A Rust application for extracting and decrypting sensitive data from various web browsers' local storage. This tool decrypts saved passwords and other encrypted data using DPAPI and AES-256-GCM, providing insights into browser-stored credentials securely and efficiently.
- Cross-Browser Support: Extracts data from a variety of popular web browsers including Google Chrome, Brave, Microsoft Edge, and more.
- Encryption Decryption: Utilizes AES-256-GCM for decrypting sensitive data encrypted by browsers.
- Flexible Queries: Supports customizable SQL queries to extract specific data types such as passwords, credit card details, and more.
- Logins
- URL
- Email addresses
- Passwords
- Credit cards
- Card number
- Expiration date
- Name on card
- Cookies
- Logins
The application works by locating browser data directories, decrypting stored secrets using the DPAPI and AES-256-GCM algorithms, and executing SQL queries on the decrypted databases to retrieve relevant information.
- Rust programming language and Cargo build system installed.
- Clone the repository:
git clone https://github.com/Fastiraz/chromium-based-browsers-secrets-dump.git
cd chromium-based-browsers-secrets-dump
- Run the project:
cargo run
The application will automatically search for supported browsers' data directories on your system. Ensure to run the application with administrative or appropriate permissions to access browser data directories and decrypt secrets.
- Avast
- Amigo
- Torch
- Kometa
- Orbitum
- Cent Browser
- 7star
- Sputnik
- Vivaldi
- Google Chrome sxs
- Google Chrome
- Epic Privacy Browser
- Microsoft Edge
- Uran
- Yandex
- Brave Browser
- Iridium