HotKeys.js is an input capture library with some very special features, it is easy to pick up and use, has a reasonable footprint (~3kb) (gzipped: 1.73kb), and has no dependencies. It should not interfere with any JavaScript libraries or frameworks. Official document demo preview. You will need Node.js installed on your system.
hotkeys masterkey keymaster shortcutkey keyboard shortcuts keypress hotkey shortcut hotkeys-js hotkeysjs key keysPower Keys and more.
easy-to-use simple elegant tiny powerkeys antiwindowsupdate power keys hotkey productivityPrivy is a small and fast utility for password-protecting secret data such as API keys, cryptocurrency wallets, or seeds for digital signatures.Say for example you are using GnuPG. You are about to sign a message but it first requires your password. Does your password become the input to instantiate your private key? No, it is first hashed by a secure key derivation function. That hash then becomes the input to a symmetric cipher such as AES which then decrypts your stored private key. That is what Privy does.
secrets passwords encryption keys aes hmacConvert Ed25519 signing key pair into Curve25519 key pair suitable for Diffie-Hellman key exchange. This means that by exchanging only 32-byte Ed25519 public keys users can both sign and encrypt with NaCl.Note that there's currently no proof that this is safe to do. It is safer to share both Ed25519 and Curve25519 public keys (their concatenation is 64 bytes long).
ed25519 curve25519 djb crypto public keys edwards montgomery ellipticA library for effective private and public keychain management.This library provides a powerful key derivation interface that is based on the creation of private and public keychains.
key keys keychain keychains hd hd-key hd-keys hierarchical deterministic hierarchical-deterministic hierarchical-key hierarchical-keychain hierarchical-keychains deterministic-key deterministic-keychain deterministic-keychains hierarchical-deterministic-key hierarchical-deterministic-keychain hierarchical-deterministic-keychains bitcoin bitcoin-key bitcoin-keys bitcoin-address bitcoin-addresses bip32 bip-32 bip-32-keys bip32-keys bip44 bip-44 bip-44-keys bip44-keys ecdsa elliptic elliptic-curve ecdsa-key ecdsa-keys ecdsa-keychain private public private-key private-keys public-key public-keys lockchain keylocker keychain-manager crypto cryptography bitcoin-crypto bitcoin-cryptographyLibrary for operations on secp256k1 keys.
secp256k1 key keys public private public-key public-keys private-key private-keys elliptic elliptic-curve bitcoinTo get started, first define your key encoder and raw private/public keys.As shown above, there is built in support for SECP256k1 (the curve Bitcoin uses), but you can pass in your own curve parameters for any curve you'd like.
elliptic elliptic-curve asn pem der ecdsa crypto cryptography private key encode decode secp256k1 bitcoin curve private-key private-keys public-key public-keys keys ecdsa-key ecdsa-keys key-converter convert-keys key-format key-formatter format-keys key-encoder encode-keysUseful to get a deterministically ordered object, as the order of keys can vary between engines.Returns a new object with sorted keys.
sort object keys obj key stable deterministic deep recursive recursivelySimple module to sort objects recursively by its keys.The browser file is named index.umd.js which supports CommonJS, AMD and globals (deepForEach). If you want to run this module on old browsers, you must include es5-shim.
deep sort object array collection key value keys valuesSelf-signed PEM key and certificate ready for use in your HTTPS server.A dead simple way to get an HTTPS server running in development with no need to generate the self signed PEM key and certificate.
tls https pem key keys cert certificate selfsigned self-signed development options serverIf you check database passwords into git, download credential files from S3 or some other server, provide plaintext keys to your continuous integration/deployment solution, or don't have the ability to limit engineers from getting production secrets, stop doing what you're doing. Following 12 Factor? Rock on. We have env var support already built-in.
crypto key keys secret secrets passwords encrypt decrypt encryption decryptionThe 1Password for development environment variables.Seamlessly encrypt and decrypt your development keys in your .env.
encrypt decrypt 1password environment env keys secretsPerformance greatly depends on the bit size of the generated private key. With 1024 bits you get a key in 0.5s-2s, with 2048 bits it takes 8s-20s, on the same machine. As this will block the event loop while generating the key, make sure that's ok or to spawn a child process or run it inside a webworker.Get an RSA PEM key pair.
rsa keypair keys encryption public private key sshModular keyframe-based animation tools. Currently at a work-in-progress/proof-of-concept stage.This does not implement its own loop or play(), pause() methods. It simply allows the developer to retrieve interpolated values at an arbitrary time stamp (which may be in seconds, milliseconds, centuries, or whatever).
key frame keyframe keyframes frames keys animation tween tweening anim animations lerp interpolation interpolating animating tweens ease eases easings function timeline timeSource object to filter properties from.Array of properties that should be filtered from the object or a filter function. The function has the signature filterFn(sourceKey, sourceValue, source).
filter obj object key keys value values val iterate iteratorLowercases the keys and returns a new object.
object assign extend properties lowercase lower-case case keys key
We have large collection of open source products. Follow the tags from
Tag Cloud >>
Open source products are scattered around the web. Please provide information
about the open source projects you own / you use.
Add Projects.