LogoHackDB
RecentCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  1. Home
  2. Items
  3. PasswordPusher
icon of PasswordPusher

PasswordPusher

Securely share sensitive information with automatic expiration & deletion, audit logs, and encrypted storage. Host your own instance.

Visit WebsiteShare on X
image of PasswordPusher
Visit Website

Introduction

Back

Information

  • Publisher
    Admin
  • Websitegithub.com
  • Created date04/24/2025
  • Published date04/24/2025

Categories

  • Reporting

Tags

  • Report

More Resources

  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.
    image of Neuron
    Reporting
    Visit Website

    Neuron

    Details

    Self-hosted offensive security platform for managing engagements, findings, and delivery. Features on-prem AI reporting and real-time team collaboration.

    Report
    image of Intruder
    Infrastructure SecurityApplication SecurityReconnaissanceReporting
    Visit Website

    Intruder

    Details

    Unified exposure management platform for automated vulnerability scanning, attack surface monitoring, and cloud security posture management.

    ExternalInternalCloudAPIWeb+2
    image of SecCheckmate
    AI SecurityCloud SecurityApplication SecurityAPI SecurityWireless SecurityInfrastructure SecurityReporting
    Visit Website

    SecCheckmate

    Details

    Offline security checklist & report generator with 200+ tests across web, cloud, WiFi, firmware, and AI security domains.

    ReportAICloudWebAPI+3

    Password Pusher is an open-source tool designed for securely communicating sensitive information over the web. It ensures that secrets expire after a set number of views or a defined time, enhancing security and preventing long-term exposure.

    Key features:

    • Automatic Expiration: Shared secrets automatically expire and self-delete after a specified number of views or time.
    • Audit Logging: Tracks who accessed the pushed secrets and when, providing an audit trail.
    • Encrypted Storage: Sensitive data is stored encrypted, ensuring confidentiality.
    • Self-Hostable: Can be easily self-hosted using Docker or other cloud services, allowing for private and isolated instances.
    • Versatile: Supports sharing passwords, text, files, or URLs.
    • Admin Dashboard: Built-in admin dashboard for managing self-hosted instances.
    • JSON API: Raw JSON API for integration with third-party tools and command-line interfaces.
    • CLI: Automate password distribution with CLI tools or custom scripts.

    Use Cases:

    • Securely sharing passwords with colleagues or clients.
    • Communicating sensitive configuration details to servers.
    • Distributing temporary access tokens or keys.
    • Any situation where sensitive information needs to be shared securely and automatically revoked.