LaZagne alternatives

Looking for an alternative tool to replace LaZagne? During the review of LaZagne we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.

Top 3

  1. Bucket Stream (AWS S3 bucket discovery using CT logs)
  2. sshLooter (PAM backdoor for SSH)
  3. Buttercup for desktop (cross-platform password manager)

These tools are ranked as the best alternatives to LaZagne.

Alternatives (by score)

64

Bucket Stream

Introduction

Bucket Stream can be used to discover AWS S3 buckets. This tool may be helpful during reconnaissance and security assessments. As it does not include active scanning on the target itself, it is a passive way of finding information. This is a huge benefit, as you don't have to guess or brute-force the names.

Project details

Bucket Stream is written in Python.

Strengths and weaknesses

  • + Tool is easy to use
  • + The source code of this software is available
  • - No releases on GitHub available

Typical usage

  • Discovery of sensitive information
  • Information leak detection
  • Penetration testing
  • Reconnaissance

Bucket Stream review

56

sshLooter

Introduction

The most likely use for tools like this is backdoor a system after root permissions were gained. By planting it into the PAM stack, it allows for password sniffing.

Project details

sshLooter is written in Python, shell script.

Strengths and weaknesses

  • + The source code is easy to read and understand
  • - Unknown project license

Typical usage

  • Information snooping
  • Password discovery
  • Password sniffing

sshLooter review

100

Buttercup for desktop

Introduction

The typical users have at least a multitude of ten when it comes to passwords. Ensuring that every website has a unique password and remembering, is almost impossible. Passwords managers like Buttercup help with the generation and secure storage of these secrets. It is freely available and open source, making it a good alternative for commercial options.

Project details

Buttercup for desktop is written in Node.js.

Strengths and weaknesses

  • + More than 10 contributors
  • + More than 1000 GitHub stars
  • + The source code of this software is available

    Typical usage

    • Password management

    Buttercup for desktop review

    63

    KeePassX

    Introduction

    The database is encrypted with AES (alias Rijndael) or Twofish encryption algorithm using a 256-bit key. KeePassX uses a database format that is compatible with KeePass Password Safe.

    Project details

    KeePassX is written in C++.

    Strengths and weaknesses

    • + The source code of this software is available
    • + Well-known tool
    • - Full name of author is unknown

    Typical usage

    • Secure storage

    KeePassX review

    48

    pass (password-store)

    Introduction

    The pass utility is also known as password-store. It uses GPG and Unix directories to store passwords and others secrets.

    Project details

    81

    pick

    Introduction

    Tools like pick are used to store passwords and secrets safely.

    Project details

    pick is written in Golang.

    Strengths and weaknesses

    • + Very low number of dependencies
    • + The source code of this software is available

      Typical usage

      • Data security
      • Secure storage

      pick review

      64

      TeamVault

      Introduction

      Storing passwords within a team security can be a challenging task. TeamVault is a password manager with the goal to be easy to use, flexible, and adhering to several security principles. These include a solid base for the data encryption, support for folders, and role-based access control (RBAC).

      Project details

      TeamVault is written in Python.

      Strengths and weaknesses

      • + The source code of this software is available
      • - No releases on GitHub available

      Typical usage

      • Password management
      • Secrets management

      TeamVault review

      96

      Confidant

      Introduction

      Most applications with a connection to a database or other software component, need some form of authentication. Often the related credentials are stored in a configuration file. A secret manager like Confidant will provide an alternative, by storing the details in a database. Only applications that need to access the secrets are allowed to obtain them. Often system administrators are denied access to them.

      Project details

      Confidant is written in Python.

      Strengths and weaknesses

      • + More than 1000 GitHub stars
      • + The source code of this software is available
      • + Supported by a large company

        Typical usage

        • Secrets management
        • Secure storage

        Confidant review

        93

        hashcat

        Introduction

        Hashcat can be used to discover lost passwords, or as part of a security assignment. For example, it could be trying to crack a password from a password file that was obtained during a penetration test.

        Project details

        hashcat is written in C.

        Strengths and weaknesses

        • + More than 25 contributors
        • + More than 4000 GitHub stars
        • + The source code of this software is available
        • + Well-known tool

          Typical usage

          • Password discovery

          hashcat review

          56

          John the Ripper

          Introduction

          John the Ripper is a mature password cracker to find weak or known passwords. It works on Linux and other flavors of Unix and Microsoft Windows.

          Project details

          97

          KeePassXC

          Introduction

          KeePassXC is a cross-platform platform to store sensitive data like passwords, keys, and other secrets. It has a graphical user interface and is written in C++.

          Project details

          KeePassXC is written in C++.

          Strengths and weaknesses

          • + More than 50 contributors
          • + Runs on multiple platforms
          • + More than 1000 GitHub stars
          • + The source code of this software is available

            Typical usage

            • Password management
            • Secure storage

            KeePassXC review

            56

            mimipenguin

            Introduction

            The tool requires root permissions to work.

