Sub load()
    UserForm1.Show
    
End Sub
Sub unlockSheet()
    Dim s As String
    
    s = InputBox("Enter Password")
    
    If s = UserForm1.pwtb Then
        Worksheets("pw").Visible = True
        Worksheets("pw").Select
    Else
        MsgBox "Incorrect password - Closing workbook."
        ActiveWorkbook.Close (True)
        Application.Quit
    End If
    
End Sub
Sub hideSheet()
    Worksheets("pw").Visible = xlVeryHidden
    
End Sub

You're using AES / Blowfish to encrypt the passwords, so excel doesnt really come into the equation
Is it worth us brute forcing the password? Or is it of too sensible quality to not bother.
 .  But I guess VBA is difficult to protect properly.
.  But I guess VBA is difficult to protect properly.Was simply asking if theres any gaping voids in implementation and creation of the tool.
I didnt set out to make any product of types but just a decent password holder for a lot of system passwords I keep that have a very short expiry date and refuse to allow anything similar to the previous 5-10 used.
If you guys think its secure enough then I wont ask you to waste time brute forcing it.
Out of curiosity though how would you be able to brute force this application?
Irrespective of the pass code being correct or incorrect it will return a password. Some sort of semi - intelligent gatherer whereby only logical (defined by coder) outcomes are kept?

We shouldn't have really been allowed to see the hashes in the first place. But I guess VBA is difficult to protect properly.
Cannot decrypt the passwords, unless you give me some super computers and a few years.
I can't see any implementation issues, providing you're not storing the key in plain text or something silly!
It's simple to brute force this application as we have a list of the password hashes, but because of the encryption technique used it's not really something I'd want to wait around for! I guess you mean brute force this application as in getting round the protection all together. I can't see that being possible because of the encryption.
You should see if you can protect the password hashes, and seeing them is a step too close for comfort
 
	