AES-256-GCM encrypted password manager and AI privacy tools — built for developers and security-conscious users who refuse to compromise their secrets.
A fully offline password manager with military-grade encryption. Stores every credential, note, and TOTP secret locally — encrypted at rest, never leaving your device.
Sanitize API keys, credentials and PII before pasting into ChatGPT, Claude, or Copilot. Restore the originals from the AI's response. Your secrets stay on your machine.
Every field — username, URL, notes, TOTP secret — encrypted independently with a unique 96-bit random nonce on every write.
128 MB memory, 4 iterations, 4 threads. GPU and ASIC resistant. Your master password is never stored in plain text — anywhere.
Built-in RFC 6238 TOTP with QR scanning and manual entry. Compatible with Google Authenticator and Microsoft Authenticator.
Fingerprint and face unlock via Android BiometricPrompt API. Quick access without ever typing your master password in public.
Live entropy meter on all password fields. Weakness detection, reuse checking. 50-bit minimum entropy enforced on registration.
Portable encrypted backup format with magic header verification, KDF version tagging, and independent AES-256-GCM encryption.
Android's network_security_config.xml blocks all outbound traffic. The app cannot phone home — not by accident, not by design.
30-minute idle timeout, progressive lockout after 5/10/20 failures. Clipboard auto-clears 30 seconds after any copy.
Import from Chrome, LastPass, Bitwarden, 1Password, and KeePass. Automatic column detection, no manual field mapping required.
| Layer | Technology |
|---|---|
| Vault encryption | AES-256-GCM, per-field, unique nonce/write |
| Key derivation | Argon2id — 128 MB, 4 iters, 4 threads |
| Login hash | Argon2id (same params, GPU/ASIC resistant) |
| 2FA | TOTP RFC 6238 + replay attack protection |
| Biometric | Android BiometricPrompt API |
| Backup format | .vmb — AES-256-GCM + magic header |
| Screenshot block | FLAG_SECURE on all screens |
| Network | Blocked — network_security_config.xml |
VaultMorph was designed to pass a security audit from day one. Every vulnerability found during development was patched before v1.0.0 shipped — tracked and verified.
14 security findings were identified and fixed during internal review. From raw password storage to TOTP replay attacks — nothing shipped broken.