Displaying 1 to 20 from 34 results

aws-vault - A vault for securely storing and accessing AWS credentials in development environments

  •    Go

Securely store and access credentials for AWS. AWS Vault stores IAM credentials in your operating systems secure keystore and then generates temporary credentials from those to expose to your shell and applications. It's designed to be complementary to the aws cli tools, and is aware of your profiles and configuration in ~/.aws/config. Check out the announcement blog post for more details.

buttercup-desktop - :key: Javascript Secrets Vault - Multi-Platform Desktop Application

  •    Javascript

Cross-platform, free and open-source password manager based on NodeJS. Buttercup is a password manager - an assistant for helping you store all of your login credentials. Buttercup helps you keep your accounts safe and assists you when you want to log in - all you need to do is remember just one password: your master password.

envchain - Environment variables meet macOS Keychain and gnome-keyring <3

  •    C

Secrets for common computing environments, such as AWS_SECRET_ACCESS_KEY, are set with environment variables. A common practice is to set them in shell's intialization files such as .bashrc and .zshrc.




secure-password - Making Password storage safer for all

  •    Javascript

They're both constrained by the constants SecurePassword.MEMLIMIT_MIN - SecurePassword.MEMLIMIT_MAX and SecurePassword.OPSLIMIT_MIN - SecurePassword.OPSLIMIT_MAX. If not provided they will be given the default values SecurePassword.MEMLIMIT_DEFAULT and SecurePassword.OPSLIMIT_DEFAULT which should be fast enough for a general purpose web server without your users noticing too much of a load time. However your should set these as high as possible to make any kind of cracking as costly as possible. A load time of 1s seems reasonable for login, so test various settings in your production environment. The settings can be easily increased at a later time as hardware most likely improves (Moore's law) and adversaries therefore get more powerful. If a hash is attempted verified with weaker parameters than your current settings, you get a special return code signalling that you need to rehash the plaintext password according to the updated policy. In contrast to other modules, this module will not increase these settings automatically as this can have ill effects on services that are not carefully monitored.

node-keytar - Native Password Node Module

  •    C++

A native Node module to get, add, replace, and delete passwords in system's keychain. On macOS the passwords are managed by the Keychain, on Linux they are managed by the Secret Service API/libsecret, and on Windows they are managed by Credential Vault. Currently this library uses libsecret so you may need to install it before running npm install.

webauthn-json - 🔏 A small WebAuthn API wrapper that translates to/from pure JSON using base64url.

  •    TypeScript

@github/webauthn-json is a client-side Javascript library that serves as convenience wrapper for the the WebAuthn API by encoding binary data using base64url (also known as "websafe" or "urlsafe" base64). The WebAuthn API itself takes input and output values that look almost like JSON, except that binary data is represented as ArrayBuffers. Using webauthn-json allows the data to be sent from/to the server as normal JSON without any custom client-side processing.

pyark - CyberArk Enterprise Password Vault API CLI tool

  •    Python

Pyark is a small python-based CLI tool, which allows you to interact with the CyberArk Enterprise Password Vault API.Furthermore it's important to know which version of the CyberArk Password Vault is used as only the newest versions expose all API endpoints. Make sure to double check the API documentation, specific for your version, in case the tool fails to interact with the API.


vault-client - A command-line interface to HashiCorp's Vault

  •    Go

vc is a command-line interface to HashiCorp's Vault inspired by pass.To build vault-client you need a Go compiler and Git.

wincred - Go wrapper around the Windows Credential Manager API functions

  •    Go

Go wrapper around the Windows Credential Manager API functions.

awscred - Node.js module to resolve AWS credentials/region using env, ini files and IAM roles

  •    Javascript

A small standalone library to resolve AWS credentials and region details using, in order: environment variables, INI files, and EC2 metadata (for IAM roles). Queues HTTP calls to ensure no thundering herd effect will occur when credentials expire.Resolves AWS credentials and region details, and calls back with an object containing credentials and region properties as highlighted in the example above.

qconf - Painless configuration with defaults file, environment variables, arguments, function parameters

  •    Javascript

Painless configuration for Node apps with defaults file, environment variables, arguments, function parameters.Got sick of the complexity of nconf. Don't try to be everything to everybody. Just get a simple job done with simple code.

afp-cli - CLI for the AWS Federation Proxy

  •    Python

The AFP CLI is the command line interface to access the AWS Federation Proxy (AFP). Its main use case is starting a new shell where your temporary AWS credentials have been exported into the environment.

awsenv - awsenv is intended as a local credential store for people using more than one AWS account at the same time

  •    Go

awsenv is intended as a local credential store for people using more than one AWS account at the same time. For security considerations about this software please refer to the security.md file in this repository.

serverless-env-generator - A Serverless 1

  •    Javascript

This plugin automatically creates a .env file during deployment by merging environment variables from one or more YAML files. During runtime these variables can then be loaded into process.env using dotenv. For a brief introduction, read our blogpost about introducing serverless-env-generator.

aws-pony - For people who like ponies or poor AWS key hygiene. I think those are the same things.

  •    Javascript

Kids, don't just npm install stuff willy nilly. Things you don't expect can happen. If you're having trouble educating your team about the dangers of leaving credentials in easy to anticipate locations while working in an ecosystem of dependencies that pull dependencies that pull dependencies that no one reviews, try npm install aws-pony --save on some of your projects at work and see if anyone catches the commit.

ghost - A simple, server/less, single-api, multi-backend, ghostly secret-store/key-store for your passwords, ssh-keys and cloud credentials

  •    Python

ghost aims to provide a secret-store with a single, simple-to-use API supporting multiple storage backends without requiring a server to run. To that end, ghost supports file based backends like TinyDB and SQLite. Using other backends means, of course, that they need to be available to ghost, while ghost itself remains stateless.

soundcloud-nodejs-api-wrapper - Soundcloud Nodejs API Wrapper - connect to the soundcloud API with oauth and without any callback url

  •    Javascript

Soundcloud Nodejs API Wrapper - connect to the soundcloud API with oauth (your credentials) and without any callback url / permission popup window. For more details check the Soundcloud API documentation. This is a NPM package. !! Since v0.3.0 supports now fully server side only content modifications via POST / PUT requests from the server side. There was a authentication bug.






We have large collection of open source products. Follow the tags from Tag Cloud >>


Open source products are scattered around the web. Please provide information about the open source projects you own / you use. Add Projects.