KeePassXC is a cross-platform community-driven port of the Windows application “Keepass Password Safe”.

Overview

KeePassXC

TeamCity Build Status codecov GitHub release

Matrix community channel Matrix development channel

KeePassXC is a modern, secure, and open-source password manager that stores and manages your most sensitive information. You can run KeePassXC on Windows, macOS, and Linux systems. KeePassXC is for people with extremely high demands of secure personal data management. It saves many different types of information, such as usernames, passwords, URLs, attachments, and notes in an offline, encrypted file that can be stored in any location, including private and public cloud solutions. For easy identification and management, user-defined titles and icons can be specified for entries. In addition, entries are sorted into customizable groups. An integrated search function allows you to use advanced patterns to easily find any entry in your database. A customizable, fast, and easy-to-use password generator utility allows you to create passwords with any combination of characters or easy to remember passphrases.

Quick Start

The QuickStart Guide gets you started using KeePassXC on your Windows, macOS, or Linux computer using pre-compiled binaries from the downloads page. Additionally, individual Linux distributions may ship their own versions, so please check your distribution's package list to see if KeePassXC is available. Detailed documentation is available in the User Guide.

Features List

KeePassXC has numerous features for novice and power users alike. Our goal is to create an application that can be used by anyone while still offering advanced features to those that need them.

Basic

  • Create, open, and save databases in the KDBX format (KeePass-compatible with KDBX4 and KDBX3)
  • Store sensitive information in entries that are organized by groups
  • Search for entries
  • Password generator
  • Auto-Type passwords into applications
  • Browser integration with Google Chrome, Mozilla Firefox, Microsoft Edge, Chromium, Vivaldi, Brave, and Tor-Browser
  • Entry icon download
  • Import databases from CSV, 1Password, and KeePass1 formats

Advanced

  • Database reports (password health, HIBP, and statistics)
  • Database export to CSV and HTML formats
  • TOTP storage and generation
  • Field references between entries
  • File attachments and custom attributes
  • Entry history and data restoration
  • YubiKey/OnlyKey challenge-response support
  • Command line interface (keepassxc-cli)
  • Auto-Open databases
  • KeeShare shared databases (import, export, and synchronize)
  • SSH Agent
  • FreeDesktop.org Secret Service (replace Gnome keyring, etc.)
  • Additional encryption choices: Twofish and ChaCha20

For a full list of changes, read the CHANGELOG document.
For a full list of keyboard shortcuts, see KeyboardShortcuts.adoc

Building KeePassXC

Detailed instructions are available in the Build and Install page and in the Wiki.

Contributing

We are always looking for suggestions on how to improve KeePassXC. If you find any bugs or have an idea for a new feature, please let us know by opening a report in the issue tracker on GitHub, or join us on Matrix community channel or Matrix development channel, or on IRC in Libera.Chat channels #keepassxc and #keepassxc-dev.

You may directly contribute your own code by submitting a pull request. Please read the CONTRIBUTING document for further information.

Contributors are required to adhere to the project's Code of Conduct.

License

KeePassXC code is licensed under GPL-2 or GPL-3. Additional licensing for third-party files is detailed in COPYING.

Comments
  • Check passwords against hacked password databases [$300]

    Check passwords against hacked password databases [$300]

    haveibeenpwned.com has an API to check if passwords have been released in a previous dump. They also provide a sha1-hashed download of their password dump at https://haveibeenpwned.com/Passwords . Their API guideline is available here: https://haveibeenpwned.com/API/v2

    Expected Behavior

    Ability to check all or a selection of passwords against a password dump (either downloaded or online)

    Current Behavior

    Currently, KeepassXC does not check against a list of passwords that has been previously compromised.

