A fully offline, portable, terminal-based password manager
built in pure Bash + GnuPG, designed for security-first,
minimalism, and complete user control.
- Overview
- Philosophy
- Features
- Architecture & Security Model
- Requirements
- Installation
- Usage
- Password Strength Coaching
- Clipboard Auto-Clean
- Portable & Save Bundles
- Development & Versioning
- Documentation & Legal
- License
SPM (Sans Password Manager) is a single-file, portable,
offline-only, encrypted password manager powered by:
- GnuPG (AES-256, symmetric)
- OpenSSL (RSA) for optional recovery
- Pure Bash, requiring no internet access
SPM is designed for users who want:
- full ownership of their vault
- no cloud storage
- no telemetry
- no tracking
- a clean UI (terminal + optional local web mode)
β SPM never transmits any data.
β Fully offline.
β You are the sole data controller (GDPR compliant).
β The developer cannot recover your vault if you lose your master password.
- Privacy First: No analytics, no logs, no tracking.
- Offline Forever: Everything stored locally; no servers.
- Portable: Carry your encrypted vault anywhere.
- Simplicity: A single Bash script.
- Transparency: Encryption handled by GnuPG/OpenSSL directly.
- User Ownership: You control your keys, vaults, and backups.
- π Vault terenkripsi GPG (AES-256)
- π UI interaktif (EN/ID)
- π₯οΈ Web Mode (Localhost) β dashboard modern offline-only
- π¦ Portable bundle (script + vault + recovery)
- πΎ SAVE bundle (backup + wipe vault lokal)
- π§ Password Strength Coaching
- π Secure Notes
- π Kode Backup
- π Lupa password via RSA private key
- π©Ί Doctor mode (diagnostik integritas vault & recovery)
- π§½ Clear clipboard otomatis (~15 detik)
- π Encrypted vault (GPG AES-256)
- ποΈ Clean interactive menu
- π Local Web Mode (browser UI, offline only)
- π¦ Portable bundle (ZIP)
- πΎ SAVE bundle (backup + wipe local)
- π§ Password strength analysis & coaching
- π Secure notes
- π Backup codes
- π RSA-based recovery
- π©Ί Doctor diagnostics
- π§½ Clipboard auto-clean
- π« No cloud, no telemetry, no data collection
- Vault: GnuPG symmetric AES-256
- Recovery: RSA-2048 private/public key
- Notes: Base64 + encrypted
- Metadata: Stored inside encrypted vault
spm_recovery_private.pemβ your private key (store offline)<vault>.recoveryβ recovery capsule encrypted with RSA public key
- Host machine is secure
- User protects master password & private key
- GnuPG/OpenSSL are trusted binaries
- Keyloggers / malware
- Root attackers
- RAM extraction
- OS-level compromise
- User mistakes (uploading vault, losing private key)
For more details, see SECURITY.md.
SPM automatically checks / installs:
- bash
- gpg
- openssl
- curl
- zip
- Clipboard helpers:
- pbcopy (macOS)
- xclip / wl-copy (Linux)
- termux-clipboard-set (Termux)
git clone https://github.com/sansyourways/Sans_Password_Manager.git
cd Sans_Password_Manager
chmod +x spm.sh
./spm.sh./spm.shIncludes:
- Add / list / get / delete entry
- Edit vault
- Change master password
- Portable bundle
- SAVE bundle
- Secure notes
- Recovery
- Doctor diagnostics
./spm.sh web- Runs on localhost only
- Vault stays encrypted locally
- Master password required
- Features:
- View entries
- View notes
- Edit entries
- Local copy-to-clipboard
./spm.sh init
./spm.sh add
./spm.sh list
./spm.sh get <id>
./spm.sh delete <id>
./spm.sh change-master
./spm.sh portable
./spm.sh save
./spm.sh forgot
./spm.sh notes-add
./spm.sh notes-list
./spm.sh notes-view <id>
./spm.sh notes-delete <id>
./spm.sh backup-codes-add
./spm.sh backup-codes-list
./spm.sh backup-codes-view <id>
./spm.sh backup-codes-delete <id>
./spm.sh doctor
./spm.sh web./spm.sh notes-add
./spm.sh notes-list
./spm.sh notes-view 1
./spm.sh notes-delete 1Stored inside encrypted vault.
./spm.sh backup-codes-add
./spm.sh backup-codes-list
./spm.sh backup-codes-view 1
./spm.sh backup-codes-delete 1Stored inside encrypted vault. Viewing requires master password re-verification.
Generated files:
spm_recovery_private.pem<vault>.recovery
To reset:
./spm.sh forgotProcess:
- Decrypt recovery capsule
- Retrieve old master password
- Set new master password
- Rebuild vault + recovery files
./spm.sh doctorValidates:
- Vault structure
- GPG/AES decryption
- Duplicate IDs
- Secure notes integrity
- Recovery metadata
- RSA key pairing
SPM analyzes:
- Entropy
- Crack-time estimates
- Character class distribution
- Repetition patterns
- Suggestions (EN + ID)
Auto-clears clipboard in ~15 seconds using:
- pbcopy (macOS)
- xclip / wl-copy (Linux)
- termux-clipboard-set (Termux)
If unavailable β fallback warning only.
./spm.sh portableBundle includes:
- spm.sh
- spm_vault.gpg
- spm_vault.gpg.recovery
- spm_recovery_private.pem (optional)
- Auto README file
./spm.sh saveCreates encrypted backup, wipes local vault.
Version: 2.3.0
Uses semantic versioning.
See CHANGELOG.md for details.
SPM is closed-source and licensed under a Private License.
Refer to:
LICENSEdocs/PRIVACY_POLICY.mddocs/GDPR_PRIVACY_NOTICE.mddocs/TERMS_AND_CONDITIONS.mddocs/CODE_OF_CONDUCT.mddocs/SECURITY.md
Sans Password Manager β Private License
Β© 2025 Sansyourways. All Rights Reserved.
See LICENSE for full terms.


