A tool to extract a KeePass master password from memory
Перейти к файлу
HoLLy f92c003055 Update README 2020-12-11 22:54:45 +01:00
KeePassHax Add fully managed injector that works as a single binary 2020-12-11 22:49:48 +01:00
KeePassHax.Injector Add fully managed injector that works as a single binary 2020-12-11 22:49:48 +01:00
.gitattributes Add .gitignore and .gitattributes. 2018-05-08 12:57:31 +02:00
.gitignore Add .gitignore and .gitattributes. 2018-05-08 12:57:31 +02:00
KeePassHax.sln Add fully managed injector that works as a single binary 2020-12-11 22:49:48 +01:00
LICENSE Create LICENSE 2018-05-08 15:35:43 +00:00
README.md Update README 2020-12-11 22:54:45 +01:00

README.md

KeePassHax

KeePassHax is a managed DLL that, when injected into the KeePass process, will extract all data that makes up the CompositeKey used to decrypt the password database. This data (along with the database) could be transmitted to some server running in the cloud to then be decrypted and abused in all kinds of fun ways.

Inspired by KeeFarce, but better ;)

Building

Compile it with Visual Studio 2017 or higher ¯\_(ツ)_/¯

Usage

If you already have a managed DLL injector (like this one), you can build the KeePassHax project and inject the resulting DLL into the KeePass project. You do not need administrator permissions for this, so it can be ran from the context of any application.

Alternatively, use the KeePassHax.Injector project to build a binary that, when run, injects itself into KeePass process.

You can see it in action in this video.

Disclaimer

You probably could have guessed this, but I don't take responsibility for what you do with this. Please don't use this to actually steal passwords. This is merely a proof-of-concept to remind people to not run untrusted programs.

License

This code is licensed under the MIT license. I will always appreciate a link back to this repository :)