Jumblar is a tool that converts map coordinates into passwords. It hopes to provide increased user security by assuming that it is easier for people to remember a secret location than a strong password, and that a location that could be anywhere in the world is practically impossible for others to guess. By using this property of secret locations, secure passwords can be generated. SCrypt is used to protect user information.
file2password is a utility that allows you to select a file (picture, document, music, etc.) and generate a secure password based on it. This means that there is no need to remember any password - just a picture or a filename. It is small (2 KB plus CSS), highly secure as it does not upload or shows the file used, supports drag and drop, can use online storage, and requires no server-side scripting.
CryptSharp provides a number of password crypt algorithms: BCrypt, MD5 (and Apache's htpasswd variant), PHPass (WordPress, phpBB, Drupal), SHA256, SHA512, and Traditional and Extended DES. It also includes Blowfish, SCrypt, and PBKDF2 for any HMAC (.NET's built-in PBKDF2 implementation supports only SHA-1). If you are looking to store passwords, odds are CryptSharp will have the algorithm you want.
SSAM (Spyshakers Account Manager) is a script that manages and protects online accounts. Passwords are encrypted and stored in a MySQL database. The encryption keys are not stored. Multiple accounts can be created under one installation. Folders of passwords can be pushed between accounts on the system. Security tools are built in to help protect accounts from spyware, key loggers, and screen capture devices. SSAM is perfect for Web masters and small businesses who need to manage their online accounts and keep them organized between founders, co-workers, or outsourced help.
pysrp is a Python module that provides an implementation of the Secure Remote Password protocol (SRP), a cryptographically strong authentication protocol for password-based, mutual authentication over an insecure network connection. Unlike other common challenge-response autentication protocols, such as Kerberos and SSL, SRP does not rely on an external infrastructure of trusted key servers or certificate management. Instead, SRP server applications use verification keys derived from each user's password to determine the authenticity of a network connection.
The OATH Toolkit makes it easy to build one-time password authentication systems. It contains shared libraries, commandline tools, and a PAM module. Supported technologies include the event-based HOTP algorithm (RFC4226) and the time-based TOTP algorithm (RFC6238). OATH stands for Open AuTHentication, which is the organization which specifies the algorithms. For managing secret key files, the Portable Symmetric Key Container (PSKC) format described in RFC6030 is supported.
The te-edu Password Meter class can be used to check whether a password is strong enough to not be guessed easily. It can perform several tests on a given password string to compute a score that represents the strength of a password. Password checking is based on brute force attack class A and considers 10 million password checks in one minute. It checks characters, character pairs, repeated characters, time needed to be discovered, character standard entropy, etc.
Keynesis Lockngo is a security application that runs directly from a portable drive. Lockngo encrypts and password-protects data against loss or theft. When protected, the drive appears empty (data is hidden) and will not allow new data to be written onto it. Lockngo has Military Grade 256-bit AES Encryption, FIPS 140-2 Certified. Lockngo also comes in a cross-platform version for Mac and Windows. This version allows you to lock a drive on a Macintosh and open it on a computer running Windows and vice versa.