All Projects → dejonghe → kmstool

dejonghe / kmstool

Licence: Apache-2.0 license
Tool for using AWS Kms data keys to encrypt and decrypt large files.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to kmstool

kms-env
A tool to encrypt and decrypt environment variables using KMS
Stars: ✭ 16 (-51.52%)
Mutual labels:  kms, decryption
cryptorious
CLI Password Manager
Stars: ✭ 15 (-54.55%)
Mutual labels:  kms, decryption
vlmcsd
vlmcsd - portable open-source KMS Emulator in C. This repo is only a copy. For the origin please see:
Stars: ✭ 23 (-30.3%)
Mutual labels:  kms
AspNetCore.DataProtection.Aws
AWS S3 & KMS integration for ASP.NET Core data protection
Stars: ✭ 62 (+87.88%)
Mutual labels:  kms
vlmcsd
vlmcsd backup
Stars: ✭ 156 (+372.73%)
Mutual labels:  kms
westford
Westford Wayland Compositor
Stars: ✭ 39 (+18.18%)
Mutual labels:  kms
cfn-encrypt
🔑🔐☁️ Cloudformation custom resource that enables creation of KMS encrypted strings and SSM secure parameters
Stars: ✭ 13 (-60.61%)
Mutual labels:  kms
nifi
Deploy a secured, clustered, auto-scaling NiFi service in AWS.
Stars: ✭ 37 (+12.12%)
Mutual labels:  kms
Kms vl all
🔑KMS_VL_ALL - Smart Activation Script
Stars: ✭ 2,066 (+6160.61%)
Mutual labels:  kms
asherah
Asherah is a multi-language, cross-platform application encryption SDK
Stars: ✭ 46 (+39.39%)
Mutual labels:  kms
signatory
Signatory - A Tezos Remote Signer for signing block-chain operations with private keys using YubiHSM and Azure Key Vault
Stars: ✭ 35 (+6.06%)
Mutual labels:  kms
laravel-env-security
Securely manage Laravel .env files for different deployment environments
Stars: ✭ 67 (+103.03%)
Mutual labels:  kms
citadel
Turn an arbitrary command into a Kubernetes Key Management Service GRPC server
Stars: ✭ 15 (-54.55%)
Mutual labels:  kms
WinActive
WinActive is a simple KMS Activator for Microsoft Windows/Office/VisualStudio VL Products!
Stars: ✭ 38 (+15.15%)
Mutual labels:  kms
Across
Across the Great Wall we can reach every corner in the world
Stars: ✭ 3,654 (+10972.73%)
Mutual labels:  kms
terraform-aws-kms
This terraform module creates a KMS Customer Master Key (CMK) and its alias.
Stars: ✭ 14 (-57.58%)
Mutual labels:  kms
lastkeypair
A serverless SSH certificate authority to control access to machines using IAM and Lambda
Stars: ✭ 39 (+18.18%)
Mutual labels:  kms
ciphr
CLI crypto swiss-army knife for performing and composing encoding, decoding, encryption, decryption, hashing, and other various cryptographic operations on streams of data from the command line; mostly intended for ad hoc, infosec-related uses.
Stars: ✭ 100 (+203.03%)
Mutual labels:  decryption
Microsoft Activation Scripts
A collection of scripts for activating Microsoft products using HWID / KMS38 / Online KMS activation methods with a focus on open-source code, less antivirus detection and user-friendliness.
Stars: ✭ 9,286 (+28039.39%)
Mutual labels:  kms
xilution-selenium-grid
A Selenium Grid that Runs in AWS ECS Fargate.
Stars: ✭ 22 (-33.33%)
Mutual labels:  kms

kmstool

Tool for using AWS KMS data keys to encrypt and decrypt larger files. Input and Output file can be local or s3 file paths. If you were using this tool before May 2016, this was pre tag/release. That version is still available at v1.0.0.

Install

kmstool is now able to be installed via pip. Download the latest release package and pip install it:

pip install ~/Downloads/kmstool-1.3.2.tar.gz

Usage

For encrypting must have Key-Id Tool will only decrypt things that it has encrypted. Data can be piped to kmstool and input file omitted when encrypting. Omitting output file when decrypting with cause the decrypted data to be written to stdout. Encrypt operations with no output will write the result to stdout as base64 encoded data. Base64 encoded data can be piped from stdin for decrypt operations with no input file specified.

encrypt:

kmstool.py -e --file myfiles.tar --output this.tar.enc --key_id <KMS Key-ID>
kmstool.py -e --file myfiles.tar --output s3://mybucket/my/key/path/this.tar.enc --key_id <KMS Key-ID>
kmstool.py -e --file s3://bucket/myfiles.tar --output s3://encrypted_bucket/this.tar.enc --key_id <KMS Key-ID>
echo 'password' | kmstool.py -e --output this.tar.enc --key_id <KMS Key-ID>

decrypt:

kmstool.py -d --file this.tar.enc --output myfiles.tar
kmstool.py -d --file s3://mybucket/my/key/path/this.tar.enc --output myfiles.tar
kmstool.py -d --file s3://encrypted_bucket/my/key/path/this.tar.enc --output s3://mybucket/myfiles.tar
kmstool.py -d --file s3://encrypted_bucket/my/key/path/this.tar.enc

help:

Usage: kmstool [options] 
You must specify to encrypt or decrypt.
Output will always output a tar file.

Options:
  -h, --help            show this help message and exit
  -e, --encrypt         This encrypts the file
  -d, --decrypt         This decrypts the file
  -f FILE, --file=FILE  File to encrypt or decrypt
  -o OUTPUT, --output=OUTPUT
                        Path to output file
  -k KEY_ID, --key_id=KEY_ID
                        KMS Key-id
  -s KEY_SPEC, --key_spec=KEY_SPEC
                        KMS KeySpec
  -p PROFILE, --profile=PROFILE
                        AWS Profile
  -r REGION, --region=REGION
                        Region
  -t TEMP, --temp=TEMP  Temp work dir, optional
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].