
Security Fundamentals
Turtles, Clams, and Cyber Threat Actors: Shell Usage
The Socket Threat Research Team uncovers how threat actors weaponize shell techniques across npm, PyPI, and Go ecosystems to maintain persistence and exfiltrate data.
CLI(and Lib) for HOTP (RFC 4226) google authenticator token. With AES 256 encryption
Command line tool for HOTP google authenticator in node.js with AES256 encryption protecting your secret keys.
npm install -g htoken
then run
htoken
You will be asked to provide following information:
otpauth://hotp/LABEL?secret=<secret key>&counter=<init counter>
Passcode length is by defaul 6.
Then setup a password to protect your secret key. You can leave the password empty so the configuration file will not be encrypted.
Once you get setup successfully, run again
htoken
You will get your dynamic passcode. (If you have password setup, you need type your password first.)
You can find your configuration file at $HOME/.htoken.json
##Sync You need to sync with server for first time use. If the tool is out of sync for some reason, you have to sync with server again.
##Reset To reset everything, just simply remove $HOME/.htoken.json file (or $USERPROFILE\.htoken.json file for Windows).
npm install htoken
and in project files:
var htoken=require("htoken");
htoken.hotp(secretKey,counter,passCodeLength);
//code will be returned.
FAQs
CLI(and Lib) for HOTP (RFC 4226) google authenticator token. With AES 256 encryption
The npm package htoken receives a total of 6 weekly downloads. As such, htoken popularity was classified as not popular.
We found that htoken demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security Fundamentals
The Socket Threat Research Team uncovers how threat actors weaponize shell techniques across npm, PyPI, and Go ecosystems to maintain persistence and exfiltrate data.
Security News
At VulnCon 2025, NIST scrapped its NVD consortium plans, admitted it can't keep up with CVEs, and outlined automation efforts amid a mounting backlog.
Product
We redesigned our GitHub PR comments to deliver clear, actionable security insights without adding noise to your workflow.