Your passwords.
Encrypted. Yours alone.

A single HTML file. No server. No account. No cloud. Your vault lives on your disk, encrypted with AES-256-GCM. Open it in any browser on any device.

⬇ Download free ☕ Buy me a coffee

One file. No install. Works on Windows, Mac, Linux, iPhone, Android.

📄

Single file

The entire app is one HTML file. Download it, open it, use it. No install, no setup, no dependencies.

🔒

AES-256-GCM encryption

Your vault is encrypted with the same standard used by banks and governments. Master password never leaves your device.

📡

Fully offline

No network requests. No telemetry. No analytics. Works on a plane, in a bunker, anywhere.

💾

File-based vault

Your data lives in a .pasamayo file on your disk. Copy it anywhere. Back it up. You own it.

🔄

Rolling backups

Last 5 snapshots stored inside the encrypted file. Restore any previous state in one click.

🔍

Fuzzy search

Find any entry instantly. Filter by name, username, or month. Paginated for large vaults.

⚙️

Password generator

CSPRNG-based generator with configurable charset, length, and ambiguous character exclusion.

🤖

Offline assistant

Built-in helper for recovery, weak password detection, vault health audits, and feature guidance.

📖

Open source

MIT license. Read every line of code. No hidden behaviour. No obfuscation.

How it works

1

Download the file

One HTML file. ~50KB. No install required.

2

Create your vault

Set a master password. A .pasamayo file is saved to your disk.

3

Add your passwords

Service, username, password. Saved and encrypted instantly.

4

Use it anywhere

Copy the .pasamayo file to any device. Open with any browser. Unlock with your master password.

Security model

Built on the browser's native Web Crypto API. No custom crypto. No third-party libraries.

AES-256-GCM

Authenticated encryption. The vault is a single encrypted blob — no partial access possible.

PBKDF2 + SHA-512

Randomised iteration count per vault. Attacker cannot pre-optimise cracking without reading the file first.

HMAC integrity

Wrong password fails before decryption is attempted. No decryption oracle exposed.

Constant-time comparison

HMAC verified without short-circuiting. Prevents timing attacks.

Payload padding

File size reveals nothing about entry count or password lengths.

Zero browser storage

No localStorage. No cookies. No cache. Nothing persists in the browser.