dotgpg is a tool for backing up and versioning your production secrets or shared passwords securely and easily. Getting started If you're a ruby developer, you know the drill. Either gem install dotgpg or add gem "dotgpg" to your Gemfile. There are also instructions for use without ruby. Mac OS X brew install gpg sudo gem install dotgpg Ubuntu sudo apt-get install ruby1.9 sudo gem install dotgpg RedHat/CentOS sudo yum install ruby ruby-devel sudo gem install dotgpg Usage dotgpg init To get started run dotgpg init. Unless you've used GPG before, it will prompt you for a new passphrase. You should make this passphrase as secure as your SSH passphrase, i.e. 12-20 characters and not just letters. $ dotgpg init Creating a new GPG key: Conrad Irwin <conrad.irwin@gmail.com> Passphrase: Passphrase confirmation: dotgpg edit To create or edit files, just use dotgpg edit. I recommend you use the .gpg suffix so that other tools know what these files contain. $ dotgpg edit production.gpg [ opens your $EDITOR ] dotgpg create To create an encrypted file from piped input, use dotgpg create. I recommend you use the .gpg suffix so that other tools know what these files contain. $ echo foo | dotgpg create
FEATURES
ALTERNATIVES
A tool for breaking crypto and identifying weak cryptosystems, with a humorous name and a separate library called Cryptanalib.
A data security and governance platform that provides automated discovery, classification, and protection of sensitive data across cloud, on-premises, and hybrid environments.
A network-based panic button to overwrite LUKS header and shutdown the computer in emergencies, making data recovery impossible.
A reverse proxy solution that provides data access control, monitoring, and security policy enforcement for databases and APIs within organization's infrastructure.
A Docker image with tools for solving Steganography challenges and screening scripts for analyzing files.
PINNED

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

PTJunior
An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.

CTIChef.com Detection Feeds
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.