Browser-password-stealer
Browser-password-stealer is a Python tool designed for extracting saved passwords, credit cards, bookmarks, and other sensitive data from Chromium-based browsers (Chrome, Microsoft Edge, Brave, etc.). It supports Chromium versions 80 and above and can retrieve data from various popular browsers that are based on Chromium architecture.
How It Works:
Installation: To set up the tool, first install the required dependencies by running:
Running the Tool: After installing the necessary dependencies, execute the script:
This script will automatically fetch saved passwords, credit card information, bookmarks, and other data from supported Chromium-based browsers.
Supported Browsers:
The script supports the following browsers, which are stored in specific directories on your computer:
Amigo
Torch
Kometa
Orbitum
CentBrowser
7Star
Sputnik
Vivaldi
Google Chrome
Epic Privacy Browser
Microsoft Edge
Uran
Yandex
Brave
Iridium
These browsers all store user data in specific user data directories, which the tool can access to extract the desired information.
Data Extraction Queries:
The tool uses SQL queries to extract data from specific files within the browser's user data directory. Here's a breakdown of the queries and data extraction:
Login Data:
Query:
SELECT action_url, username_value, password_value FROM logins
File:
Login Data
Columns:
URL, Email, Password
Decryption: Yes (the tool decrypts the passwords).
Credit Cards:
Query:
SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted, date_modified FROM credit_cards
File:
Web Data
Columns:
Name On Card, Card Number, Expires On, Added On
Decryption: Yes
Cookies:
Query:
SELECT host_key, name, path, encrypted_value, expires_utc FROM cookies
File:
Network\Cookies
Columns:
Host Key, Cookie Name, Path, Cookie, Expires On
Decryption: Yes
History:
Query:
SELECT url, title, last_visit_time FROM urls
File:
History
Columns:
URL, Title, Visited Time
Decryption: No (this data is stored in plain text).
Downloads:
Query:
SELECT tab_url, target_path FROM downloads
File:
History
Columns:
Download URL, Local Path
Decryption: No
Data Extraction Process:
The tool retrieves and decrypts the stored data (such as passwords and credit card information) from the relevant files using the
SQL
queries defined.The extracted data is parsed and displayed in a readable format.
For example, the Login Data query extracts the saved credentials such as the website URL, email, and password, which are then decrypted and printed to the output.
Last updated