Password database With special stuff

Overview

Password-database-With-special-stuff

This is a Password database I made for myself, as I want to keep all my passwords in the same place. but still protected, shall anyone get access to the file.
And so I made this simple password database, that can encrypt, decrypt files, and generate Passwords, pin codes, and encryption keys.

How To Use.

The only library you rare going to have to install is Fernet, which you do by pip install fernet or pip3 install fernet

I recommend putting all the files in their own sparate folder, just in case

Then you start by doubble clicking the file called Action_Selection_Menu.py Choose option 1 by typing 1 and hitting enter

General info about each part of the program:

1---See how to use this program: Basic info about the program, altough the information is kinda meh

2---Create a Password: Creates a password, you can choose how many uppercase and lowercase letters you want invidualy, 
    and then you chose how many numbers you want (0 - 9)
    then how many of these @ ! $ # symbols it should contain,
    And lastly, you can Add what ever you heart desires

3---Create a Pincode: You can choose the length of the pincode

4---Create an Encryption Key: You will create a key with 128-bit AES encryption in CBC mode, PKCS7 padding, it will be placed in the fodler where you have all the program files
    You will get to choose the files name, and it teh program will automatically make it a .key file (You don't need to install anything for .key files)

5---See Database: From this part you will be able to see and edit the database trough the program.
    Removing trough the program is kinda wonky at first, but it very simple, it will look something like this
    ['0This is the database\n', '1-----------------------\n', '2\n', '3TESTPASSWORD1\n', '4TESTPASSWORD2\n', '5TESTPASSWORD3\n', '6TESTPASSWORD4\n', '7TESTPASSWORD5\n']
    The number at the start of each things is the row, you don't have to ad that, it is done automaticaly by the program, 
    So to remove for example TESTPASSWORD3 you'd type 3 and hit enter in the ''remove from the database'' option
    Other than that, the database is pretty self explanitory.

6---Encrypt a file: This option will allow you to encrypt a file using akey generated by the programs 4:th option, 
    you can choose to have only a enrcypted file, or to have a un-encrypted copy along side the encrypted one

7---Decrypt a file: You can decrypt AES encrypted files aslong as you have the key used to encrypted them, 
    here you will get a Un-encrypted copy of the file, the original will remain encrypted

8---Stop the program: I bet you can't guess what this one does

If you have any questions, just ask

Socials:

YouTube: https://www.youtube.com/channel/UCTHHIPTtETe6hawsfnZTM8A

Reddit: vapen_hem

Discord: vapen_hem#1161

Comments
  • Missing LICENSE

    Missing LICENSE

    I see you have no LICENSE file for this project. The default is copyright.

    I would suggest releasing the code under the GPL-3.0-or-later or AGPL-3.0-or-later license so that others are encouraged to contribute changes back to your project.

    opened by TechnologyClassroom 2
  • Insecure password generation.

    Insecure password generation.

    the random module should never^1 be used for cryptographic purposes because it uses pseudorandom numbers. The python documentation also advises against it:

    "Warning The pseudo-random generators of this module should not be used for security purposes. For security or cryptographic uses, see the secrets module."

    ^1 unless using random.SystemRandom

    opened by mketab 2
  • Publishing Releases

    Publishing Releases

    I left an issue a month or so ago and I decided to check back on this project. I noticed that you have directories with version numbers in the repo. The whole point of source control is that you can go back to prior versions without needed to make copies of your code.

    GitHub has a really easy solution for this too, just create a release of whatever specific versions you want saved.

    opened by mketab 1
  • Reformatted code and command system to be more easily user accessible.

    Reformatted code and command system to be more easily user accessible.

    1. Made code more readable
    2. Changed database system to be a document database based in json with keys that use a key value system
    3. Updated README.md formatting and grammar
    4. Changed interface
    opened by marleyakins 0
  • Make the lines in the database editable.

    Make the lines in the database editable.

    Issue: Right now you can only add or remove whole lines, but want to be able to edit the lines

    Solution(s): Scrap the "Add to database" and "remove from database" options, and replace them with a "edit database" option, where you can simply edit the database like a normal text file.

    Other Notes: The reason: If make a typo now, you have to first go the remove from database option, then remove the line, and then go to the add to database option, and then add the line again, which is annoying, and slow (Compared to simply being able too fix it like you would in a normal text file)

    opened by vapen-hem 0
  • Make it so that you can add the passwords to the database without having to copy the password to the clipboard.

    Make it so that you can add the passwords to the database without having to copy the password to the clipboard.

    Problem: Currently, the database and the password generator are two separate parts of this program, which in my mind makes no sense, since you have to copy them to the clipboard, which is not good since basically any program could just read the clipboard.

    Solution: 1 Add the password generator to the database edit option. (Implement password gen code into the database code) 2 Add an option in the password generator, (Make a "bridge" between the password gen and the database code)

    Other notes: This also includes the Pincode generator. You could just write down the password on a piece of paper, but that is not very efficient, and one of the reasons why I created this program is to avoid putting stuff on paper.

    opened by vapen-hem 0
  • Fix

    Fix "No File crashes" and add more anti fuckup loops

    Issue 1 No file crashes happen if you have the wrong file name, so instead of saying, no file found, the program crashes, which isn't really a good experience.

    Solution: I will try to use some anti-filecrash librar(y)(ies).

    Issue 2 Anti fuckup loops are while loops that stop the program from crashing in the program's input parts. However, these loops are not on all crash points.

