您需要先安装一个扩展,例如 篡改猴、Greasemonkey 或 暴力猴,之后才能安装此脚本。
您需要先安装一个扩展,例如 篡改猴 或 暴力猴,之后才能安装此脚本。
您需要先安装一个扩展,例如 篡改猴 或 暴力猴,之后才能安装此脚本。
您需要先安装一个扩展,例如 篡改猴 或 Userscripts ,之后才能安装此脚本。
您需要先安装一款用户脚本管理器扩展,例如 Tampermonkey,才能安装此脚本。
您需要先安装用户脚本管理器扩展后才能安装此脚本。
Open2FA is a free and open-source 2FA generator that helps you create secure tokens anytime, anywhere. Lightweight, fast, and privacy-friendly – no accounts, no tracking, just instant codes.
Open2FA — a free and open-source generator for two-factor authentication (2FA) codes. Lightweight, fast, and privacy-first.
otpauth://
) or manually enter a Base32 secret.Example URIs:
otpauth://totp/Service:username?secret=JBSWY3DPEHPK3PXP&issuer=Service&digits=6&period=30
otpauth://hotp/Service?secret=JBSWY3DPEHPK3PXP&issuer=Service&digits=6&counter=1
Note: Always back up your secrets and recovery codes safely. Losing them may lock you out of your account.
otpauth://
URI or enter a Base32 secret.period
seconds (default: 30).algorithm
: SHA1 (default), SHA256, SHA512digits
: 6 (default), 7, 8period
(TOTP): 30 (default)counter
(HOTP): integer valueQ: I only have a Base32 secret, no otpauth link. What do I do?
A: Use "Enter secret" and manually specify the parameters (digits, period, algorithm).
Q: My TOTP codes are incorrect.
A: Check your system clock. TOTP is time-sensitive and requires accurate system time.
Q: Does Open2FA save my secrets?
A: No. All data is processed locally on your device.
Q: Does it support QR codes?
A: If your version includes a QR scanner, you may use it. Otherwise, decode the QR code with another tool and paste the otpauth link.
You can verify correctness with known test values:
Secret (Base32): JBSWY3DPEHPK3PXP
TOTP (SHA1, 6 digits, 30s): matches reference implementations
HOTP (counter-based): produces a valid sequence of codes
Licensed under a permissive open-source license (MIT). Free to use, modify, and share.
Open2FA provides standard-compliant 2FA code generation. You are responsible for keeping your secrets safe and securing your accounts. Always enable backup recovery methods for critical services.