Skip to content

Tool for extracting credentials locally stored by web browsers

Notifications You must be signed in to change notification settings

Apr4h/HarvestBrowserPasswords

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

41 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

HarvestBrowserPasswords

A Windows tool for extracting credentials locally stored by Google Chrome and Mozilla Firefox web browsers

This tool will only decrypt stored logins for Mozilla Firefox versions 58.0.2 - < 75.0

Decrypts Google Chrome passwords for the currently logged-on user by locating "Login Data" database files and using DPAPI to decrypt passwords

Decrypts Mozilla Firefox passwords for all available profiles by locating 'key4.db' databases and 'logins.json' files for 3DES decryption. Supports decryption using a master password using the -p option if master password is known.

A compiled standalone executable is available here

Usage

HarvestBrowserPasswords.exe <options>

Command Line Options

-c, --chrome       Locate and decrypt Google Chrome logins

-f, --firefox      Locate and decrypt Mozilla Firefox logins

-a, --all          Locate and decrypt Google Chrome and Mozilla Firefox logins

-p, --password     (Optional) Master password for Mozilla Firefox Logins

-o, --outfile      Write output to csv

--help             Display help message

About

Tool for extracting credentials locally stored by web browsers

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages