pick alternatives

Looking for an alternative tool to replace pick? During the review of pick we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.

Top 3

  1. TeamVault (team-based password manager)
  2. BlackBox (store secrets in Git/Mercurial/Subversion)
  3. Vault (storage of secrets)

These tools are ranked as the best alternatives to pick.

Alternatives (by score)

64

TeamVault

Introduction

Storing passwords within a team security can be a challenging task. TeamVault is a password manager with the goal to be easy to use, flexible, and adhering to several security principles. These include a solid base for the data encryption, support for folders, and role-based access control (RBAC).

Project details

TeamVault is written in Python.

Strengths and weaknesses

  • + The source code of this software is available
  • - No releases on GitHub available

Typical usage

  • Password management
  • Secrets management

TeamVault review

68

BlackBox

Introduction

Typically you do not want to store any secrets in a software repository or version control system repository. However when there is still a need to give people access to sensitive parts, then BlackBox helps to do this in a more secure way.

Project details

BlackBox is written in shell script.

Strengths and weaknesses

  • + More than 50 contributors
  • + More than 4000 GitHub stars
  • + The source code of this software is available

    Typical usage

    • Password management
    • Secure storage

    BlackBox review

    97

    Vault

    Introduction

    Vault is a secret management tool created by HashiCorp. It allows storing secrets, such as key/value pairs, AWS IAM/STS credentials, SQL/NoSQL databases, X.509 certificates, SSH credentials, and other sensitive details. These secrets are typically used by software components and scripts. The benefit of using a secret management tool is that they no longer need to be stored in configuration files. Main features include leasing, key revocation, key rolling, and auditing.

    Project details

    Vault is written in Golang.

    Strengths and weaknesses

    • + More than 500 contributors
    • + More than 9000 stars
    • + The source code of this software is available

      Typical usage

      • Password management
      • Secrets management
      • Secure storage

      Vault review

      100

      KeeWeb

      Introduction

      Password managers help to store sensitive data. This may include passwords, secret questions with their answers, or other private information.

      Project details

      KeeWeb is written in JavaScript.

      Strengths and weaknesses

      • + More than 25 contributors
      • + More than 6000 GitHub stars
      • + Many releases available
      • + The source code of this software is available
      • - Full name of author is unknown

      Typical usage

      • Password management

      KeeWeb review

      100

      Buttercup for desktop

      Introduction

      The typical users have at least a multitude of ten when it comes to passwords. Ensuring that every website has a unique password and remembering, is almost impossible. Passwords managers like Buttercup help with the generation and secure storage of these secrets. It is freely available and open source, making it a good alternative for commercial options.

      Project details

      Buttercup for desktop is written in Node.js.

      Strengths and weaknesses

      • + More than 10 contributors
      • + More than 1000 GitHub stars
      • + The source code of this software is available

        Typical usage

        • Password management

        Buttercup for desktop review

        64

        Aletheia

        Introduction

        Aletheia is a project to manage secrets in Google Cloud with CloudKMS and Cloud Storage. It can be used to store sensitive data like authentication details.

        Project details

        Aletheia is written in Python.

        Strengths and weaknesses

        • + The source code of this software is available
        • - Minimal or no documentation available
        • - No releases on GitHub available

        Typical usage

        • Data security
        • Secure storage

        Aletheia review

        89

        Confidant

        Introduction

        Most applications with a connection to a database or other software component, need some form of authentication. Often the related credentials are stored in a configuration file. A secret manager like Confidant will provide an alternative, by storing the details in a database. Only applications that need to access the secrets are allowed to obtain them. Often system administrators are denied access to them.

        Project details

        Confidant is written in Python.

        Strengths and weaknesses

        • + More than 1000 GitHub stars
        • + The source code of this software is available
        • + Supported by a large company

          Typical usage

          • Secrets management
          • Secure storage

          Confidant review

          63

          KeePassX

          Introduction

          The database is encrypted with AES (alias Rijndael) or Twofish encryption algorithm using a 256-bit key. KeePassX uses a database format that is compatible with KeePass Password Safe.

          Project details

          KeePassX is written in C++.

          Strengths and weaknesses

          • + The source code of this software is available
          • + Well-known tool
          • - Full name of author is unknown

          Typical usage

          • Secure storage

          KeePassX review

          48

          pass (password-store)

          Introduction

          The pass utility is also known as password-store. It uses GPG and Unix directories to store passwords and others secrets.

          Project details

          96

          KeePassXC

          Introduction

          KeePassXC is a cross-platform platform to store sensitive data like passwords, keys, and other secrets. It has a graphical user interface and is written in C++.

          Project details

          KeePassXC is written in C++.

          Strengths and weaknesses

          • + More than 50 contributors
          • + Runs on multiple platforms
          • + More than 1000 GitHub stars
          • + The source code of this software is available

            Typical usage

            • Password management
            • Secure storage

            KeePassXC review

            76

            LaZagne

            Introduction

            The LaZagne tool can be a good addition to the toolkit of pentesters or forensic specialists to recover sensitive details from systems. For a pentester, this typically means that limited access has been gained. By trying to find passwords from local applications, the step to other applications or privilege level might be possible. For example, a password that is shared among multiple services, or even finding an administrator password.

            Project details

            LaZagne is written in Python.

            Strengths and weaknesses

            • + More than 10 contributors
            • + More than 3000 GitHub stars
            • + The source code of this software is available

              Typical usage

              • Data extraction
              • Information gathering
              • Password discovery
              • Password recovery

              LaZagne review

              60

              Passmgr

              Introduction

              Passmgr is a simple portable password manager written in Go. It helps with storing secrets, like passwords and API keys.

