pass icon
pass icon

pass

 27 likes

Pass is the standard unix password manager, a lightweight password manager that uses GnuPG and Git for Linux, BSD, and Mac OS X. With pass, each password lives inside of a gpg encrypted file whose filename is...

License model

  • FreeOpen Source

Application type

Platforms

  • Mac
  • Linux
  • BSD
  • Git
  • GnuPG
3 / 5 Avg rating (2)
27 likes
2comments
0 news articles

Features

Suggest and vote on features

Properties

  1.  Lightweight

Features

  1.  Command line interface
  2.  GPG Encryption
  3.  Unix style
  4.  Native application
  5.  Directory structure

pass News & Activities

Highlights All activities

Recent activities

Show all activities

pass information

  • Developed by

    Jason A. Donenfeld aka zx2c4
  • Licensing

    Open Source (GPL-2.0) and Free product.
  • Rating

    Average rating of 3
  • Alternatives

    173 alternatives listed
  • Supported Languages

    • English

AlternativeTo Categories

Security & PrivacyOS & Utilities

Our users have written 2 comments and reviews about pass, and it has gotten 27 likes

pass was added to AlternativeTo by tabakis on Dec 21, 2013 and this page was last updated May 22, 2023. pass is sometimes referred to as the standard unix password manager, password-store.

Comments and Reviews

   
 Post comment/review
Guest
  
Top positive commentJul 28, 2017

Entirely offline, and command line friendly.

0
Roelof
  
Top negative commentDec 5, 2020

Password does what it says, but the lack of a standard format makes it not easy to use and the dependency on GPG keys makes your password very un-portable. You can take them anywhere, but creating new GPG keys for each device takes time and requires two devices (one to create the new key, and then another one to re-encrypt all stored passwords).

Especially on mobile this becomes a pain quickly.

0

What is pass?

Pass is the standard unix password manager, a lightweight password manager that uses GnuPG icon GnuPG and Git icon Git for Linux, BSD, and Mac OS X. With pass, each password lives inside of a gpg encrypted file whose filename is the title of the website or resource that requires the password. These encrypted files may be organized into meaningful folder hierarchies, copied from computer to computer, and, in general, manipulated using standard command line file management utilities.