badkeys
A tool to detect compromised cryptographic public keys
Product Information
- Description
- Badkeys identifies cryptographic public keys that have been compromised through weak generation, predictable patterns, or known vulnerabilities, helping organizations maintain security integrity. The tool systematically analyzes keys against databases of known problematic values, mathematical weaknesses, and implementation flaws that could expose encrypted communications or digital signatures. Key features include automated scanning of key repositories, integration with existing security workflows, and regular updates to detection algorithms as new vulnerabilities emerge. Primary use cases include security audits of certificate authorities, verification of SSH and PGP key integrity, and continuous monitoring of cryptographic infrastructure to prevent exploitation of weak keys in production environments.
- Maintainer
- badkeys company
- License
- MIT
- Last Activity
- 2026-02-07
- Categories
- Monitoring & Analysis
Linked NGI Projects
This product was created or improved through NGI-funded projects
Often Used Together
Products commonly used alongside badkeys
Community Discussion 3 comments
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Praesent commodo cursus magna, vel scelerisque nisl consectetur et.
Nullam quis risus eget urna mollis ornare vel eu leo. Cras mattis consectetur purus sit amet fermentum.
Maecenas sed diam eget risus varius blandit sit amet non magna. Integer posuere erat a ante venenatis dapibus posuere velit aliquet.