Downloads, Hacking Tools, Password Manager, Pmanager, Rust, Security Tools, XposedOrNot

Pmanager – Store And Retrieve Your Passwords From A Secure Offline Database. Check If Your Passwords Has Leaked Previously To Prevent Targeted Password Reuse Attacks



Store and retrieve your passwords from a secure offline database. Check if your passwords has leaked previously to prevent targeted password reuse attacks.

Why develop another password manager ?

  • This project was initially born from my desire to learn Rust.
  • I was tired of using the clunky GUI of keepassxc.
  • I wanted to learn more about cryptography.
  • For fun. 🙂


  • Secure password storage with state of the art cryptographic algorithms.
    • Multiple iterations of argon2id for key derivation to make it harder for attacker to conduct brute force attacks.
    • Aes-gcm256 for database encryption.
  • Custom encrypted key-value database which ensures data integrity.(Read the blog post I wrote about it here.)
  • Easy to install and to use. Does not require connection to an external service for its core functionality.
  • Check if your passwords are leaked before to avoid targeted password reuse attacks.
    • This works by hashing your password with keccak-512 and sending the first 10 digits to XposedOrNot.


Pmanager depends on “pkg-config” and “libssl-dev” packages on ubuntu. Simply install them with

sudo apt install pkg-config libssl-dev -y

Download the binary file according to your current OS from releases, and add the binary location to PATH environment variable and you are good to go.

Building from source

Ubuntu & WSL

sudo apt update -y && sudo apt install curl
curl --proto '=https' --tlsv1.2 -sSf | sh
sudo apt install build-essential -y
sudo apt install pkg-config libssl-dev git -y
git clone
cd pmanager
make install


git clone
cd pmanager
cargo build --release


I have not been able to test pmanager on a Mac system. But you should be able to build it from the source (“cargo build –release”). since there are no OS specific functionality.


Firstly the database needs to be initialized using “init” command.


# Initializes the database in the home directory.
pmanager init --db-path ~


# Insert a new user and password pair to the database.
pmanager insert --domain


# Get a specific record by domain.
pmanager get --domain


# List every record in the database.
pmanager list


# Update a record by domain.
pmanager update --domain


# Deletes a record associated with domain from the database.
pmanager delete


# Check if a password in your database is leaked before.
pmanager leaked --domain
pmanager 1.0.0


-d, --debug
-h, --help Print help information
-V, --version Print version information

delete Delete a key value pair from database
get Get value by domain from database
help Print this message or the help of the given subcommand(s)
init Initialize pmanager
insert Insert a user password pair associated with a domain to database
leaked Check if a password associated with your domain is leaked. This option uses
xposedornot api. This check achieved by hashing specified domain's password and
sending the first 10 hexade cimal characters to xposedornot service
list Lists every record in the database
update Update a record from database



Bitcoin Address -> bc1qrmcmgasuz78d0g09rllh9upurnjwzpn07vmmyj

Source : KitPloit – PenTest Tools!

Previous ArticleNext Article
Send this to a friend