Cross Platform simple and secure password management from commandline.
Since the Password Safe file format is open-source and widely used, there are also compatible clients for many platforms.
You can choose to store all your passwords in a single encrypted master password database, or use multiple databases to further organize your passwords (work and home, for example).
| => pwsafe init -file test.dat
Secret phrase: *****
Secret phrase again: *****
👍 password store 'test.dat' successfully created| => pwsafe push -file test.dat -url http://www.mysecretsite.com -user pinco.pallo@gmail.com -pass abbraadabbra "My Cool Site"
Secret phrase: *****
👍 record successfully pushed to store 'test.dat'| => pwsafe list -file test.dat
Secret phrase: *****
/Users/lucasepe/Temp/test.dat
My Cool Site pinco.pallo@gmail.com http://www.mysecretsite.com| => pwsafe push -file test.dat -category Bank "My Cool Site"
Secret phrase: *****
👍 record successfully pushed to store 'test.dat'| => pwsafe pull -file test.dat "my cool site"
Secret phrase: *****
abbraadabbra- by default `field=pass``
You can specify a field name
| => pwsafe pull -field url upwork
Secret phrase:
https://www.upwork.comUseful if you want to grab the password without showing the record content.
| => pwsafe clip -file test.dat "my cool site"
Secret phrase: *****
👍 check your clipboard for the content of the field 'pass'- by default the password value is copied to clipboard (
-pass)- you can also specify
-urlor-user.
- you can also specify
| => pwsafe remove "my cool site"
Secret phrase: *****
👍 record successfully removed from store '/Users/lucasepe/Temp/test.dat'Caution: use this method only if you are sure the you are the only one accessing to your computer!
Given PWSAFE_HOME=$HOME/.pwsafe as the pwsafe home folder.
The default database will reside in this folder named as vault.dat.
If you are tired to type each time the secret phrase, follow those steps:
cd $PWSAFE_HOMESave it in a file called vault-pri.pem:
$ openssl genrsa -out vault-pri.pem 1024 Save it in a file called vault-pub.pem:
$ openssl rsa -in vault-pri.pem -pubout -out vault-pub.pem Save it in a file called vault.key:
$ echo 'abbracadabbra!' | openssl rsautl -encrypt -inkey vault-pub.pem -pubin | base64 > vault.keyThat's all!
Now you can access to data in your default database (vault.dat) without typing the secret phrase.
If you wants to enable the secret phrase typing again, simply remove the following files:
vault.key,vault-pri.key,vault-pub.key
PWSafe database file encryption/decryption derived from the original work of https://github.com/tkuhlman/gopwsafe