A secure, local, cross-platform password manager built in Rust with absolute focus on security, privacy, and resistance to sophisticated attacks. This application is designed to work completely offline, eliminating network-based risks and providing a robust solution for users handling sensitive information.
- Argon2id Algorithm: Uses the most secure key derivation function with random salt and multiple iterations
- Master Password Protection: Your master password derives a cryptographic key used for AES-GCM encryption
- Unique IV per Entry: Each password is protected with a unique initialization vector ensuring confidentiality and integrity
- Stealth Mode: Displays a generic interface until authentication is complete, making it difficult to identify the application's purpose in risky situations
- Fake Password: Unlocks a simulated environment with fictitious data, useful in cases of coercion or forced exposure
- Progressive Lockout: Imposes temporary penalties after multiple incorrect access attempts, hindering automated attacks
- HMAC-SHA256 Digital Signatures: All files are digitally signed to detect any tampering immediately
- File Integrity Checks: Storage files are verified for integrity before loading
- Encrypted Access Logging: Logs access attempts with date, time, and login attempts without compromising user privacy
The project features a modular and extensible architecture, allowing for easy maintenance and evolution:
- Terminal Interface: Built with interactive menus using
tuiandcrosstermcrates - Planned GUI Support: Future support for GUI with
icedoregui - Automatic Password Generation: Strong password generation with customizable parameters
- Smart Categorization: Organize passwords by service type (social media, banking, work, etc.)
- Intelligent Search: Search by name or category with fuzzy matching
The codebase is continuously audited with security tools:
- cargo-audit: Vulnerability scanning
- cargo-fuzz: Fuzz testing for edge cases
- clippy: Code quality and security best practices
- Automated Testing: Comprehensive test coverage for authentication, encryption, and persistence flows
- Rust 1.70+ (latest stable recommended)
- Cargo package manager
git clone https://github.com/guicybercode/rust-cripto-manager
cd rust-cripto-manager
cargo build --releasecargo run --release# Stealth mode
cargo run --release -- --stealth
# With fake password
cargo run --release -- --fake-password "decoy_password"- Launch the application
- Set your master password (minimum 8 characters with mixed case, numbers, and symbols)
- Optionally set a fake password for decoy access
- The application will create encrypted storage files in your home directory
- Enter your master password to unlock the vault
- Use the interactive menu to:
- Add new password entries
- Search existing passwords
- Generate strong passwords
- Organize by categories
- Export data (planned feature)
- Use a strong, unique master password
- Enable stealth mode in public environments
- Set up a fake password for high-risk situations
- Regularly backup your encrypted database
- Never share your master password
The application stores configuration in ~/.rust_cripto/:
config.json: Encrypted user configurationpasswords.db: Encrypted password databaseaccess.log: Encrypted access logs
RUST_LOG: Set logging level (e.g.,RUST_LOG=info)RUST_CRIPTO_DATA_DIR: Custom data directory path
cargo testcargo audit
cargo fuzz runcargo clippy
cargo fmtcargo doc --open- Memory Safety: Rust's ownership system prevents common memory vulnerabilities
- Zero-Copy Operations: Sensitive data is handled with minimal memory exposure
- Automatic Cleanup: Memory is securely wiped when no longer needed
- Offline Operation: No network dependencies eliminate remote attack vectors
- Open Source: Full transparency allows security auditing
This password manager is designed to protect against:
- β Brute force attacks on master password
- β Rainbow table attacks
- β Memory dumps and forensic analysis
- β Social engineering and coercion
- β File tampering and data corruption
- β Automated password cracking tools
- Requires physical access to the device for initial setup
- No cloud synchronization (by design)
- No multi-device access without manual transfer
- No password sharing features
We welcome contributions! Please see our contributing guidelines:
- Fork the repository
- Create a feature branch
- Make your changes with tests
- Run security audits
- Submit a pull request
For security vulnerabilities, please email security@rustcripto.dev (replace with actual contact)
This project is licensed under the MIT License - see the LICENSE file for details.
- Argon2 team for the secure key derivation algorithm
- Rust Cryptography community for excellent crypto crates
- Security researchers who have contributed to password manager security best practices
- Documentation: Wiki
- Issues: GitHub Issues
- Discussions: GitHub Discussions
π Remember: Your security is only as strong as your master password. Choose wisely and never reuse it elsewhere.