KeeFarce Logo

KeeFarce

0
Free
Visit Website

KeeFarce allows for the extraction of KeePass 2.x password database information from memory. The cleartext information, including usernames, passwords, notes and url's are dumped into a CSV file in %AppData%. KeeFarce uses DLL injection to execute code within the context of a running KeePass process. C# code execution is achieved by first injecting an architecture-appropriate bootstrap DLL. This spawns an instance of the dot net runtime within the appropriate app domain, subsequently executing KeeFarceDLL.dll (the main C# payload). The KeeFarceDLL uses CLRMD to find the necessary object in the KeePass processes heap, locates the pointers to some required sub-objects (using offsets), and uses reflection to call an export method. An appropriate build of KeeFarce needs to be used depending on the KeePass target's architecture (32 bit or 64 bit). Archives and their shasums can be found under the 'prebuilt' directory. In order to execute on the target host, the following files need to be in the same folder: BootstrapDLL.dll, KeeFarce.exe, KeeFarceDLL.dll, Microsoft.Diagnostic.Runtime.dll. Copy these files across to the target and execute Kee.

FEATURES

ALTERNATIVES

Centralized workforce identity management for AWS applications.

Free

OpenIAM offers a unified identity governance platform featuring CIAM, MFA, and PAM integration.

Free

Encrypt Kubernetes Secrets into SealedSecrets for safe storage and controlled decryption within the cluster.

Free

Abusing DNSAdmins privilege for escalation in Active Directory

Free

Runs IAM policy linting checks against AWS accounts to identify security best practices and policy errors.

Free

Command-line password manager with GnuPG encryption and colorful interface.

Free

BeyondTrust Privileged Access Management (PAM) provides comprehensive security controls for privileged accounts and users.

Free

Tool for associating IAM roles to Pods in Kubernetes clusters.

Free
CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved