Skip to main content

better repeatable password generation

Project description

passacre = password massacre (i.e. what happens when you use the same password on every site)

hi!!

I really love supergenpass, but the implementation leaves some things to be desired. feverish (and possibly delirious), I hacked up a little proof-of-concept thing.

the gist of it is that passacre uses the Keccak sponge function to repeatably derive a value from your master password and a site name, and then encodes that value using a password schema (since different sites have different (and terrible) password requirements).

also, it’s ISC-licensed!

every user-facing part of this sucks right now, but it’s a work-in-progress.

docs coming soon!!

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

passacre-0.13.0.0a3.tar.gz (7.4 kB view details)

Uploaded Source

File details

Details for the file passacre-0.13.0.0a3.tar.gz.

File metadata

  • Download URL: passacre-0.13.0.0a3.tar.gz
  • Upload date:
  • Size: 7.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for passacre-0.13.0.0a3.tar.gz
Algorithm Hash digest
SHA256 037208d33d9e3d08df3a4c9af2d1aea9e1935a1a596936848dd5521e6eca1256
MD5 8c051162675e598cde6a402238cb11e4
BLAKE2b-256 4fdc4cdf5f6716ab4e22a78dead82d1fd5bab183784831ac7178dc7d24224a1b

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page