. | 5 | C116B |
Yes |
wep152 |
152-bit WEP encryption keys. | 16 | B7F7783BBBE5F9DE |
Yes |
wep256 |
256-bit WEP encryption keys. | 29 | 1A9C47C8A924D69F17EFD991A532C |
Yes |
Generate a decent
key:
$ hayasaka -s decent
Generate a good
key and copy it to the clipboard:
$ hayasaka -s good -c
Generate a great
key, copy it to the clipboard, and redact it from the console:
$ hayasaka -s great -c -r
Generate five epic
keys and write them to keys.txt
:
$ hayasaka -s epic -n 5 -f keys.txt
Hayasaka uses a substantial amount of code from RandomKeygen.
Haysaka is licensed under the MIT License.