# HackBrowserData

[**HackBrowserData**](https://github.com/moonD4rk/HackBrowserData) is a powerful command-line tool designed for extracting and decrypting browser data such as passwords, cookies, history, bookmarks, credit cards, downloads, localStorage, and browser extensions. It supports various popular web browsers and works across multiple operating systems, including Windows, macOS, and Linux.

#### **How it Works:**

The tool uses the profile paths from different browsers to locate and extract the sensitive data. Below are the commands and paths for accessing this data across different browsers and operating systems:

***

#### **Commands:**

To use HackBrowserData, you can run the following commands based on your needs:

1. **Extract All Browser Data (in JSON format)**:

   ```bash
   .\hack-browser-data.exe -b all -f json --dir results -zip
   ```
2. **Extract Specific Browser Data (e.g., Chrome)**:

   ```bash
   .\hack-browser-data.exe -b chrome -p "C:\Users\User\AppData\Local\Microsoft\Edge\User Data\Default"
   ```

These commands help you export data to a specified directory (`results`) and compress it as a zip file if needed.

***

#### **File Paths by OS and Browser**:

**Windows:**

* **Google Chrome**: `C:\Users\<YourUsername>\AppData\Local\Google\Chrome\User Data\Default\`
* **Microsoft Edge**: `C:\Users\<YourUsername>\AppData\Local\Microsoft\Edge\User Data\Default\`
* **Brave**: `C:\Users\<YourUsername>\AppData\Local\BraveSoftware\Brave-Browser\User Data\Default\`
* **Opera**: `C:\Users\<YourUsername>\AppData\Roaming\Opera Software\Opera Stable\`
* **Firefox**: `C:\Users\<YourUsername>\AppData\Roaming\Mozilla\Firefox\Profiles\<ProfileName>\`

**Linux:**

* **Google Chrome**: `~/.config/google-chrome/Default/`
* **Chromium**: `~/.config/chromium/Default/`
* **Edge**: `~/.config/microsoft-edge/Default/`
* **Brave**: `~/.config/BraveSoftware/Brave-Browser/Default/`
* **Firefox**: `~/.mozilla/firefox/<ProfileName>/`

**macOS:**

* **Google Chrome**: `~/Library/Application Support/Google/Chrome/Default/`
* **Chromium**: `~/Library/Application Support/Chromium/Default/`
* **Microsoft Edge**: `~/Library/Application Support/Microsoft Edge/Default/`
* **Brave**: `~/Library/Application Support/BraveSoftware/Brave-Browser/Default/`
* **Firefox**: `~/Library/Application Support/Firefox/Profiles/`

***

#### **Functionality and Extraction Capabilities:**

* **Passwords**: Extract stored website passwords and credentials.
* **Cookies**: Retrieve stored browser cookies, including the expiration date.
* **History**: Access browsing history, including URLs and timestamps.
* **Bookmarks**: Export saved website bookmarks.
* **Credit Cards**: Extract saved credit card information (including card numbers).
* **Downloads**: Retrieve download records and their respective paths.
* **localStorage**: Access locally stored data (such as HTML5 cookies).
* **Extensions**: Extract browser extensions installed on the system.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://karim-ashraf.gitbook.io/karim_ashraf_space/writeups/methods-for-stealing-password-in-browser/tools/hackbrowserdata.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
