Password database With special stuff

Overview

Password-database-With-special-stuff

This is a Password database I made for myself, as I want to keep all my passwords in the same place. but still protected, shall anyone get access to the file.
And so I made this simple password database, that can encrypt, decrypt files, and generate Passwords, pin codes, and encryption keys.

How To Use.

The only library you rare going to have to install is Fernet, which you do by pip install fernet or pip3 install fernet

I recommend putting all the files in their own sparate folder, just in case

Then you start by doubble clicking the file called Action_Selection_Menu.py Choose option 1 by typing 1 and hitting enter

General info about each part of the program:

1---See how to use this program: Basic info about the program, altough the information is kinda meh

2---Create a Password: Creates a password, you can choose how many uppercase and lowercase letters you want invidualy, 
    and then you chose how many numbers you want (0 - 9)
    then how many of these @ ! $ # symbols it should contain,
    And lastly, you can Add what ever you heart desires

3---Create a Pincode: You can choose the length of the pincode

4---Create an Encryption Key: You will create a key with 128-bit AES encryption in CBC mode, PKCS7 padding, it will be placed in the fodler where you have all the program files
    You will get to choose the files name, and it teh program will automatically make it a .key file (You don't need to install anything for .key files)

5---See Database: From this part you will be able to see and edit the database trough the program.
    Removing trough the program is kinda wonky at first, but it very simple, it will look something like this
    ['0This is the database\n', '1-----------------------\n', '2\n', '3TESTPASSWORD1\n', '4TESTPASSWORD2\n', '5TESTPASSWORD3\n', '6TESTPASSWORD4\n', '7TESTPASSWORD5\n']
    The number at the start of each things is the row, you don't have to ad that, it is done automaticaly by the program, 
    So to remove for example TESTPASSWORD3 you'd type 3 and hit enter in the ''remove from the database'' option
    Other than that, the database is pretty self explanitory.

6---Encrypt a file: This option will allow you to encrypt a file using akey generated by the programs 4:th option, 
    you can choose to have only a enrcypted file, or to have a un-encrypted copy along side the encrypted one

7---Decrypt a file: You can decrypt AES encrypted files aslong as you have the key used to encrypted them, 
    here you will get a Un-encrypted copy of the file, the original will remain encrypted

8---Stop the program: I bet you can't guess what this one does

If you have any questions, just ask

Socials:

YouTube: https://www.youtube.com/channel/UCTHHIPTtETe6hawsfnZTM8A

Reddit: vapen_hem

Discord: vapen_hem#1161

Comments
  • Missing LICENSE

    Missing LICENSE

    I see you have no LICENSE file for this project. The default is copyright.

    I would suggest releasing the code under the GPL-3.0-or-later or AGPL-3.0-or-later license so that others are encouraged to contribute changes back to your project.

    opened by TechnologyClassroom 2
  • Insecure password generation.

    Insecure password generation.

    the random module should never^1 be used for cryptographic purposes because it uses pseudorandom numbers. The python documentation also advises against it:

    "Warning The pseudo-random generators of this module should not be used for security purposes. For security or cryptographic uses, see the secrets module."

    ^1 unless using random.SystemRandom

    opened by mketab 2
  • Publishing Releases

    Publishing Releases

    I left an issue a month or so ago and I decided to check back on this project. I noticed that you have directories with version numbers in the repo. The whole point of source control is that you can go back to prior versions without needed to make copies of your code.

    GitHub has a really easy solution for this too, just create a release of whatever specific versions you want saved.

    opened by mketab 1
  • Reformatted code and command system to be more easily user accessible.

    Reformatted code and command system to be more easily user accessible.

    1. Made code more readable
    2. Changed database system to be a document database based in json with keys that use a key value system
    3. Updated README.md formatting and grammar
    4. Changed interface
    opened by marleyakins 0
  • Make the lines in the database editable.

    Make the lines in the database editable.

    Issue: Right now you can only add or remove whole lines, but want to be able to edit the lines

    Solution(s): Scrap the "Add to database" and "remove from database" options, and replace them with a "edit database" option, where you can simply edit the database like a normal text file.

    Other Notes: The reason: If make a typo now, you have to first go the remove from database option, then remove the line, and then go to the add to database option, and then add the line again, which is annoying, and slow (Compared to simply being able too fix it like you would in a normal text file)

    opened by vapen-hem 0
  • Make it so that you can add the passwords to the database without having to copy the password to the clipboard.

    Make it so that you can add the passwords to the database without having to copy the password to the clipboard.

    Problem: Currently, the database and the password generator are two separate parts of this program, which in my mind makes no sense, since you have to copy them to the clipboard, which is not good since basically any program could just read the clipboard.

    Solution: 1 Add the password generator to the database edit option. (Implement password gen code into the database code) 2 Add an option in the password generator, (Make a "bridge" between the password gen and the database code)

    Other notes: This also includes the Pincode generator. You could just write down the password on a piece of paper, but that is not very efficient, and one of the reasons why I created this program is to avoid putting stuff on paper.

    opened by vapen-hem 0
  • Fix

    Fix "No File crashes" and add more anti fuckup loops

    Issue 1 No file crashes happen if you have the wrong file name, so instead of saying, no file found, the program crashes, which isn't really a good experience.

    Solution: I will try to use some anti-filecrash librar(y)(ies).

