lemmeknow
can be used for identifying mysterious text or to analyze hard-coded strings from captured network packets, malwares, or just about anything.
lemmeknow [OPTIONS] <TEXT/FILENAME>
JSON Output
If you want output in JSON format, then pass -j / --json
flag.
e.g.
lemmeknow UC11L3JDgDQMyH8iolKkVZ4w --json
Run
lemmeknow --help
for all options!
You can directly download executable and run it. No need for any installation.
Check releases here.
cargo install lemmeknow
Using Nix ❄️
nix-env -iA nixpkgs.lemmeknow
Clone repository
git clone https://github.com/swanandx/lemmeknow && cd lemmeknow
then build and run
cargo run -- <TEXT/FILENAME> [OPTIONS]
OR
cargo build --release
cd target/release/
./lemmeknow <TEXT/FILENAME> [OPTIONS]
Want to use this as a crate in your project? or make a web api for it? No worries! Just add a entry in your Cargo.toml
[dependencies]
lemmeknow = { version = "0.7", default-features = false }
OR
[dependencies]
lemmeknow = { git = "https://github.com/swanandx/lemmeknow", default-features = false }
Refer to documentation for more info.
lemmeknow supports webassembly, that is, it can be compiled for wasm32-unknown-unknown
target!
e.g. lemmeknow-frontend
lemmeknow is around 33x faster than pywhat for a file of 8.7MB, and it is 3x faster for a single string!
A file of 8.7MB | A single string |
---|---|
Summary: lemmeknow.exe floss.exe ran 33.13 ± 9.74 times faster than pywhat floss.exe |
Summary: lemmeknow.exe 3FZ..Zc5 ran 3.29 ± 0.77 times faster than pywhat 3FZ..Zc5 |
Thanks to SkeletalDemise for the benchmarks and the whisker plots ✨
You can contribute by adding new regex, improving current regex, improving code performance or fixing minor bugs! Just open a issue or submit a PR.
This project is inspired by PyWhat! Thanks to developer of it for the awesome idea <3 .