better repeatable password generation
passacre = password massacre (i.e. what happens when you use the same password on every site)
I really love supergenpass, but the implementation leaves some things to be desired. feverish (and possibly delirious), I hacked up a little proof-of-concept thing.
the gist of it is that passacre uses the Keccak sponge function to repeatably derive a value from your master password and a site name, and then encodes that value using a password schema (since different sites have different (and terrible) password requirements).
also, it’s ISC-licensed!
every user-facing part of this sucks right now, but it’s a work-in-progress.
docs coming soon!!
Release history Release notifications | RSS feed
|Filename, size||File type||Python version||Upload date||Hashes|
|Filename, size passacre-0.13.0.0.a2.tar.gz (7.3 kB)||File type Source||Python version None||Upload date||Hashes View|