    Possible Solution (bash)

    #!/usr/bin/env bash
    PASSWORD=('[email protected]' '[email protected]' 'password')
    ONLINE=false
    RELDIR="../pwnedPasswords"
    OFFLINE_DATABASE=("${RELDIR}/pwned-passwords-1.0.txt" "${RELDIR}/pwned-passwords-update-1.txt" "${RELDIR}/pwned-passwords-update-2.txt")
    check() {
    	if ${ONLINE} ; then
    		RESPONSE_POST=$(curl -s -o /dev/null -w "%{http_code}" --data "Password=${1}" "https://haveibeenpwned.com/api/v2/pwnedpassword")
    		sleep 1.6
    		RESPONSE_GET=$(curl -s -o /dev/null -w "%{http_code}" "https://haveibeenpwned.com/api/v2/pwnedpassword/${1}")
    		RESPONSE=${RESPONSE_GET}
    		sleep 1.6
    		if [ ${RESPONSE} -eq 200 ]; then 
    			echo "Bad password: ${1} (GET: ${RESPONSE_GET}, POST: ${RESPONSE_POST})"
    		elif [ ${RESPONSE} -eq 404 ] ; then 
    			echo "Good password: ${1} (GET: ${RESPONSE_GET}, POST: ${RESPONSE_POST})"
    		elif [ ${RESPONSE} -eq 429 ] ; then
    			echo "Too fast (wait >1.5s)"
    		fi
    	else
    		if ! ${2} ; then
    			CHECK=($(echo -n ${i} | sha1sum))
    		else
    			CHECK="${1}"
    		fi
    		LINES=$(cat ${OFFLINE_DATABASE[@]} | grep -i ${CHECK} | wc -l)
    		if [ ${LINES} -gt 0 ] ; then
    			echo "Bad password: ${1}"
    		else
    			echo "Good password: ${1}"
    		fi
    	fi
    }
    
    for i in ${PASSWORD[@]}; do 
    	PASSWORDHASH=($(echo -n ${i} | sha1sum))
    	check ${i} false
    	check ${PASSWORDHASH[0]} true
    done 
    

    Note: Above script checks offline for security (slow). It can be modified to check online for testing.

    Context

    I would like to check for passwords that have been compromised in a breach or set of breaches. I can currently do this manually with a modified version of the above script, but it is cumbersome and not as secure.

    EDIT: echo ${i} -> echo -n ${i} Add note to script that it is meant for proof of concept and can be modified for offline use. Modify script to check offline

    user interface new feature bounty :moneybag: 
    opened by ghost 152
  • KDBX 5 Standard

    KDBX 5 Standard

    Placeholder for KeePass Database (KDBX) standard discussion. This post will be edited to include a list of features and upgrades we would like to bring to Dominik for consideration in the next KDBX format update.

    Must Haves:

    • [ ] Standardize on Argon2id instead of Argon2d
    • [ ] Add Password Modification Datetime
    • [ ] Database/Entry Custom Data modification time
    • [ ] Built-in Entry Layout Specification (https://github.com/keepassxreboot/keepassxc/issues/863#issuecomment-680292058)
    • [ ] Built-in TOTP Specification (otp attribute)
    • [ ] Built-in Hardware Key Specification
    • [ ] Built-in Quick Unlock Specification
    • [ ] Built-in favorites/pinned items
    • [ ] Only support straight binary key files
    • [ ] Multi-valued core and custom fields
    • [ ] Proper storage format for and deduplication of BLOBs (SQLite can handle this)
    • [ ] Transactional edits/global history on database level, not entry level (e.g., to undo deletes or moves and to ensure overall consistency)

    Nice To Haves:

    • [ ] Custom icon naming
    • [ ] Graph instead of tree structure (one item can belong to multiple groups, makes tagging somewhat redundant)

    Optional Extensions: None so far

    Long form discussions should be held here: #5819

    file format EPIC 
    opened by droidmonkey 124
  • KeePassXC 2.5.3 crashes on launch on macOS 10.15.4

    KeePassXC 2.5.3 crashes on launch on macOS 10.15.4

    Expected Behavior

    KeePassXC application opens as normal

    Current Behavior

    Application crashes immediately upon launch. A system dialog is opened (see attached image). Screenshot 2020-03-03 at 21 55 40

    Steps to Reproduce

    1. Upgrade to, or freshly install macOS 10.15.4 beta 3 on a Mac computer
    2. Install KeePassXC by downloading from the keepassxc.org website.
    3. Attempt to open the application.

    Context

    Note that KeePassX runs without problems on this same beta OS.

