KeyPing is a privacy-first desktop password manager focused on detecting weak, reused, and risky passwords while keeping all data fully local and offline.
Active development. Core features are stable and used daily, with continuous improvements in UX, security, and test coverage.
- Local-only encrypted vault (AES-256-GCM)
- Password similarity and reuse detection
- Password health analysis and scoring
- Version history per password
- Advanced filtering and search
- Folder organization with drag and drop
- Secure clipboard with auto-wipe and history cleaning (Windows best effort)
- Offline encrypted import/export
- Auto-updates via GitHub Releases
- Interactive onboarding and demo mode
- ES / EN interface
Most password managers focus on storage and autofill.
KeyPing focuses on password hygiene:
- detecting weak passwords
- identifying reused credentials
- highlighting risky patterns
- improving vault security over time
All while keeping data fully local and offline.
Vault data is encrypted on disk using AES-256-GCM.
No mandatory cloud sync, no external secret storage, and no account required.
Key derivation uses PBKDF2-HMAC-SHA512 (120000 iterations in the current implementation).
Copied secrets are cleared after timeout only if clipboard content still matches the copied secret.
Master lock applies escalating cooldown delays after failed unlock attempts.
The app validates vault structure and detects corruption/timestamp anomalies.
Download binaries from GitHub Releases:
- Releases: https://github.com/Unax-Zulaika-Fuente/KeyPing/releases
- Windows:
.exeinstaller (NSIS) - Linux:
AppImage - macOS:
.dmg
Each release includes:
SHA256SUMS.txtSHA256SUMS.txt.asc(detached ASCII-armored GPG signature)
Release signing key fingerprint:
D70937B0AD7411A9E6A66337A5F10A1A37AAEBE9
Verify signature:
gpg --verify SHA256SUMS.txt.asc SHA256SUMS.txtVerify checksums:
sha256sum -c SHA256SUMS.txt- Frontend: Angular (standalone components)
- Desktop runtime: Electron
- IPC bridge: secure preload API (
contextIsolationenabled) - Vault: encrypted local file managed by Electron main process
Flow summary:
- UI requests an action through preload IPC.
- Main process validates and executes secure operations.
- Vault module encrypts/decrypts local storage.
- UI receives sanitized metadata and operation state.
Requirements:
- Node.js 20+
- npm 10+
Run locally:
cd keyping-ui
npm install
npm run devUseful commands:
npm run build-> production build + packagingnpm run test-> Angular testsnpm run test:electron-> Electron unit tests
- Optional breach-check integrations (privacy-preserving approach)
- Expanded IPC/vault automated tests
- Better import conflict resolution UX
- Signed and notarized macOS pipeline
- Optional portable mode
- More accessibility and keyboard navigation polish
Issues and PRs are welcome.
When reporting bugs, include:
- OS and version
- KeyPing version
- Reproduction steps
- Expected vs actual behavior
MIT. See LICENSE.
- Third-party notices: THIRD_PARTY_NOTICES.md
- Trademark and branding notice: TRADEMARK.md
Unax Zulaika Fuente (Zulaa9)
Software Systems Engineer







