pwmaker
v1.0.0
Published
Node Password Maker. Creates passwords from a hash of a master password and a unique string
Downloads
2
Maintainers
Readme
pw-manager
Creates passwords based on a master password and a unique string
It's really a password maker, not a manager, but if you can remember the master password and the unique name you used (usually a url or domain), it should give you the same output every time.
For the strongest results use the binary encoding (if you're not worried about compatibility with databases).
It results in passwords like this: éf*/Ê®²1újq!
According to howsecureismypassword.net , it would take 2 quintillion years to crack
How to Use:
Examples
$ pwmaker MyMas7erP@ssw0rd google.com
Prints out a password to the command line that is a hash of the master password (MyMas7erP@ssw0rd) and the name (google.com)
$ pwmaker -l 8 MyMas7erP@ssw0rd google.com
Prints out a password with a maximum length of 8
$ pwmaker -a sha256 MyMas7erP@ssw0rd google.com
Uses the sha256 hashing algorithm - usually prints out longer passwords
$ pwmaker -s mySuffix MyMas7erP@ssw0rd google.com
Appends the suffix to the end of the hashed password
$ pwmaker -e binary MyMas7erP@ssw0rd google.com
Uses a binary encoding
Node Password Maker.
Usage:
pwmaker [options] <master> <name>
pwmaker -h | --help
pwmaker --version
Options:
| Command | Description |
|------------------------------------------------------------------------|------------------------------------------------------|
| -h --help
| Show the help screen.
| --version
| Show version.
| --HMAC
| Uses HMAC.
| -l --length <number>
| The maximum length of the hashed password (doesn't account for prefix and suffix).
| -e --encoding <encoding>
(one of hex, binary, base64) | The digest encoding to be used [default: base64]. |
| -a --algorithm <algorithm>
(one of md5, sha1, sha256, sha512, whirlpool) | Hashing algorithm to be used [default: md5].
| -s --suffix <suffix>
| Password Suffix.
| -p --prefix <prefix>
| Password Prefix.