A command line tool to extract secrets from Google Authenticator's QR code. 从 Google Authenticator 中导出二次验证密钥的命令行工具
MIT License
This project aims at providing a single executable program to extract the OTP accounts from the QR code image exported from Google Authenticator, inspired by extract_otp_secret_keys written in Python.
Download the execuable binary from Releases, and run the executable binary with -i
option.
For example, download the executable binary google_authenticator_extractor-x86_64-apple-darwin
for Mac OSX, and run the following command in terminal:
chmod a+x google_authenticator_extractor-x86_64-apple-darwin
./google_authenticator_extractor-x86_64-apple-darwin -i /path/to/qrcode-image
Note: OSX may prevent it from running with the message
“google_authenticator_extractor-x86_64-apple-darwin” cannot be opened because the developer cannot be verified.
. You need to go toSystem Preferences
-Security & Privacy
-General
to allow it.
The output looks like as below:
[{"name":"******","secret":"**********","issuer":"******"},{"name":"*****","secret":"************","issuer":""}]
Rust is the programming language of the project, Install Rust by following the instructions in the official doument.
Install protobuf with Homebrew:
brew install protobuf
Build the project
./build.sh
Install protobuf with apt-get
:
sudo apt-get update
sudo apt-get install -y protobuf-compiler
Build the project:
./build.sh
The Github actions defined steps cross compilation, which are running on CI as well. Currently the following cross compilations are supported.
x86_64-pc-windows-gnu
on Mac OSX.x86_64-unknown-linux-gnu
on Mac OSX.x86_64-pc-windows-gnuu
on Ubuntu.Check the Github Workflow for more details.