    Debug Info

    Cannot post output from app as it will not open KeePassXC - 2.5.3 Revision: current release version

    Operating system: macOS 10.15.4 beta 3 CPU architecture: x64 Kernel: Darwin

    Enabled extensions:

    • None (fresh installation)
    platform: macOS 
    opened by grahampugh 101
  • Unable to connect to KeePassXC-Browser

    Unable to connect to KeePassXC-Browser

    I installed official KeePassXC-Browser from https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk

    Current Behavior

    KeePassXC 2.3.0 with KeePassXC browser integration checked. When trying to connect to KeePassXC-Browser, it triggers the KeePassXC window and that's all. The extension shows "Timeout or not connected to KeePassXC". KeePassHTTP is working correctly like previously.

    Debug Info

    KeePassXC - Version 2.3.0 Revision: 4c0ed74

    Libraries:

    • Qt 5.9.3
    • libgcrypt 1.8.2

    Operating system: macOS High Sierra (10.13) CPU architecture: x86_64 Kernel: darwin 17.4.0

    Enabled extensions:

    • Auto-Type
    • Browser Integration
    • Legacy Browser Integration (KeePassHTTP)
    • SSH Agent
    • YubiKey
    feature: Browser 
    opened by gyli 98
  • Integrated Password Analyzer and Health Check [$170]

    Integrated Password Analyzer and Health Check [$170]

    Another point for the wish list: I am looking for an integrated password analysis tool that evaluates the passwords in my database both for their equality or similarity among themselves, their password strength as well as their age.

    Regarding the implementation, I can imagine several variants. It could be a separate menu point, over which a test procedure can be started. At the end of the check, the result per database entry is displayed in a list. The list should be filterable according to problem type and criticality. Another possibility would be to always check the passwords in the background. For each entry, a kind of traffic light (eg green, yellow, red) and, if necessary, a warning message is displayed which indicates how secure the password of an entry is.

    Examples of warning messages:

    • The password is used several times in the same or similar form (the entries x, y, z... use a related password)
    • The password is not strong.
    • The password is quite old (the older a password, the higher the probability that it could be stolen in an attack on the vendor).

    Edit: The following plugins for the original Keepass try to achieve the same or similiar goals.

    EPIC bounty :moneybag: 
    opened by andkopp 97
  • Auto-Type Problems with @ in username

    Auto-Type Problems with @ in username

    Expected Behavior

    When using Auto-Type, correct USERNAME should be inserted in Form: eg: [email protected]

    Current Behavior

    Auto-Type replaces the @ by a " , so it would enter a wrong USERNAME into the Form: eg: myname"mydomain.tld instead of [email protected]

    Possible Solution

    ?

    Steps to Reproduce (for bugs)

    1. Go to "site" or app or what-so-ever
    2. Put cursor into the first formfield (eg. for username)
    3. Press Auto-Type Global HotKey
    4. Select the entry

    Context

    Trying to insert credentials for login into accounts on websites.

    Your Environment

    • KeePassXC version/commit used: (can be found under Help -> About) : KeePassXC v2.1.0
    • Qt version (e.g. Qt 5.3): Qt 5.6.1
    • Compiler (e.g. Clang++3.6.0): N/A
    • Operating System and version: openSUSE LEAP 42.2 (fully patched)

    Note

    It might be not KeePassXC itself, because it could be, that the behavior changed after the last upgrade of KeePassXC. But I am not absolutely sure. However, you might still be able to track down the source of the problem and help fixing it.

    bug feature: Auto-Type 
    opened by rgloor 94
  • Add Yubikey 2FA for unlocking databases

    Add Yubikey 2FA for unlocking databases

    Description

    This just just https://github.com/keepassx/keepassx/pull/52 rebased against keepassxc. All glory belongs to Kyle Manna This is a merge in feature/yubikey from #119 @johseg you can add commit by pushing to feature/yubikey branch

    Things to do:

