dotgpg Logo

dotgpg

0
Free
Updated 11 March 2025
Visit Website

dotgpg is a tool for backing up and versioning your production secrets or shared passwords securely and easily. Getting started If you're a ruby developer, you know the drill. Either gem install dotgpg or add gem "dotgpg" to your Gemfile. There are also instructions for use without ruby. Mac OS X brew install gpg sudo gem install dotgpg Ubuntu sudo apt-get install ruby1.9 sudo gem install dotgpg RedHat/CentOS sudo yum install ruby ruby-devel sudo gem install dotgpg Usage dotgpg init To get started run dotgpg init. Unless you've used GPG before, it will prompt you for a new passphrase. You should make this passphrase as secure as your SSH passphrase, i.e. 12-20 characters and not just letters. $ dotgpg init Creating a new GPG key: Conrad Irwin <conrad.irwin@gmail.com> Passphrase: Passphrase confirmation: dotgpg edit To create or edit files, just use dotgpg edit. I recommend you use the .gpg suffix so that other tools know what these files contain. $ dotgpg edit production.gpg [ opens your $EDITOR ] dotgpg create To create an encrypted file from piped input, use dotgpg create. I recommend you use the .gpg suffix so that other tools know what these files contain. $ echo foo | dotgpg create

FEATURES

SIMILAR TOOLS

A reverse proxy solution that provides data access control, monitoring, and security policy enforcement for databases and APIs within organization's infrastructure.

Commercial

Helm plugin for cryptographically signing and verifying charts with GnuPG integration.

Red October is a software-based two-man rule style encryption and decryption server.

A tool for xor analysis to guess key length and key based on most frequent characters.

A security solution that monitors, detects, and responds to insider threats by providing visibility into user activities across endpoints, email, and cloud to prevent data loss from careless, compromised, or malicious insiders.

Commercial

A tool for creating cryptographically strong volumes that destroy themselves upon tampering or via issued command.

A steganographic file system in userspace for plausible deniability of files.

Hide data in images while maintaining perceptual similarity and extract it from printed and photographed images.

A cloud-native data security platform that provides data access governance, monitoring, masking, classification, and encryption capabilities with specialized integration for Snowflake environments.

Commercial
CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved