KeeFarce

Extracts passwords from a KeePass 2.x database, directly from memory. (by denandz)

KeeFarce Alternatives

Similar projects and alternatives to KeeFarce

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a better KeeFarce alternative or higher similarity.

KeeFarce reviews and mentions

Posts with mentions or reviews of KeeFarce. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-10-25.
  • KeePass Sicherheitslücke ist ein großes Problem!
    1 project | /r/de_EDV | 3 Feb 2023
  • Diskussion um Schwachstelle in KeePass
    1 project | /r/de_EDV | 2 Feb 2023
  • Open source security camera/CCTV apps?
    1 project | /r/androidapps | 2 Nov 2022
    inb4 KeeFarce. It's 7 years old and only works in specific situations.
  • How the Clipboard Works
    3 projects | news.ycombinator.com | 25 Oct 2022
    > isn't securing this one major IMO attack vector an improvement over not doing anything about it

    Unfortunately securing this attack vector is costly - in the sense of annoying the user with prompts and access grants.

    This is why even on mobile as you noticed, only browsers require user confirmation before allowing webpages access to the clipboard.

    You could maybe do something in between, like not allowing clipboard access to processes which don't have a foreground window visible to the user.

    But in practice, this attack vector is not exploited. If you are targeted, it's much more likely that a specific attack against the password manager is used, since it will extract ALL passwords, and not need to wait for one to show up:

    > KeeFarce allows for the extraction of KeePass 2.x password database information from memory. The cleartext information, including usernames, passwords, notes and url's are dumped into a CSV file in %AppData%

    https://github.com/denandz/KeeFarce

  • Google Authenticator's first update in years tweaks how you access security codes
    6 projects | /r/Android | 3 Jun 2022
    I'm not sure how that defeats the purpose of 2FA. If anything, critical things like 2FA codes being stored locally on your device are more dangerous. Just because it's online doesn't mean it is suddenly insecure. By your logic, password managers being online and cross-platform are also somehow insecure, yet everybody expects those as the most basic features. I don't want to get into a long-winded, pointless "everything on the internet is insecure!" discussion, but I just don't see your point.
  • Why I don't hear about malware targetting password managers?
    7 projects | /r/hacking | 29 May 2022
  • A note from our sponsor - SaaSHub
    www.saashub.com | 2 May 2024
    SaaSHub helps you find the best software and product alternatives Learn more →

Stats

Basic KeeFarce repo stats
7
989
10.0
over 8 years ago

Sponsored
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com