-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Password Pusher Authenticated API #11
Comments
Dear @thekamilpro, your PowerShell script does not work on my end. $ powershell -f Get-PasswordLink.ps1
The property 'value' cannot be found on this object. Verify that the property exists and can be set.
At C:\Pastebin\Get-PasswordLink.ps1:73 char:1
+ $Payload.value = $Password
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ CategoryInfo : InvalidOperation: (:) [], RuntimeException
+ FullyQualifiedErrorId : PropertyAssignmentException |
Hi @pglombardo ! So I know it's been some time, but I've just publishes version 1.1.0 which incorporated your API login. I can see you've added since URL and file pushing, so this should be coming back soon (TM) I can see your page with tools refers to the old version (which was just a script and a wrapper around Internet Explorer) - I have since released a full on module, which properly works directly with your API and is cross platform, link here: https://github.com/thekamilpro/kppwpush would be great if you could update the link :). Cheers1 |
That's excellent - tools page updated here. It'll go live soon. |
Hi @kprocyszyn! Password Pusher now has an authenticated API. It now allows tools to list previously pushed passwords, add notes to pushes and view audit logs.
The documentation for the API is here: https://pwpush.com/api
And a Twitter post that explains it a bit: https://twitter.com/pwpush/status/1563889107536941057
If you have the desire & time to update your tool it would be appreciated. If you have any issues, feel free to email me with my github username @ pwpush.com.
Best!
Peter
The text was updated successfully, but these errors were encountered: