SecurePassManager is a robust, command-line password manager and two-factor authenticator (TOTP) designed with security and ease of use in mind. It provides a secure solution for managing passwords and 2FA tokens locally, ensuring your sensitive data remains protected and easily accessible.
- Features
- Requirements
- Installation
- Usage
- Security
- Project Structure
- Contribution
- License
- Disclaimer
- Support
- Acknowledgments
- Secure Password Management:
- AES-256 encryption for all stored data
- Add, retrieve, edit, and delete password entries
- Search functionality for quick access to stored credentials
- Two-Factor Authentication (TOTP):
- Generate TOTP codes for 2FA-enabled accounts
- Add and manage TOTP secrets
- Data Portability:
- Import and export password data securely
- User-Friendly CLI: Intuitive command-line interface for all operations
- Master Password Protection: Single point of access secured by a master password
- Local Storage: All data stored locally for maximum privacy
- GCC compiler (version 7.5.0 or higher)
- OpenSSL library (version 1.1.1 or higher)
- liboath library (version 2.6.2 or higher)
- POSIX-compliant operating system (Linux, macOS, etc.)
Ensure you have the required libraries installed:
sudo apt-get install build-essential libssl-dev oathtool liboath0 liboath-dev
brew install gcc openssl oath-toolkit
sudo pacman -S gcc openssl oath-toolkit
-
Clone the repository:
git clone https://github.com/fam007e/SecurePasswd_MGMT.git cd SecurePasswd_MGMT
-
Compile the project:
make
The compiled binary securepass
will be created in the project root directory.
Run the program:
./securepass
Follow the on-screen prompts to:
- Set up your master password (on first run)
- Add new passwords or TOTP accounts
- Retrieve stored passwords
- Generate TOTP codes
- Import or export password data
- Encryption: AES-256 encryption for all stored data
- Key Derivation: PBKDF2 with SHA-256 for secure key derivation from the master password
- Memory Protection: Sensitive data is securely wiped from memory after use
- No Network Access: All operations are performed locally without internet connectivity
For a detailed security analysis, see our Security Policy.
SecurePasswd_MGMT
├── CONTRIBUTION.md
├── data
│ └── README.md
├── lib
│ ├── liboath
│ │ └── oath.h
│ └── README.md
├── LICENSE
├── Makefile
├── README.md
├── SECURITY.md
└── src
├── csv_handler.c
├── csv_handler.h
├── encryption.c
├── encryption.h
├── main.c
├── totp.c
├── totp.h
├── utils.c
├── utils.h
└── version.h
We welcome contributions to SecurePassManager! Please read our Contribution Guidelines for details on our code of conduct and the process for submitting pull requests.
This project is licensed under the MIT License - see the LICENSE file for details.
While SecurePassManager is designed with security as a top priority, no system can guarantee absolute security. Users are responsible for maintaining the confidentiality of their master password and for any risks associated with storing sensitive information.
For bug reports, feature requests, or general requests:
- Search existing Issues on GitHub
- Open a new issue if your question remains unanswered
- OpenSSL for cryptographic operations
- liboath for TOTP functionality
- All contributors who have helped improve this project
Thank you for choosing SecurePassManager. Your security is our priority!