All Projects → malnick → cryptorious

malnick / cryptorious

Licence: other
CLI Password Manager

Programming Languages

go
31211 projects - #10 most used programming language
shell
77523 projects
Makefile
30231 projects

Projects that are alternatives of or similar to cryptorious

cryptopocket
🔐 Encrypt anything, then Decrypt by providing a required key.
Stars: ✭ 22 (+46.67%)
Mutual labels:  aes, password-generator, decryption
Obsidian-Markdown-Parser
This repository will give you tools to parse and fetch useful informations of your notes in your Obsidian vault.
Stars: ✭ 32 (+113.33%)
Mutual labels:  yaml, vault
Laravel Database Encryption
A package for automatically encrypting and decrypting Eloquent attributes in Laravel 5.5+, based on configuration settings.
Stars: ✭ 238 (+1486.67%)
Mutual labels:  aes, decryption
kmstool
Tool for using AWS Kms data keys to encrypt and decrypt large files.
Stars: ✭ 33 (+120%)
Mutual labels:  kms, decryption
Padding Oracle Attacker
🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.
Stars: ✭ 136 (+806.67%)
Mutual labels:  aes, decryption
Aescipher Ios
AES encryption working between Objective-C and Java.
Stars: ✭ 198 (+1220%)
Mutual labels:  aes, decryption
WebCrypto.swift
A small collection of cryptographic functions based on the JavaScript WebCrypto API.
Stars: ✭ 16 (+6.67%)
Mutual labels:  aes, decryption
Hybrid Crypto Js
RSA+AES hybrid encryption implementation for JavaScript. Works with Node.js, React Native and modern browsers.
Stars: ✭ 87 (+480%)
Mutual labels:  aes, decryption
oseid
Microchip AVR based smartcard/token with ECC and RSA cryptography
Stars: ✭ 17 (+13.33%)
Mutual labels:  aes, pkcs15
CppSecurity
C++ Security Library
Stars: ✭ 24 (+60%)
Mutual labels:  aes, password-generator
Cross Platform Aes
Simple cross-platform encryption and decryption using AES
Stars: ✭ 127 (+746.67%)
Mutual labels:  aes, decryption
vaultssh
A Go based Vault client to support ssh sessions, remote commands and scp transfers all in memory
Stars: ✭ 25 (+66.67%)
Mutual labels:  kms, vault
Py7zr
7zip in python3 with ZStandard, PPMd, LZMA2, LZMA1, Delta, BCJ, BZip2, and Deflate compressions, and AES encryption.
Stars: ✭ 110 (+633.33%)
Mutual labels:  aes, decryption
Jsrsasign
The 'jsrsasign' (RSA-Sign JavaScript Library) is an opensource free cryptography library supporting RSA/RSAPSS/ECDSA/DSA signing/validation, ASN.1, PKCS#1/5/8 private/public key, X.509 certificate, CRL, OCSP, CMS SignedData, TimeStamp, CAdES JSON Web Signature/Token in pure JavaScript.
Stars: ✭ 2,760 (+18300%)
Mutual labels:  aes, decryption
Encryptor4j
Strong encryption for Java simplified
Stars: ✭ 92 (+513.33%)
Mutual labels:  aes, decryption
Dynaconf
Configuration Management for Python ⚙
Stars: ✭ 2,082 (+13780%)
Mutual labels:  yaml, vault
Xjar
Spring Boot JAR 安全加密运行工具,支持的原生JAR。
Stars: ✭ 692 (+4513.33%)
Mutual labels:  aes, decryption
Hat.sh
encrypt and decrypt files in your browser. Fast, Secure client-side File Encryption and Decryption using the web crypto api
Stars: ✭ 886 (+5806.67%)
Mutual labels:  aes, decryption
CryptoKnight
CryptoKnight is a general purpose cryptography desktop app
Stars: ✭ 18 (+20%)
Mutual labels:  aes, password-generator
ghost
A simple, server/less, single-api, multi-backend, ghostly secret-store/key-store for your passwords, ssh-keys and cloud credentials. Ghost isn't real, it's just in your head.
Stars: ✭ 36 (+140%)
Mutual labels:  vault, ssh-key