    • [x] Add GUI Signals for letting users know when enter the Yubikey https://github.com/keepassxreboot/keepassxc/pull/119#discussion-diff-90652592R169
    • [x] YubiKey appears more than once in the list when unlocking the database and then locking it again
    • [x] KeePassXC should remember the check state of the "Challenge Response" checkbox.
    • [x] Replace Q_FOREACH with C++11 for https://github.com/keepassxreboot/keepassxc/pull/119#pullrequestreview-11167761
    • [x] Replace Q_DECL_OVERRIDE with C++11 override
    • [x] Fix libXtst https://github.com/keepassxreboot/keepassxc/pull/119#pullrequestreview-11279305
    • [x] Fix Travis build with Yubico lib
    • [x] Hiding interface when plugin is disabled or not loaded (based on #125)

    See this PR for more #119

    Motivation and Context

    Adds 2FA with yubikeys to keepassxc Fixes https://github.com/keepassxreboot/keepassxc/issues/26

    How Has This Been Tested?

    I've been using his fork for a while. This here is pretty much untested, I use it since today ...

    Screenshots (if appropriate):

    Types of changes

    • :negative_squared_cross_mark: Bug fix (non-breaking change which fixes an issue)
    • :white_check_mark: New feature (non-breaking change which adds functionality)
    • :negative_squared_cross_mark: Breaking change (fix or feature that would cause existing functionality to change)

    Checklist:

    • :white_check_mark: I have read the CONTRIBUTING document. [REQUIRED]
    • :negative_squared_cross_mark: My code follows the code style of this project. (I just used the existing code)
    • :white_check_mark: All new and existing tests passed. [REQUIRED]
    • :white_check_mark:: My change requires a change to the documentation.
    • :negative_squared_cross_mark: I have updated the documentation accordingly.
    • :white_check_mark:: I have added tests to cover my changes.
    new feature 
    opened by TheZ3ro 86
  • Provide KeePassXC as a FlatPak

    Provide KeePassXC as a FlatPak

    Hello.

    First, thanks for the awesome work you do!

    My question pertains to KeepassXC as Flatpak. I have found KeepassXC on Flathub, but since there's no mention of it on the official KeepassXC page (neither on download, nor blog), I'm hessitant to use it.

    https://flathub.org/apps/ (ctrl+F --> "keepassxc")

    https://github.com/flathub/org.keepassxc.KeePassXC

    I currently use the offical PPA, since the Snaps I've used (KPXC and others) always end up with "Win 95" interface, and a Win 95 window for locating files.

    My question is largely this:

    • Are these official Flatpaks of KeepassXC?
    • ...if no, are there any plans for an official Flatpak?
    distribution: Flatpak 
    opened by iverik-no 82
  • Add some password-related feature

    Add some password-related feature

    Description

    • [X] Add an entropy meter for password generation based on zxcvbn ( #84 )
    • [X] Make the entropy meter standalone (is accessible with the entropy-meter executable)
    • [X] Make zxcvbn a separate library that compile with CMake
    • [X] Update COPYING file with zxcvbn copyright
    • [X] Add entropy test and gui test
    • [X] Color the entropy meter based on the password strength
    • [X] Make password generator a standalone generator like KeePass ( #18 )
    • [X] Don't require password repeat if password is visible ( #27 )
    • [ ] Prevent saving password with Enter when the Generator is open

    Screenshots (if appropriate):

    istantanea_2016-11-11_18-49-14

    Types of changes

    • :white_check_mark: Bug fix (non-breaking change which fixes an issue)
    • :white_check_mark: New feature (non-breaking change which adds functionality)
    • :heavy_minus_sign: Breaking change (fix or feature that would cause existing functionality to change)

    Checklist:

    • :white_check_mark: I have read the CONTRIBUTING document. [REQUIRED]
    • :white_check_mark: My code follows the code style of this project. [REQUIRED]
    • :negative_squared_cross_mark: All new and existing tests passed. [REQUIRED]
    • :heavy_minus_sign: My change requires a change to the documentation.
    • :heavy_minus_sign: I have updated the documentation accordingly.
    • :white_check_mark: I have added tests to cover my changes.

    NOTE the /src/zxcvbn/dict-src.h file contains an english word dictionary auto-generated from zxcvbn-c

    opened by TheZ3ro 78
  • Very large group and entry icons

    Very large group and entry icons

    Too big icons

    Since last update, I noticed that opening my habitual database gives a different appearance:

    • On the left drill-down menu, icons are really big compared to text.
    • In the "Title" column, icons are so big that the number of listed entries is now reduced.
    • Globally, I'd say that the icons size is twice their previous version.