            Project details

            mimipenguin is written in Python, shell script.

            Strengths and weaknesses

            • + The source code of this software is available
            • - No releases on GitHub available
            • - Full name of author is unknown

            Typical usage

            • Information gathering
            • Security assessment

            mimipenguin review

            64

            mimipy

            Introduction

            The mimipy tool is based on the work of mimipenguin and ported to Python. It can extract passwords from memory or overwrite them to prevent capture.

            Project details

            mimipy is written in Python.

            Strengths and weaknesses

            • + The source code of this software is available

              Typical usage

              • Data extraction
              • Information gathering
              • Security assessment

              mimipy review

              60

              not24get

              Introduction

              API: pwdCheckModule object in ppolicy.
              Executable: "check password script" in Samba suite (not24get_check)

              This module is a wrapper around libpasswdqc, the library that powers the pam_passwdqc module.

              Project details

              not24get is written in C.

              Strengths and weaknesses

              • + The source code of this software is available

                Typical usage

                • Password strength testing

                not24get review

                60

                PassGen

                Introduction

                PassGen is a tool to help with password dictionary attacks to guess a password. It does not perform the attack but creates the related database.

                Project details

                PassGen is written in Python.

                Strengths and weaknesses

                • + The source code of this software is available

                  Typical usage

                  • Password discovery
                  • Password strength testing
                  • Security assessment

                  PassGen review

                  60

                  Passmgr

                  Introduction

                  Passmgr is a simple portable password manager written in Go. It helps with storing secrets, like passwords and API keys.

                  Project details

                  60

                  pass-rotate

                  Introduction

                  This tool makes it easier to rotate your passwords one at a time or in bulk. For example, when security events or as a routine to do a regular rotation of passwords.

                  Project details

                  pass-rotate is written in Python.

                  Strengths and weaknesses

                  • + The source code of this software is available

                    Typical usage

                    • Password management

                    pass-rotate review

                    100

                    THC Hydra (thc-hydra)

                    Introduction

                    THC Hydra is a brute-force cracking tool for remote authentication services. It supports many protocols, including telnet, FTP, LDAP, SSH, SNMP, and others.

                    Project details

                    THC Hydra is written in C.

                    Strengths and weaknesses

                    • + More than 25 contributors
                    • + More than 1000 GitHub stars
                    • + Project is mature (10+ years)
                    • + The source code of this software is available

                      Typical usage

                      • Penetration testing
                      • Security assessment

                      THC Hydra review

                      64

                      Aletheia

                      Introduction

                      Aletheia is a project to manage secrets in Google Cloud with CloudKMS and Cloud Storage. It can be used to store sensitive data like authentication details.

                      Project details

                      Aletheia is written in Python.

                      Strengths and weaknesses

                      • + The source code of this software is available
                      • - Minimal or no documentation available
                      • - No releases on GitHub available

                      Typical usage

                      • Data security
                      • Secure storage

                      Aletheia review

                      76

                      BlackBox

                      Introduction

                      Typically you do not want to store any secrets in a software repository or version control system repository. However when there is still a need to give people access to sensitive parts, then BlackBox helps to do this in a more secure way.

                      Project details

                      BlackBox is written in shell script.

                      Strengths and weaknesses

                      • + More than 50 contributors
                      • + More than 4000 GitHub stars
                      • + The source code of this software is available

                        Typical usage

                        • Password management
                        • Secure storage

                        BlackBox review

                        60

                        Gitrob

                        Introduction

                        Especially open source developers may share their code in a public repository like GitHub. This is a great way to collaborate between the developer(s) and the community. The risk of sharing code is that sensitive data is part of the repository and uploaded by accident. GitRob helps to detect this kind of accidental leaks.

                        Project details

                        Gitrob is written in Ruby.

                        Strengths and weaknesses

                        • + More than 1000 GitHub stars
                        • + The source code of this software is available

                          Typical usage

                          • Data leak prevention
                          • Information gathering
                          • Penetration testing
                          • Security assessment

                          Gitrob review

                          97

                          Vault

                          Introduction

                          Vault is a secret management tool created by HashiCorp. It allows storing secrets, such as key/value pairs, AWS IAM/STS credentials, SQL/NoSQL databases, X.509 certificates, SSH credentials, and other sensitive details. These secrets are typically used by software components and scripts. The benefit of using a secret management tool is that they no longer need to be stored in configuration files. Main features include leasing, key revocation, key rolling, and auditing.

                          Project details

                          Vault is written in Golang.

                          Strengths and weaknesses

                          • + More than 500 contributors
                          • + More than 9000 stars
                          • + The source code of this software is available

                            Typical usage

                            • Password management
                            • Secrets management
                            • Secure storage

                            Vault review

                            Some relevant tool missing as an alternative to LaZagne? Please contact us with your suggestion.