dotgpg is a tool for backing up and versioning your production secrets or shared passwords securely and easily. Getting started If you're a ruby developer, you know the drill. Either gem install dotgpg or add gem "dotgpg" to your Gemfile. There are also instructions for use without ruby. Mac OS X brew install gpg sudo gem install dotgpg Ubuntu sudo apt-get install ruby1.9 sudo gem install dotgpg RedHat/CentOS sudo yum install ruby ruby-devel sudo gem install dotgpg Usage dotgpg init To get started run dotgpg init. Unless you've used GPG before, it will prompt you for a new passphrase. You should make this passphrase as secure as your SSH passphrase, i.e. 12-20 characters and not just letters. $ dotgpg init Creating a new GPG key: Conrad Irwin <conrad.irwin@gmail.com> Passphrase: Passphrase confirmation: dotgpg edit To create or edit files, just use dotgpg edit. I recommend you use the .gpg suffix so that other tools know what these files contain. $ dotgpg edit production.gpg [ opens your $EDITOR ] dotgpg create To create an encrypted file from piped input, use dotgpg create. I recommend you use the .gpg suffix so that other tools know what these files contain. $ echo foo | dotgpg create
FEATURES
ALTERNATIVES
Recoverjpeg is a tool for recovering JPEG images from damaged storage media.
A cloud-based key management service for encrypting and digitally signing data.
A steganographic coder for WAV files that hides data in the LSB portions of each sample.
BleachBit cleans files to free disk space and maintain privacy with various options and command line interface support.
Steghide is a steganography program that hides data in image and audio files.
Microsoft Azure's dedicated HSM for secure key management and cryptographic operations.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.