Password database With special stuff

Overview

Password-database-With-special-stuff

This is a Password database I made for myself, as I want to keep all my passwords in the same place. but still protected, shall anyone get access to the file.
And so I made this simple password database, that can encrypt, decrypt files, and generate Passwords, pin codes, and encryption keys.

How To Use.

The only library you rare going to have to install is Fernet, which you do by pip install fernet or pip3 install fernet

I recommend putting all the files in their own sparate folder, just in case

Then you start by doubble clicking the file called Action_Selection_Menu.py Choose option 1 by typing 1 and hitting enter

General info about each part of the program:

1---See how to use this program: Basic info about the program, altough the information is kinda meh

2---Create a Password: Creates a password, you can choose how many uppercase and lowercase letters you want invidualy, 
    and then you chose how many numbers you want (0 - 9)
    then how many of these @ ! $ # symbols it should contain,
    And lastly, you can Add what ever you heart desires

3---Create a Pincode: You can choose the length of the pincode

4---Create an Encryption Key: You will create a key with 128-bit AES encryption in CBC mode, PKCS7 padding, it will be placed in the fodler where you have all the program files
    You will get to choose the files name, and it teh program will automatically make it a .key file (You don't need to install anything for .key files)

5---See Database: From this part you will be able to see and edit the database trough the program.
    Removing trough the program is kinda wonky at first, but it very simple, it will look something like this
    ['0This is the database\n', '1-----------------------\n', '2\n', '3TESTPASSWORD1\n', '4TESTPASSWORD2\n', '5TESTPASSWORD3\n', '6TESTPASSWORD4\n', '7TESTPASSWORD5\n']
    The number at the start of each things is the row, you don't have to ad that, it is done automaticaly by the program, 
    So to remove for example TESTPASSWORD3 you'd type 3 and hit enter in the ''remove from the database'' option
    Other than that, the database is pretty self explanitory.

6---Encrypt a file: This option will allow you to encrypt a file using akey generated by the programs 4:th option, 
    you can choose to have only a enrcypted file, or to have a un-encrypted copy along side the encrypted one

7---Decrypt a file: You can decrypt AES encrypted files aslong as you have the key used to encrypted them, 
    here you will get a Un-encrypted copy of the file, the original will remain encrypted

8---Stop the program: I bet you can't guess what this one does

If you have any questions, just ask

Socials:

YouTube: https://www.youtube.com/channel/UCTHHIPTtETe6hawsfnZTM8A

Reddit: vapen_hem

Discord: vapen_hem#1161

Comments
  • Missing LICENSE

    Missing LICENSE

    I see you have no LICENSE file for this project. The default is copyright.

    I would suggest releasing the code under the GPL-3.0-or-later or AGPL-3.0-or-later license so that others are encouraged to contribute changes back to your project.

    opened by TechnologyClassroom 2
  • Insecure password generation.

    Insecure password generation.

    the random module should never^1 be used for cryptographic purposes because it uses pseudorandom numbers. The python documentation also advises against it:

    "Warning The pseudo-random generators of this module should not be used for security purposes. For security or cryptographic uses, see the secrets module."

    ^1 unless using random.SystemRandom

    opened by mketab 2
  • Publishing Releases

    Publishing Releases

    I left an issue a month or so ago and I decided to check back on this project. I noticed that you have directories with version numbers in the repo. The whole point of source control is that you can go back to prior versions without needed to make copies of your code.

    GitHub has a really easy solution for this too, just create a release of whatever specific versions you want saved.

    opened by mketab 1
  • Reformatted code and command system to be more easily user accessible.

    Reformatted code and command system to be more easily user accessible.

    1. Made code more readable
    2. Changed database system to be a document database based in json with keys that use a key value system
    3. Updated README.md formatting and grammar
    4. Changed interface
    opened by marleyakins 0
  • Make the lines in the database editable.

    Make the lines in the database editable.

    Issue: Right now you can only add or remove whole lines, but want to be able to edit the lines

    Solution(s): Scrap the "Add to database" and "remove from database" options, and replace them with a "edit database" option, where you can simply edit the database like a normal text file.

    Other Notes: The reason: If make a typo now, you have to first go the remove from database option, then remove the line, and then go to the add to database option, and then add the line again, which is annoying, and slow (Compared to simply being able too fix it like you would in a normal text file)

    opened by vapen-hem 0
  • Make it so that you can add the passwords to the database without having to copy the password to the clipboard.

    Make it so that you can add the passwords to the database without having to copy the password to the clipboard.

    Problem: Currently, the database and the password generator are two separate parts of this program, which in my mind makes no sense, since you have to copy them to the clipboard, which is not good since basically any program could just read the clipboard.

    Solution: 1 Add the password generator to the database edit option. (Implement password gen code into the database code) 2 Add an option in the password generator, (Make a "bridge" between the password gen and the database code)

    Other notes: This also includes the Pincode generator. You could just write down the password on a piece of paper, but that is not very efficient, and one of the reasons why I created this program is to avoid putting stuff on paper.

    opened by vapen-hem 0
  • Fix

    Fix "No File crashes" and add more anti fuckup loops

    Issue 1 No file crashes happen if you have the wrong file name, so instead of saying, no file found, the program crashes, which isn't really a good experience.

    Solution: I will try to use some anti-filecrash librar(y)(ies).

    Issue 2 Anti fuckup loops are while loops that stop the program from crashing in the program's input parts. However, these loops are not on all crash points.

