_________ __ .__
\_ ___ \ _______ ___.__.______ _/ |_ ____ _______ |__| ____ __ __ ______
/ \ \/ \_ __ \< | |\____ \ \ __\ / _ \ \_ __ \| | / _ \ | | \ / ___/
\ \____ | | \/ \___ || |_> > | | ( <_> ) | | \/| |( <_> )| | / \___ \
\______ / |__| / ____|| __/ |__| \____/ |__| |__| \____/ |____/ /____ >
\/ \/ |__| \/
- CLI-based encryption for passwords and random data
USAGE:
cryptorious [global options] command [command options] [arguments...]
AUTHOR(S):
Jeff Malnick <malnick@gmail.com>
COMMANDS:
rename Rename an entry in the vault
delete Remove an entry from the cryptorious vault
decrypt Decrypt a value in the vault `VALUE`
encrypt Encrypt a value for the vault `VALUE`
GLOBAL OPTIONS:
--vault-path, --vp "/Users/malnick/.cryptorious/vault.yaml" Path to vault.yaml.
--debug Debug/Verbose log output.
--help, -h show help
--version, -v print the version
NAME:
encrypt - Encrypt a value for the vault `VALUE`
USAGE:
encrypt [command options] [arguments...]
OPTIONS:
--key-arn KMS key ARN
NAME:
cryptorious decrypt - Decrypt a value in the vault `VALUE`
USAGE:
cryptorious decrypt [command options] [arguments...]
OPTIONS:
--copy, -c Copy decrypted password to clipboard automatically
--goto, -g Open your default browser to https://<key_name> and login automatically
--timeout, -t "10" Timeout in seconds for the decrypt session window to expire
NAME:
cryptorious rename - Rename an entry in the vault
USAGE:
cryptorious rename [command options] [arguments...]
OPTIONS:
--old, -o Name of old entry name [key] in vault
--new, -n Name of new entry name [key] in vault
NAME:
generate - Generate a RSA keys or a secure password
USAGE:
generate command [command options] [arguments...]
COMMANDS:
password [--[l]ength] Generate a random password
OPTIONS:
--help, -h show help
Build it and install: make install
Add to your .[bash | zsh | whatever]rc
: alias cpt=cryptorious
NOTE: will add cmd for this soon
In your own AWS account, add a KMS key and grant your IAM user access.
NOTE: will add flag for AWS profile soon
Use your AWS profile and encrypt some data:
AWS_PROFILE=personal cryptorious encrypt --key-arn=<my_kms_key_arn> github.com
Will open a ncurses window and prompt you for username, password and a secure note. All input is optional.
AWS_PROFILE=personal cryptorious decrypt thing
Will open a ncurses window with the decrypted vault entry.
Forgo the the ncurses window and copy the decrypted password stright to the system clipboard?
cryptorious decrypt -[c]opy thing
No printing, just a message that your decrypted password is now available in the paste buffer for your user.
If you've saved your vault entries with the URI of the site they belong to (i.e., ran cryptorious encrypt github.com
...) then you can use the -[g]oto
flag to open your default browser to this URI. Pair it with -[c]opy
and the shorthand for [d]ecrypt
and you'll have a fast way of navigating directly to your desired, secure website (let's also assume you've aliased cpt=cryptorious
):
cpt d -g -c github.com
The generate
command also lets you generate random, secure passwords of n
length:
cryptorious generate password --length 20
(yZkj,GX`w7T4x&TaYyw
This defaults to a length of 15 if you don't pass --[l]ength.