PManager Store and retrieve your passwords from a secure offline database. Check if your passwords has leaked previously to prevent targeted password reuse attacks.



  • Secure password storage with state of the art cryptographic algorithms.
    • Multiple iterations of argon2id for key derivation to make it harder for attacker to conduct brute force attacks.
    • Aes-gcm256 for database encryption.
  • Custom encrypted key-value database which ensures data integrity.(Read the blog post I wrote about it here.)
  • Easy to install and to use. Does not require connection to an external service for its core functionality.
  • Check if your passwords are leaked before to avoid targeted password reuse attacks.
    • This works by hashing your password with keccak-512 and sending the first 10 digits to XposedOrNot.


Pmanager depends on “pkg-config” and “libssl-dev” packages on ubuntu. Simply install them with

sudo apt install pkg-config libssl-dev -y

Download the binary file according to your current OS from releases, and add the binary location to PATH environment variable and you are good to go.

Building from source

Ubuntu & WSL

sudo apt update -y && sudo apt install curl
curl --proto '=https' --tlsv1.2 -sSf | sh
sudo apt install build-essential -y
sudo apt install pkg-config libssl-dev git -y
git clone
cd pmanager
make install


git clone
cd pmanager
cargo build --release


I have not been able to test pmanager on a Mac system. But you should be able to build it from the source (“cargo build –release”). since there are no OS specific functionality.


Firstly the database needs to be initialized using “init” command.


# Initializes the database in the home directory.
pmanager init --db-path ~


# Insert a new user and password pair to the database.
pmanager insert --domain


# Get a specific record by domain.
pmanager get --domain


# List every record in the database.
pmanager list


# Update a record by domain.
pmanager update --domain


# Deletes a record associated with domain from the database.
pmanager delete


# Check if a password in your database is leaked before.
pmanager leaked --domain
pmanager 1.0.0

    pmanager [OPTIONS] [SUBCOMMAND]

    -d, --debug      
    -h, --help       Print help information
    -V, --version    Print version information

    delete    Delete a key value pair from database
    get       Get value by domain from database
    help      Print this message or the help of the given subcommand(s)
    init      Initialize pmanager
    insert    Insert a user password pair associated with a domain to database
    leaked    Check if a password associated with your domain is leaked. This option uses
                  xposedornot api. This check achieved by hashing specified domain's password and
                  sending the first 10 hexadecimal characters to xposedornot service
    list      Lists every record in the database
    update    Update a record from database