    Solution: while loops, with an error message.

    opened by vapen-hem 0
Owner
Sweden 2004 I am currently learning Python, JavaScript, and HTML/CSS
Phishing-Crack tools to punish friends

Phishing-Crack Phishing Tool Version 1.0.0 Created By temirovazat A Phishing Tool With PHP and Python3 Features Fake Instagram Phishing Page Fake Face

3 Oct 04, 2022
Simple Python 3 script to detect the "Log4j" Java library vulnerability (CVE-2021-44228) for a list of URL with multithreading

log4j-detect Simple Python 3 script to detect the "Log4j" Java library vulnerability (CVE-2021-44228) for a list of URL with multithreading The script

Wade 1 Dec 15, 2021
Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527) using standard Impacket.

PrintNightmare Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527) using standard Impacket. Installtion $ pip3 install impacket

Oliver Lyak 140 Dec 27, 2022
A scanner and a proof of sample exploit for log4j RCE CVE-2021-44228

1.Create a Sample Vulnerable Application . 2.Start a netcat listner . 3.Run the exploit . 5.Use jdk1.8.0_20 for better results . Exploit-db - https://

Isuru Umayanga 7 Aug 06, 2022
Provides script to download and format public IP lists related to the Log4j exploit.

Provides script to download and format public IP lists related to the Log4j exploit. Current format includes: plain list, Cisco ASA Network Group.

Gianluca Ulivi 1 Jan 02, 2022
This is a proof-of-concept exploit for Grafana's Unauthorized Arbitrary File Read Vulnerability (CVE-2021-43798).

CVE-2021-43798 – Grafana Exploit About This is a proof-of-concept exploit for Grafana's Unauthorized Arbitrary File Read Vulnerability (CVE-2021-43798

Pedro Havay 12 Nov 18, 2022
This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit

CVE-2021-40444 builders This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit. This repo is just for testing, re

ASL IT Security 168 Nov 09, 2022
XSS scanner in python

DeadXSS XSS scanner in python How to Download: Step 1: git clone https://github.com/Deadeye0x/DeadXSS.git Step 2: cd DeadXSS Step 3: python3 DeadXSS.p

2 Jul 17, 2022
BOF-Roaster is an automated buffer overflow exploit machine which is begin written with Python 3.

BOF-Roaster is an automated buffer overflow exploit machine which is begin written with Python 3. On first release it was able to successfully break many of the most well-known buffer overflow exampl

Kaan Caglan 5 Nov 23, 2021
python driver for fingerprint machine (ZKTeco biometrics)

fpmachine python driver for fingerprint machine (ZKTeco biometrics) support until now 2 model supported and tested ZMM100_TFT and ZMM220_TFT install p

Samy Sultan 4 Oct 06, 2022
集成crawlergo、xray、dirsearch、nmap等工具的src漏洞挖掘工具,使用docker封装运行;

tools下有几个工具,所以项目文件比较大,如果下载总是中断的话建议拆开下载各个项目然后直接拷贝dockefile和recon.py即可 0x01 hscan介绍 hscan是什么 hscan是一款旨在使用一条命令替代渗透前的多条扫描命令,通过集成crawlergo扫描和xray扫描、dirsear

102 Jan 04, 2023
Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk

Repo for "The Crown: Exploratory Analysis of Nim Malware" DEF CON 615 talk

HuskyHacks 43 Dec 03, 2022
Simples brute forcer de diretorios para web pentest.

🦑 dirbruter Simples brute forcer de diretorios para web pentest. ❕ Atenção Não ataque sites privados. Isto é illegal. 🖥️ Pré-requisitos Ultima versã

Dio brando 6 Jan 22, 2022
Scan your logs for CVE-2021-44228 related activity and report the attackers

jndiRep - CVE-2021-44228 Basically a bad grep on even worse drugs. search for malicious strings decode payloads print results to stdout or file report

js-on 2 Nov 24, 2022
windows电脑查看全部连接过的WiFi密码

python WIFI历史密码查看器 WIFI密码查看器 原理 win+R,输入cmd打开命令行窗口 #这个命令可以列出你所有连接过的wifi netsh wlan show profiles #替换你要查找的WiFi名称,就可以显示出这个wifi的所有信息,包括密码 netsh wlan show

GMYXDS 15 Dec 22, 2022
OpenSource Poc && Vulnerable-Target Storage Box.

reapoc OpenSource Poc && Vulnerable-Target Storage Box. We are aming to collect different normalized poc and the vulerable target to verify it. Now re

cckuailong 560 Dec 23, 2022
ORector - A Fast Python tool designed to detect open redirects vulnerabilities on websites

ORector is a Fast Python tool designed to detect open redirects vulnerabilities

11 Apr 02, 2022
Automated tool to find & created Exploit Poc for Clickjacking Vulnerability

ClickJackPoc This tool will help you automate finding Clickjacking Vulnerability by just passing a file containing list of Targets . Once the Target i

Chirag Agrawal 24 Dec 19, 2022
IDA Python Script for anti ollvm

IDA Python Script for anti ollvm

Shocker 62 Dec 23, 2022
Cobalt Strike Beacon configuration extractor and parser.

Cobalt Strike Configuration Extractor and Parser Overview Pure Python library and set of scripts to extract and parse configurations (configs) from Co

Stroz Friedberg 102 Dec 18, 2022