    My system is : KeePassXC - Version 2.6.2 Revision: e9b9582

    Qt 5.15.2 Debugging mode is disabled.

    Operating system: Arch Linux CPU architecture: x86_64 Kernel: linux 5.9.14-arch1-1

    user interface platform: Linux Qt 
    opened by KimHono 76
  • Improve support for Macbook Pro TouchID

    Improve support for Macbook Pro TouchID

    To further improve the utilization of TouchID on Macbook Pro and make the unlock feature more intuitive to use (see comments in #2720 for pull request #1851), I would like to implement the following changes:

    • Make enabling TouchID a global setting (not per database)
    • Add an indication that TouchID is available to unlock (colored icon) on the unlock screen / greyed out when it is not. When it is disabled in the settings no icon is shown.
    • Unlock with TouchID is triggered when it is activated/available and ...
      • ... User clicks on the colored icon
      • ... User tries to unlock database without entering a password
      • ... Window is being brought to the foreground by the user
      • ... Tab is being changed / brought to foreground (multi database usage)
      • I would suggest making the last two scenarios an optional setting
    • TouchID is automatically deactivated on 3 consecutively failed tries (until user enters the password correctly again)
    • Raising the maximum time-out of TouchID (currently the maximum value is 999 minutes)

    Further additions (edited):

    • Hints and dialog that guide the user through the process of activating and using TouchID for Keepass
    • Enable TouchID persistently across restarts of the application

    How do you guys feel about this?

    new feature platform: macOS 
    opened by mxk6n 68
  • Export (both CSV and HTML) is incomplete - e.g. History is missing

    Export (both CSV and HTML) is incomplete - e.g. History is missing

    Overview

    When I export to my database, I never get all the database info exported.

    Steps to Reproduce

    When I export to HTML:

    • "History" (e.g. old passwords) don't get added.

    In addition, when I export to CSV:

    • "Additional Attributes" don't get added (#854)

    Is there any way to export all information?

    Is there a canonical/official list somewhere of what information is missing from what formats?

    If not, please note any additional missing information from the two formats in comments, so we can crowdsource a complete list of missing information in the two export formats.

    Expected Behavior

    I expect to be able to export all information from my database.

    Actual Behavior

    I loose information on export.

    Context

    KeePassXC - Version 2.6.6 Revision: 9c108b9 Operating System: Linux Desktop Env: Gnome Windowing System: X11

    bug 
    opened by pmorch 0
  • Browser Integration code cleanup

    Browser Integration code cleanup

    Cleanups the browser integration code to use structs whenever necessary. Decreases the amount of function parameters and adds some frequently used functions to the structs itself.

    Testing strategy

    Manually.

    Type of change

    • ✅ Refactor (significant modification to existing code)
    feature: Browser refactor 
    opened by varjolintu 0
  • Unlocking screen Key file and Hardware key rows too small

    Unlocking screen Key file and Hardware key rows too small

    Overview

    Steps to Reproduce

    1. Open KeePassXC
    2. On the unlocking screen try to resize down the window (for some reason around 50% of the time this is my default window size)
    3. Key File and Hardware Key rows seems too small (not high enough) resulting that the buttons Browse and Refresh are not visible well.

    Expected Behavior

    Minimum height of those rows should be increased. They should behave the same like the third row with Close and Unlock buttons

    Actual Behavior

    As described in Steps to Reproduce above - rows Key File (with Browse button) and Hardware Key (with Refresh button) are not height enough

    Context

    Screenshot explains it well: Screenshot_2022-09-20_20-50-37

    KeePassXC - Version 2.7.1 Revision: 5916a8f (I've noticed that for at least few months - beginning of 2022 roughly?, but didn't bother to report, so some previous versions are also affected. However it happens more annoying, so I thought I'd report it)

    Operating System: Linux Desktop Env: XFCE Windowing System: X11

    bug user interface platform: Linux 
    opened by thisisgregm 1
  • Add support Yandex.Key (YaOTP).