Manpage

Main Menu

 _________                            __                   .__
 \_   ___ \ _______  ___.__.______  _/  |_   ____  _______ |__|  ____   __ __   ______
 /    \  \/ \_  __ \<   |  |\____ \ \   __\ /  _ \ \_  __ \|  | /  _ \ |  |  \ /  ___/
 \     \____ |  | \/ \___  ||  |_> > |  |  (  <_> ) |  | \/|  |(  <_> )|  |  / \___ \
  \______  / |__|    / ____||   __/  |__|   \____/  |__|   |__| \____/ |____/ /____  >
         \/          \/     |__|                                                   \/
 - CLI-based encryption for passwords and random data

USAGE:
   cryptorious [global options] command [command options] [arguments...]

AUTHOR(S):
   Jeff Malnick <[email protected]>

COMMANDS:
    rename      Rename an entry in the vault
    delete      Remove an entry from the cryptorious vault
    decrypt     Decrypt a value in the vault `VALUE`
    encrypt     Encrypt a value for the vault `VALUE`

GLOBAL OPTIONS:
   --vault-path, --vp "/Users/malnick/.cryptorious/vault.yaml"  Path to vault.yaml.
   --debug                                                      Debug/Verbose log output.
   --help, -h                                                   show help
   --version, -v                                                print the version

Encrypt Sub Menu

NAME:
   encrypt - Encrypt a value for the vault `VALUE`

USAGE:
   encrypt [command options] [arguments...]

OPTIONS:
   --key-arn    KMS key ARN

Decrypt Sub Menu

NAME:
   cryptorious decrypt - Decrypt a value in the vault `VALUE`

USAGE:
   cryptorious decrypt [command options] [arguments...]

OPTIONS:
   --copy, -c           Copy decrypted password to clipboard automatically
   --goto, -g           Open your default browser to https://<key_name> and login automatically
   --timeout, -t "10"   Timeout in seconds for the decrypt session window to expire

Rename Sub Menu

NAME:
   cryptorious rename - Rename an entry in the vault

USAGE:
   cryptorious rename [command options] [arguments...]

OPTIONS:
   --old, -o    Name of old entry name [key] in vault
   --new, -n    Name of new entry name [key] in vault

Generate Sub Menu

NAME:
 generate - 	Generate a RSA keys or a secure password 

USAGE:
  generate command [command options] [arguments...]

COMMANDS:
   password	[--[l]ength] Generate a random password

OPTIONS:
   --help, -h	show help

Step 0: Build && Alias

Build it and install: make install

Add to your .[bash | zsh | whatever]rc: alias cpt=cryptorious

Step 1: Add KMS keys to AWS

NOTE: will add cmd for this soon

In your own AWS account, add a KMS key and grant your IAM user access.

Step 2: Encrypt

NOTE: will add flag for AWS profile soon

Use your AWS profile and encrypt some data:

AWS_PROFILE=personal cryptorious encrypt --key-arn=<my_kms_key_arn> github.com

Will open a ncurses window and prompt you for username, password and a secure note. All input is optional.

Step 3: Decrypt

AWS_PROFILE=personal cryptorious decrypt thing

Will open a ncurses window with the decrypted vault entry.

Forgo the the ncurses window and copy the decrypted password stright to the system clipboard?

cryptorious decrypt -[c]opy thing

No printing, just a message that your decrypted password is now available in the paste buffer for your user.

If you've saved your vault entries with the URI of the site they belong to (i.e., ran cryptorious encrypt github.com...) then you can use the -[g]oto flag to open your default browser to this URI. Pair it with -[c]opy and the shorthand for [d]ecrypt and you'll have a fast way of navigating directly to your desired, secure website (let's also assume you've aliased cpt=cryptorious):

cpt d -g -c github.com

Step 5: Generate Secure Password

The generate command also lets you generate random, secure passwords of n length:

cryptorious generate password --length 20
(yZkj,GX`w7T4x&TaYyw

This defaults to a length of 15 if you don't pass --[l]ength.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].