https://github.com/malnick/cryptorious
CLI Password Manager
https://github.com/malnick/cryptorious
aes aes256 aws cli command-line command-line-tool decrypt-data decrypt-secrets decryption encrypted-data encrypted-store encryption golang kms password-generator pkcs15 ssh-key vault yaml
Last synced: 10 months ago
JSON representation
CLI Password Manager
- Host: GitHub
- URL: https://github.com/malnick/cryptorious
- Owner: malnick
- Created: 2016-05-16T17:57:20.000Z (over 9 years ago)
- Default Branch: master
- Last Pushed: 2018-05-01T21:43:49.000Z (almost 8 years ago)
- Last Synced: 2023-08-20T20:41:05.428Z (over 2 years ago)
- Topics: aes, aes256, aws, cli, command-line, command-line-tool, decrypt-data, decrypt-secrets, decryption, encrypted-data, encrypted-store, encryption, golang, kms, password-generator, pkcs15, ssh-key, vault, yaml
- Language: Go
- Homepage:
- Size: 437 KB
- Stars: 14
- Watchers: 4
- Forks: 1
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
## Manpage
### Main Menu
```
_________ __ .__
\_ ___ \ _______ ___.__.______ _/ |_ ____ _______ |__| ____ __ __ ______
/ \ \/ \_ __ \< | |\____ \ \ __\ / _ \ \_ __ \| | / _ \ | | \ / ___/
\ \____ | | \/ \___ || |_> > | | ( <_> ) | | \/| |( <_> )| | / \___ \
\______ / |__| / ____|| __/ |__| \____/ |__| |__| \____/ |____/ /____ >
\/ \/ |__| \/
- CLI-based encryption for passwords and random data
USAGE:
cryptorious [global options] command [command options] [arguments...]
AUTHOR(S):
Jeff Malnick
COMMANDS:
rename Rename an entry in the vault
delete Remove an entry from the cryptorious vault
decrypt Decrypt a value in the vault `VALUE`
encrypt Encrypt a value for the vault `VALUE`
GLOBAL OPTIONS:
--vault-path, --vp "/Users/malnick/.cryptorious/vault.yaml" Path to vault.yaml.
--debug Debug/Verbose log output.
--help, -h show help
--version, -v print the version
```
### Encrypt Sub Menu
```
NAME:
encrypt - Encrypt a value for the vault `VALUE`
USAGE:
encrypt [command options] [arguments...]
OPTIONS:
--key-arn KMS key ARN
```
### Decrypt Sub Menu
```
NAME:
cryptorious decrypt - Decrypt a value in the vault `VALUE`
USAGE:
cryptorious decrypt [command options] [arguments...]
OPTIONS:
--copy, -c Copy decrypted password to clipboard automatically
--goto, -g Open your default browser to https:// and login automatically
--timeout, -t "10" Timeout in seconds for the decrypt session window to expire
```
### Rename Sub Menu
```
NAME:
cryptorious rename - Rename an entry in the vault
USAGE:
cryptorious rename [command options] [arguments...]
OPTIONS:
--old, -o Name of old entry name [key] in vault
--new, -n Name of new entry name [key] in vault
```
### Generate Sub Menu
```
NAME:
generate - Generate a RSA keys or a secure password
USAGE:
generate command [command options] [arguments...]
COMMANDS:
password [--[l]ength] Generate a random password
OPTIONS:
--help, -h show help
```
## Step 0: Build && Alias
Build it and install: `make install`
Add to your `.[bash | zsh | whatever]rc`: `alias cpt=cryptorious`
## Step 1: Add KMS keys to AWS
NOTE: will add cmd for this soon
In your own AWS account, add a KMS key and grant your IAM user access.
## Step 2: Encrypt
NOTE: will add flag for AWS profile soon
Use your AWS profile and encrypt some data:
```
AWS_PROFILE=personal cryptorious encrypt --key-arn= github.com
```
Will open a ncurses window and prompt you for username, password and a secure note. All input is optional.
## Step 3: Decrypt
```
AWS_PROFILE=personal cryptorious decrypt thing
```
Will open a ncurses window with the decrypted vault entry.
Forgo the the ncurses window and copy the decrypted password stright to the system clipboard?
```
cryptorious decrypt -[c]opy thing
```
No printing, just a message that your decrypted password is now available in the paste buffer for your user.
If you've saved your vault entries with the URI of the site they belong to (i.e., ran `cryptorious encrypt github.com`...) then you can use the `-[g]oto` flag to open your default browser to this URI. Pair it with `-[c]opy` and the shorthand for `[d]ecrypt` and you'll have a fast way of navigating directly to your desired, secure website (let's also assume you've aliased `cpt=cryptorious`):
```
cpt d -g -c github.com
```
## Step 5: Generate Secure Password
The `generate` command also lets you generate random, secure passwords of `n` length:
```
cryptorious generate password --length 20
(yZkj,GX`w7T4x&TaYyw
```
This defaults to a length of 15 if you don't pass --[l]ength.