    Solution: while loops, with an error message.

    opened by vapen-hem 0
Owner
Sweden 2004 I am currently learning Python, JavaScript, and HTML/CSS
Sudo Baron Samedit Exploit

CVE-2021-3156 (Sudo Baron Samedit) This repository is CVE-2021-3156 exploit targeting Linux x64. For writeup, please visit https://datafarm-cybersecur

Worawit Wang 559 Jan 03, 2023
Selamat Datang DiTools Crack-Old, Crack Old Adalah Sebuah Crack Tanpa Login Dan Crack Menggunakan Akun Facebook Tua/Old.

Selamat Datang DiTools Crack-Old, Crack Old Adalah Sebuah Crack Tanpa Login Dan Crack Menggunakan Akun Facebook Tua/Old. ([Welcome to Crack-Old Tools, Old Crack Is A Crack Without Login And Crack Usi

Risky [ Zero Tow ] 7 Dec 25, 2022
A simple python code for hacking profile views

This code for hacking profile views. Not recommended to adding profile views in profile. This code is not illegal code. This code is for beginners.

Fayas Noushad 3 Nov 28, 2021
Fast python tool to test apache path traversal CVE-2021-41773 in a List of url

CVE-2021-41773 Fast python tool to test apache path traversal CVE-2021-41773 in a List of url Usage :- create a live urls file and use the flag "-l" p

Zahir Tariq 12 Nov 09, 2022
Kriecher is a simple Web Scanner which will run it's own checks for the OWASP

Kriecher is a simple Web Scanner which will run it's own checks for the OWASP top 10 https://owasp.org/www-project-top-ten/# as well as run a

1 Nov 12, 2021
Wonk is a tool for combining a set of AWS policy files into smaller compiled policy sets.

Wonk is a tool for combining a set of AWS policy files into smaller compiled policy sets.

Amino, Inc 140 Dec 16, 2022
ClusterFuzz is a scalable fuzzing infrastructure that finds security and stability issues in software.

ClusterFuzz ClusterFuzz is a scalable fuzzing infrastructure that finds security and stability issues in software. Google uses ClusterFuzz to fuzz all

Google 4.9k Jan 08, 2023
CVE-2021-22005 - VMWare vCenter Server File Upload to RCE

CVE-2021-22005 - VMWare vCenter Server File Upload to RCE Analyze Usage ------------------------------------------------------------- [*] CVE-2021-220

r0cky 224 Aug 05, 2022
Small python script to look for common vulnerabilities on SMTP server.

BrokenSMTP BrokenSMTP is a python3 BugBounty/Pentesting tool to look for common vulnerabilities on SMTP server. Supported Vulnerability : Spoofing - T

39 Dec 16, 2022
CVE-2021-21972

CVE-2021-21972 % python3 /tmp/CVE_2021_21972.py -i /tmp/urls.txt -n 8 -e [*] Creating tmp.tar containing ../../../../../home/vsphere-ui/.ssh/authoriz

Keith Lee 30 Nov 19, 2022
Notebooks, slides and dataset of the CorrelAid Machine Learning Winter School

CorrelAid Machine Learning Spring School Welcome to the CorrelAid ML Spring School! In this repository you can find the slides and other files for the

CorrelAid 12 Nov 23, 2022
Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.

CVE-2021-24086 This is a proof of concept for CVE-2021-24086 ("Windows TCP/IP Denial of Service Vulnerability "), a NULL dereference in tcpip.sys patc

Axel Souchet 220 Dec 14, 2022
S2-062 (CVE-2021-31805) / S2-061 / S2-059 RCE

CVE-2021-31805 Remote code execution S2-062 (CVE-2021-31805) Due to Apache Struts2's incomplete fix for S2-061 (CVE-2020-17530), some tag attributes c

warin9 31 Nov 22, 2022
:closed_lock_with_key: multi factor authentication system (2FA, MFA, OTP Server)

privacyIDEA privacyIDEA is an open solution for strong two-factor authentication like OTP tokens, SMS, smartphones or SSH keys. Using privacyIDEA you

1.3k Jan 03, 2023
VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit

Vortex VPN Overall Reconnaissance, Testing, Enumeration and Exploitation Toolkit Overview A very simple Python framework, inspired by SprayingToolkit,

315 Dec 28, 2022
A Python r2pipe script to automatically create a Frida hook to intercept TLS traffic for Flutter based apps

boring-flutter A Python r2pipe script to automatically create a Frida hook to intercept TLS traffic for Flutter based apps. Currently only supporting

Hamza 64 Oct 18, 2022
pwncat module that automatically exploits CVE-2021-4034 (pwnkit)

pwncat_pwnkit Introduction The purpose of this module is to attempt to exploit CVE-2021-4034 (pwnkit) on a target when using pwncat. There is no need

Dana Epp 33 Jul 01, 2022
This exploit allows to connect to the remote RemoteMouse 3.008 service to virtually press arbitrary keys and execute code on the machine.

RemoteMouse-3.008-Exploit The RemoteMouse application is a program for remotely controlling a computer from a phone or tablet. This exploit allows to

Podalirius 25 Dec 04, 2022
✨ Powerfull & Universal Link Bypasser ✨

✨ Powerfull & Universal Link Bypasser ✨

Vodkarm06 4 Jun 03, 2022
Apache Flink 目录遍历漏洞批量检测 (CVE-2020-17519)

使用方法&免责声明 该脚本为Apache Flink 目录遍历漏洞批量检测 (CVE-2020-17519)。 使用方法:Python CVE-2020-17519.py urls.txt urls.txt 中每个url为一行,漏洞地址输出在vul.txt中 影响版本: Apache Flink 1

45 Sep 21, 2022