    Add support Yandex.Key (YaOTP).

    Summary

    Add support Yandex.Key (YaOTP) https://yandex.com/support/id/authorization/twofa-on.html QR code: otpauth://yaotp/user?secret=…&name=user&track_id=…&uid=…&pin_length=… PIN Code: 4-16 digits pin_length Result: 8 letters

    Examples

    Plugins for KeePass:

    • KeeYaOtp: https://github.com/norblik/KeeYaOtp
    • KeePassOTP: https://github.com/Rookiestyle/KeePassOTP/issues/5

    Context

    Using KeepassXC for Yandex services.

    new feature 
    opened by PlusaN 0
  • Separate GUI sources from core sources.

    Separate GUI sources from core sources.

    This PR splits the GUI source files from the core source files. The immediate goal is to allow the CLI to require only a minimum number of dynamic libraries. The long term goal is to create an architectural boundary around the core module, in preparation of libkdbx.

    The only real challenge is this PR was to deal with the network related modules. I ended up creating a networking directory and moving all the network related modules from core/ in there.

    In the future, I think we could move all the core code directly into the core/ folder, and create a CMakeLists.txt specifically for that folder.

    I tested mainly with WITH_XC_ALL=ON to make sure most of the cmake code was triggered.

    Before the changes:

    ldd src/keepassxc | wc -l
    58
    ldd src/cli/keepassxc-cli | wc -l
    60
    

    Basically, the CLI was using exactly the same dynamic libraries as the GUI, plus libncursesw and libreadline.

    After the changes:

    ldd src/keepassxc | wc -l
    58
    ldd src/cli/keepassxc-cli | wc -l
    42
    

    There's still a bunch of libraries that the CLI is linking against for reasons that I don't understand, like libQt5Gui. This might be included in Qt5::Core, but I'm not sure.

    Testing strategy

    unit tests and launched the GUI and CLI apps as a smoke test.

    Type of change

    • ✅ Refactor (significant modification to existing code)
    opened by louib 2
  • Secret Service: UI to manage alias mappings

    Secret Service: UI to manage alias mappings

    Summary

    From https://github.com/keepassxreboot/keepassxc/discussions/8475#discussioncomment-3659989:

    Currently, KeePassXC sets the "default" alias to the currently active database tab, as long as it has a group exposed to Secret Service. This should be managed through a dedicated settings UI, along with other alias mappings.

    Context

    As it is, if there are two databases with exposed groups, switching between them to do something completely unrelated to Sercret Service can cause client apps to access the wrong database.

    Furthermore, the spec suggests there should be an interface to manage alias mappings in general:

    For applications like password managers it can be useful to allow the user to configure which collection is associated with which well known alias.

    The full mapping should probably go to application settings, and either file path or UUID can be used to identify the database. Maybe both: file path for loading, UUID to make sure it's the correct database.

    In addition, when the user exposes a group to Secret Service, they should be able to specify an alias for the database (or leave it blank). If there is no "default" alias defined yet, that should be preselected.

    May be related to https://github.com/keepassxreboot/keepassxc/issues/7574#issuecomment-1120686985 (plus the two comments above it for context).

    new feature feature: Secret Service 
    opened by michaelk83 0
Releases(2.7.1)
Owner
KeePassXC
Developing a community driven, offline password manager
KeePassXC
"SaferCPlusPlus" is essentially a collection of safe data types intended to facilitate memory and data race safe C++ programming

A collection of safe data types that are compatible with, and can substitute for, common unsafe native c++ types.

null 318 Sep 21, 2022
Thread-safe cross-platform event loop library in C++

Dasynq Version 1.2.2 Dasynq is an event loop library similar to libevent, libev and libuv. Like other such libraries, it is crossplatform / portable.

Davin McCall 147 Sep 11, 2022
Contains platform and API specific code written by Primal community members.

PrimalPlus Contains platform and API specific code written by Primal community members. How to use The general idea is to simply copy the files from t

Game Engine Series 17 Sep 16, 2022
Cross-platform, Serial Port library written in C++

Serial Communication Library (Linux and OS X) (Windows) This is a cross-platform library for interfacing with rs-232 serial like ports written in C++.

