SSAM (Spyshakers Account Manager) is a script that manages and protects online accounts. Passwords are encrypted and stored in a MySQL database. The encryption keys are not stored. Multiple accounts can be created under one installation. Folders of passwords can be pushed between accounts on the system. Security tools are built in to help protect accounts from spyware, key loggers, and screen capture devices. SSAM is perfect for Web masters and small businesses who need to manage their online accounts and keep them organized between founders, co-workers, or outsourced help.
CryptSharp provides a number of password crypt algorithms: BCrypt, MD5 (and Apache's htpasswd variant), PHPass (WordPress, phpBB, Drupal), SHA256, SHA512, and Traditional and Extended DES. It also includes Blowfish, SCrypt, and PBKDF2 for any HMAC (.NET's built-in PBKDF2 implementation supports only SHA-1). If you are looking to store passwords, odds are CryptSharp will have the algorithm you want.
file2password is a utility that allows you to select a file (picture, document, music, etc.) and generate a secure password based on it. This means that there is no need to remember any password - just a picture or a filename. It is small (2 KB plus CSS), highly secure as it does not upload or shows the file used, supports drag and drop, can use online storage, and requires no server-side scripting.
pysrp is a Python module that provides an implementation of the Secure Remote Password protocol (SRP), a cryptographically strong authentication protocol for password-based, mutual authentication over an insecure network connection. Unlike other common challenge-response autentication protocols, such as Kerberos and SSL, SRP does not rely on an external infrastructure of trusted key servers or certificate management. Instead, SRP server applications use verification keys derived from each user's password to determine the authenticity of a network connection.
The te-edu Password Meter class can be used to check whether a password is strong enough to not be guessed easily. It can perform several tests on a given password string to compute a score that represents the strength of a password. Password checking is based on brute force attack class A and considers 10 million password checks in one minute. It checks characters, character pairs, repeated characters, time needed to be discovered, character standard entropy, etc.