Clevis is a pluggable framework designed for automated decryption of data and LUKS volumes. The framework operates through a pin-based system where each pin functions as a plugin that implements specific decryption logic. The tool provides command-line functionality for both encryption and decryption operations. For encryption, users can execute commands to encrypt plaintext data into JWE (JSON Web Encryption) format. The decryption process reverses this operation, converting encrypted JWE files back to plaintext. Clevis utilizes a configuration system where JSON objects are passed to pins to establish the necessary parameters for encryption and decryption processes. This approach allows for flexible automation of decryption workflows without requiring manual intervention. The framework supports LUKS volume unlocking, enabling automated access to encrypted storage volumes. This capability is particularly useful in scenarios where automated system boot processes or service initialization requires access to encrypted data without user interaction.
FEATURES
SIMILAR TOOLS
A PHP library that provides secure data encryption capabilities using keys or passwords, designed to minimize implementation errors.
Simple C++ Encryption and Steganography tool for hiding files inside images using LSB encoding.
A versatile steganography tool with various installation options and detailed usage instructions.
A steganographic file system in userspace for plausible deniability of files.
Red October is a TLS-based encryption server that implements two-man rule authorization, requiring multiple users to collaborate for cryptographic operations.
Steganography brute-force utility with performance issues, deprecated in favor of stegseek.
Themis is an open-source cryptographic services library that provides high-level encryption and data protection capabilities for securing data during authentication, storage, messaging, and network exchange.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.