William Woodall 1.6k Sep 17, 2022
A modern port of Turbo Vision 2.0, the classical framework for text-based user interfaces. Now cross-platform and with Unicode support.

Turbo Vision A modern port of Turbo Vision 2.0, the classical framework for text-based user interfaces. Now cross-platform and with Unicode support. I

null 1.3k Sep 18, 2022
Nihal's Password Manager

# Nihal's Password Manager ## Rationale I normally use `pash`, as my password manager, which uses gpg2 to do all of the cryptography. In my setup (a

Nihal 5 Dec 26, 2021
Simple WPA-PSK default password candidates generator for mobile broadband WIFI routers, based on IMEI

IMEIgen Simple WPA-PSK default password candidates generator for mobile broadband WIFI routers, based on IMEI. Background In their conquest for more u

Alex Stanev 10 Aug 24, 2022
Just a password tool that I make for fun and the sake of my fascination

Note I made this in 1 day and I only have 1 years of experience, feel free to critique my spaghetti of a code. And if 15 chars of password isn't enoug

null 2 Dec 11, 2021
Password-generator write in c++

C++ Password-Generator Language Simple c++ Password generator. Free for use! ?? Requirements Latest Mingw-64 or Mingw-32 installed. Windows 8 or highe

Dio brando 4 Jun 14, 2022
A free and open-source cross-platform application to control your Philips hue compatible lights💡

?? OpenHue ?? A cross platform application to control your Philips hue compatible lights. licensed under the gpl 3.0 license. Currently in super early

BOB450 3 Dec 19, 2021
Cross-platform GPU-oriented C++ application/game framework

Introduction neoGFX is a C++ app/game engine and development platform targeted at app and game developers that wish to leverage modern GPUs for perfor

i42 Software 466 Sep 15, 2022
The simple UEFI application to create a Windows Platform Binary Table (WPBT) from the UEFI shell.

WPBT Builder This is a simple UEFI application to create a Windows Platform Binary Table (WPBT) from the UEFI shell. Motivation WPBT is one of the Adv

Satoshi Tanda 67 Sep 12, 2022
The Leap Motion cross-format, cross-platform declarative serialization library

Introduction to LeapSerial LeapSerial is a cross-format, declarative, serialization and deserialization library written and maintained by Leap Motion.

Leap Motion (Ultraleap) 15 Jan 17, 2022
This repository is to share the EdgeAI Lab with Microcontrollers Series material to the entire community

This repository is to share the EdgeAI Lab with Microcontrollers Series material to the entire community. We will share documents, presentations and source code of two demo applications.

Machine Learning Tokyo 15 Oct 23, 2021
Best Method to get Globally Banned from the cfx.re community

Lua-Executor Best Method to get Globally Banned from the cfx.re community Since cheaters have been going crazy selling 'their' hacks, and often gets d

Scopes 7 Jul 2, 2022
Arduino core for GD32 devices, community developed, based on original GigaDevice's core

GD32 Arduino Core (New) This is a Arduino core is based off of the original GigaDevice core that was provided by the company in early June 2021 (see h

null 38 Aug 26, 2022
Resources and forum for the Chinese community, maintained and moderated by CoinSummer & PL.

Awesome Filecoin 请注意:本文中的链接并非全部是官方链接,部分链接是第三方链接,有些甚至是收费链接,请大家注意区分。 1. Website 1.1 浏览器 FilFox - 6Block 团队开发的 Filecoin 浏览器 Filscan - IPFS原力团队开发的 Filecoi

Filecoin 380 Sep 15, 2022
PyWinRT is a community-supported fork of the pywinrt tool from the Microsoft xlang project.

PyWinRT is a community-supported fork of the pywinrt tool from the Microsoft xlang project.

null 15 Sep 1, 2022
A cross platform shader language with multi-threaded offline compilation or platform shader source code generation

A cross platform shader language with multi-threaded offline compilation or platform shader source code generation. Output json reflection info and c++ header with your shaders structs, fx-like techniques and compile time branch evaluation via (uber-shader) "permutations".

Alex Dixon 277 Aug 21, 2022