⚠️ It seems the GUI mode is not working in Terminal on macOS. ℹ️ If Rosetta2 emulation is installed, these steps work also for M1 and M2 Apple Silicon processors and the program can be executed directly. ℹ️ Replace X.Y.Z in above commands with the version number of your downloaded file, e.g. Set executable bit for the downloaded file: chmod +x extract_otp_secrets_X.Y.Z_macos_x86_64.Remove quarantine bit for the downloaded file: xattr -r -d extract_otp_secrets_X.Y.Z_macos_x86_64.Change to Downloads folder in Terminal: cd $HOME/Downloads.Download executable for macOS platform from latest release, see assets.However, the bare executable can be executed from the command line: I am not willing to pay USD 99 per year to Apple for this little open source tool. Apple is not Open Source friendly and requires a yearly Developer ID subscription. ❌ Unfortunately, I cannot provide a signed and notarized installable application for macOS as. However, you aren’t required to notarize software that you distribute through the Mac App Store because the App Store submission process already includes equivalent security checks. MacOSīeginning in macOS 10.15, all software built after June 1, 2019, and distributed with Developer ID must be notarized. Thus, the operating system may show a warning about download from unknown source. If you have any doubt, please use directly the Python script. This is a known problem for executables generated by PyInstaller. ⚠️ Some antivirus tools may show a virus or trojan alert for the executable. ℹ️ If you are a developer, you might prefer to run the Python script directly, see Installation ℹ️ There is a delay after starting the executable since the files have internally to be unpacked. ✔️ No installation needed, neither Python nor any dependencies have to be installed. ✔️ Everything is just packed in one executable. Start executable by clicking or from command line (macOS: startable only from command line, see below).Linux and macOS: Set executable bit for the downloaded file, e.g in terminal with chmod +x extract_otp_secrets_X.Y.Z_OS_ARCH.Download executable for your platform from latest release, see assets.Visual Studio Code Remote - Containers / VSCode devcontainerĭownload and run binary executable (□ since v2.1).How to export otp secrets from Google Authenticator app.Reading from stdin and printing to stdout.Printing otp secrets csv to stdout without header line.Printing otp secrets from stdin (image).Installation of optional shared system libraries (recommended). Installation of Python script (recommended for developers or advanced users).With external QR decoder app from text files.With builtin QR decoder from image files (□ since version 2.0).Capture QR codes from camera (□ since version 2.0).Download and run binary executable (□ since v2.1).⚡ This project/script was renamed from extract_otp_secret_keys to extract_otp_secrets. The secrets can be exported to JSON or CSV, or printed as QR codes to console or saved as PNG. Read text files containing the QR code data generated by third-party QR readers.Read image files containing the QR codes, and □.Capture the QR codes with the system camera using a GUI, □.The exported QR codes from authentication apps can be read in three ways: The Python script extract_otp_secrets.py extracts one time password (OTP) secrets from QR codes exported by two-factor authentication (2FA) apps such as "Google Authenticator". Extract TOTP/HOTP secrets from QR codes exported by two-factor authentication apps
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |