Bt08s / Browser-Credentials-Stealer

Exports Chromium based browsers datas

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Credits for decryption

@henry-richard7

How it works

Saves decrypted credentials to %temp% as browser_name-data_type.txt

Features

Checks profiles: 'Default', 'Profile 1..50'
Saves cookies as Netscape Cookie formated

Datas

Passwords    ['Origin URL', 'Action URL', 'Username', 'Password']
Credit Cards ['Name on card', 'Card number', 'Expires', 'Modified']
Cookies      ['Domain', 'Secure', 'Path', 'Secure', 'Expires', 'Name', 'Value']
History      ['URL', 'Title', 'Time']
Downloads    ['URL', 'Path']

Browsers

> AVAST Browser
> Amigo
> Torch
> Kometa
> Orbitum
> Cent-browser
> 7star
> Sputnik
> Vivaldi
> Google-chrome-sxs
> Google-chrome
> Epic-privacy-browser
> Microsoft-edge
> Uran
> Yandex
> Brave
> Iridium

About

Exports Chromium based browsers datas

License:MIT License


Languages

Language:Python 97.3%Language:Batchfile 2.7%