              Project details

              60

              pshtt

              Introduction

              Pshtt was developed to push organizations, including government departments, to adopt HTTPS across the enterprise.

              Project details

              pshtt is written in Python.

              Strengths and weaknesses

              • + More than 500 GitHub stars
              • + The source code of this software is available

                Typical usage

                • Security assessment
                • Web application analysis

                pshtt review

                74

                SpiderFoot

                Introduction

                SpiderFoot can be used offensively during penetration tests, or defensively to learn what information is available about your organization.

                Project details

                SpiderFoot is written in Python.

                Strengths and weaknesses

                • + The source code of this software is available

                  Typical usage

                  • Information gathering

                  SpiderFoot review

                  70

                  Viper

                  Introduction

                  Viper organizes the malware samples and exploits you found over time. It calls itself "Metasploit for malware researchers". Viper has a terminal interface to store, search and analyze files. As it is a framework, is also allows you to create your plugins.

                  Project details

                  56

                  AESKeyFinder

                  Introduction

                  AESKeyFinder uses various algorithms to perform entropy tests and filter out blocks that are not AES keys. The remaining blocks are then displayed as possible AES keys.

                  Project details

                  Strengths and weaknesses

                  • + The source code of this software is available
                  • - No proper description on website
                  • - No updates for a while

                  Typical usage

                  • Data extraction

                  AESKeyFinder review

                  74

                  git-crypt

                  Introduction

                  This tools allows you to store your secrets (such as keys or passwords) in the same repository as your code.

                  Project details

                  git-crypt is written in C++.

                  Strengths and weaknesses

                  • + More than 10 contributors
                  • + More than 3000 GitHub stars
                  • + The source code of this software is available

                    Typical usage

                    • Data encryption

                    git-crypt review

                    74

                    OpenSSL

                    Introduction

                    This popular toolkit is used by many systems. It provides options like encryption and hashing of data, integrity testing, and digital certificates and signatures. Many software applications use the toolkit to provide support for these functions. OpenSSL also has a client utility that can be used on the command line to test, decrypt and encrypt data, and create certificates.

                    Project details

                    OpenSSL is written in C.

                    Strengths and weaknesses

                    • + The source code of this software is available
                    • + Well-known library
                    • - Major vulnerabilities in the past

                    Typical usage

                    • Certificate management
                    • Data encryption

                    OpenSSL review

                    96

                    testssl.sh

                    Introduction

                    Key features of testssl.sh include:

                    • Clear output: you can tell easily whether anything is good or bad
                    • Ease of installation: It works for Linux, Darwin, FreeBSD, NetBSD and MSYS2/Cygwin out of the box: no need to install or configure something, no gems, CPAN, pip or the like.
                    • Flexibility: You can test any SSL/TLS enabled and STARTTLS service, not only webservers at port 443
                    • Toolbox: Several command line options help you to run YOUR test and configure YOUR output
                    • Reliability: features are tested thoroughly
                    • Verbosity: If a particular check cannot be performed because of a missing capability on your client side, you'll get a warning
                    • Privacy: It's only you who sees the result, not a third party
                    • Freedom: It's 100% open source. You can look at the code, see what's going on and you can change it.

                    Project details

                    testssl.sh is written in shell script.

                    Strengths and weaknesses

                    • + Used language is shell script
                    • + The source code of this software is available

                      Typical usage

                      • Application testing
                      • Configuration audit

                      testssl.sh review

                      85

                      hashcat

                      Introduction

                      Hashcat can be used to discover lost passwords, or as part of a security assignment. For example, it could be trying to crack a password from a password file that was obtained during a penetration test.

                      Project details

                      hashcat is written in C.

                      Strengths and weaknesses

                      • + More than 25 contributors
                      • + More than 4000 GitHub stars
                      • + The source code of this software is available
                      • + Well-known tool

                        Typical usage

                        • Password discovery

                        hashcat review

                        56

                        John the Ripper

                        Introduction

                        John the Ripper is a mature password cracker to find weak or known passwords. It works on Linux and other flavors of Unix and Microsoft Windows.

                        Project details

                        81

                        mimipenguin

                        Introduction

                        The tool requires root permissions to work.

                        Project details

                        mimipenguin is written in Python, shell script.

                        Strengths and weaknesses

                        • + The source code of this software is available
                        • - No releases on GitHub available
                        • - Full name of author is unknown

                        Typical usage

                        • Information gathering
                        • Security assessment

                        mimipenguin review

                        64

                        mimipy

                        Introduction

                        The mimipy tool is based on the work of mimipenguin and ported to Python. It can extract passwords from memory or overwrite them to prevent capture.

                        Project details

                        mimipy is written in Python.

                        Strengths and weaknesses

                        • + The source code of this software is available

                          Typical usage

                          • Data extraction
                          • Information gathering
                          • Security assessment

                          mimipy review

                          60

                          not24get

                          Introduction

                          API: pwdCheckModule object in ppolicy.
                          Executable: "check password script" in Samba suite (not24get_check)

                          This module is a wrapper around libpasswdqc, the library that powers the pam_passwdqc module.

                          Project details

                          not24get is written in C.

                          Strengths and weaknesses

                          • + The source code of this software is available

                            Typical usage

                            • Password strength testing

                            not24get review

                            60

                            PassGen

                            Introduction

                            PassGen is a tool to help with password dictionary attacks to guess a password. It does not perform the attack but creates the related database.

                            Project details

                            PassGen is written in Python.

                            Strengths and weaknesses

                            • + The source code of this software is available

                              Typical usage

                              • Password discovery
                              • Password strength testing
                              • Security assessment

                              PassGen review

                              Some relevant tool missing as an alternative to pick? Please contact us with your suggestion.