    Issue 2 Anti fuckup loops are while loops that stop the program from crashing in the program's input parts. However, these loops are not on all crash points.

    Solution: while loops, with an error message.

    opened by vapen-hem 0
Owner
Sweden 2004 I am currently learning Python, JavaScript, and HTML/CSS
BurpSuite Extension: Log4j RCE Scanner

BurpSuite Extension: Log4j RCE Scanner

1 Dec 16, 2021
Dark-Fb No Login 100% safe

Dark-Fb No Login 100% safe TERMUX • pkg install python2 && git -y • pip2 install requests mechanize tqdm • git clone https://github.com/BOT-033/Sensei

Bukan Hamkel 1 Dec 04, 2021
Hammer-DDos - Hammer DDos With Python

Hammer-DDos $ apt update $ apt upgrade $ apt install python $ apt install git $

1 Jan 24, 2022
ONT Analysis Toolkit (OAT)

A toolkit for monitoring ONT MinION sequencing, followed by data analysis, for viral genomes amplified with tiled amplicon sequencing.

6 Jun 14, 2022
Lite version of my Gatekeeper backdoor for public use.

MayorSec Backdoor Fully functioning bind-type backdoor This backdoor is a fully functioning bind shell and lite version of my full functioning Gatekee

Joe Helle 56 Mar 25, 2022
Threat Intelligence Gathering 威胁情报收集,旨在提高蓝队拿到攻击 IP 后对其进行威胁情报信息收集的效率。

0x00 介绍 tig Threat Intelligence Gathering 威胁情报收集,旨在提高蓝队拿到攻击 IP 后对其进行威胁情报信息收集的效率,目前已集成微步、IP 域名反查、Fofa 信息收集、ICP 备案查询、IP 存活检测五个模块,现已支持以下信息的查询: ✅ 微步标签 ✅ I

Wolf Group Security Team 698 Dec 09, 2022
A simple Burp Suite extension to extract datas from source code

DataExtractor A simple Burp Suite extension to extract datas from source code. Features in scope parsing file extensions to ignore files exclusion bas

Gwendal Le Coguic 86 Dec 31, 2022
CVE-2021-45232-RCE-多线程批量漏洞检测

CVE-2021-45232-RCE CVE-2021-45232-RCE-多线程批量漏洞检测 FOFA 查询 title="Apache APISIX Das

孤桜懶契 36 Sep 21, 2022
将hw时信息收集以及简单的漏洞操作步骤简单化

Braised-vegetables 将hw时信息收集以及简单的漏洞扫描操作步骤简单化 使用subfinder(被动子域名爆破收集) subdomain(主动域名爆破) nabbu(端口扫描) httpx(探测目录浏览) crawlergo(360深度爬虫) chorme(谷歌浏览器) xray(漏

19 Nov 15, 2022
Tool for finding PHP source code vulnerabilities.

vulnz Tool for finding php source code vulnerabilities. Scans PHP source code and prints out potentially dangerous lines. This tool is useful for secu

Mateo Hanžek 1 Jan 14, 2022
HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907

CVE-2022-21907 Description POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability. create by antx at 2022-01-17. Detail HTTP

赛欧思网络安全研究实验室 365 Nov 30, 2022
A Telegram Bot to force users to join a specific channel before sending messages in a group.

Promoter A Telegram Bot to force users to join a specific channel before sending messages in a group. Introduction A Telegram Bot to force users to jo

Mr. Dynamic 1 Jan 27, 2022
A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources to make Ubuntu 20.04 capable of both offensive and defensive security work.

infosec-fortress A python script to turn Ubuntu Desktop into a strong DFIR/RE System with some teeth (Purple Team Ops)! This is intended to create a s

James 41 Dec 30, 2022
Bandit is a tool designed to find common security issues in Python code.

A security linter from PyCQA Free software: Apache license Documentation: https://bandit.readthedocs.io/en/latest/ Source: https://github.com/PyCQA/ba

Python Code Quality Authority 4.8k Dec 31, 2022
pwncat module that automatically exploits CVE-2021-4034 (pwnkit)

pwncat_pwnkit Introduction The purpose of this module is to attempt to exploit CVE-2021-4034 (pwnkit) on a target when using pwncat. There is no need

Dana Epp 33 Jul 01, 2022
Chapter 1 of the AWS Cookbook

Chapter 1 - Security Set and export your default region: export AWS_REGION=us-east-1 Set your AWS ACCOUNT ID:: AWS_ACCOUNT_ID=$(aws sts get-caller-ide

AWS Cookbook 30 Nov 27, 2022
Gitlab RCE - Remote Code Execution

Gitlab RCE - Remote Code Execution RCE for old gitlab version = 11.4.7 & 12.4.0-12.8.1 LFI for old gitlab versions 10.4 - 12.8.1 This is an exploit f

153 Nov 09, 2022
Automated tool to find & created Exploit Poc for Clickjacking Vulnerability

ClickJackPoc This tool will help you automate finding Clickjacking Vulnerability by just passing a file containing list of Targets . Once the Target i

Chirag Agrawal 24 Dec 19, 2022
client attack remotely , this script was written for educational purposes only

client attack remotely , this script was written for educational purposes only, do not use against to any victim, which you do not have permission for it

9 Jun 05, 2022