Fading Coder

One Final Commit for the Last Sprint

Home > Tech > Content

Extracting Browser Credentials with HackBrowserData

Tech May 15 1

HackBrowserData is a command-line utility designed to decrypt and export browser-stored data—including passwords, cookies, history, bookmarks, credit cards, downloads, local storage, and extensiosn. It supports the most popular browsers across Windows, macOS, and Linux.

Disclaimer: This tool is intended solely for security research. Users bear full legal responsibility for any consequences arising from its use. The original author assumes no liability.

Supported Browsers

Windows

macOS

Due to Apple's security policies, some browsers require the current user password for decryption.

Linux

Getting Started

Installation

Installation is straightforward: download the prebuilt binary for your platform and run the executable.

Note: Some antivirus or Windows Defender may flag this security tool as malicious. The complete source code is available on GitHub, allowing you to inspect, modify, and recompile it yourself.

Building from source requires Go 1.18+ with generics support:

git clone https://github.com/moonD4rk/HackBrowserData.git
cd HackBrowserData/cmd/hack-browser-data
CGO_ENABLED=1 go build

Cross-compilation example (building for Windows and Linux from macOS):

For Windows:

brew install mingw-w64
CGO_ENABLED=1 GOOS=windows GOARCH=amd64 CC=x86_64-w64-mingw32-gcc go build

For Linux:

brew install FiloSottile/musl-cross/musl-cross
CC=x86_64-linux-musl-gcc CXX=x86_64-linux-musl-g++ GOARCH=amd64 GOOS=linux CGO_ENABLED=1 go build -ldflags "-linkmode external -extldflags -static"

Usage

You can run the binary by double-clicking or using the command line:

PS C:\test> .\hack-browser-data.exe -h

Usage: hack-browser-data [-b browser] [-f format] [--dir output_dir] [--zip]
Export all browsing data (passwords, cookies, history, bokomarks).

Available options:

  • --verbose, --vv: Enable verbose output (default: false)
  • --compress, --zip: Compress results into a ZIP archive (default: false)
  • --browser, -b: Target browser: all|brave|chrome|chrome-beta|chromium|coccoc|edge|firefox|opera|opera-gx|vivaldi|yandex (default: "all")
  • --results-dir, --dir: Output directory (default: "results")
  • --format, -f: Output file format: csv|json (default: "csv")
  • --profile-path, -p: Custom browser profile directory path (use chrome://version to find it)
  • --full-export, --full: Export complete browsing data (default: true)
  • --help, -h: Show help
  • --version, -v: Print version

Example: Export all browsers to JSON and compress results

PS C:\test> .\hack-browser-data.exe -b all -f json --dir results --zip
[NOTICE] [browser.go:46,pickChromium] Found Chrome browser successfully
[NOTICE] [browser.go:46,pickChromium] Found Microsoft Edge browser successfully
[NOTICE] [browsingdata.go:59,Output] Successfully exported to file results/microsoft_edge_download.json
[NOTICE] [browsingdata.go:59,Output] Successfully exported to file results/microsoft_edge_password.json
[NOTICE] [browsingdata.go:59,Output] Successfully exported to file results/microsoft_edge_creditcard.json
[NOTICE] [browsingdata.go:59,Output] Successfully exported to file results/microsoft_edge_bookmark.json
[NOTICE] [browsingdata.go:59,Output] Successfully exported to file results/microsoft_edge_cookie.json
[NOTICE] [browsingdata.go:59,Output] Successfully exported to file results/microsoft_edge_history.json
[NOTICE] [browsingdata.go:59,Output] Successfully exported to file results/chrome_history.json
[NOTICE] [browsingdata.go:59,Output] Successfully exported to file results/chrome_download.json
[NOTICE] [browsingdata.go:59,Output] Successfully exported to file results/chrome_password.json
[NOTICE] [browsingdata.go:59,Output] Successfully exported to file results/chrome_creditcard.json
[NOTICE] [browsingdata.go:59,Output] Successfully exported to file results/chrome_bookmark.json
[NOTICE] [browsingdata.go:59,Output] Successfully exported to file results/chrome_cookie.json

Using a custom browser profile path
Specify the profile directory with -p. Ensure the path is enclosed in double quotes.

PS C:\Users\User\Desktop> .\hack-browser-data.exe -b chrome -p "C:\Users\User\AppData\Local\Microsoft\Edge\User Data\Default"
[NOTICE] [browsingdata.go:59,Output] Successfully exported to file results/chrome_creditcard.csv
[NOTICE] [browsingdata.go:59,Output] Successfully exported to file results/chrome_bookmark.csv
[NOTICE] [browsingdata.go:59,Output] Successfully exported to file results/chrome_cookie.csv
[NOTICE] [browsingdata.go:59,Output] Successfully exported to file results/chrome_history.csv
[NOTICE] [browsingdata.go:59,Output] Successfully exported to file results/chrome_download.csv
[NOTICE] [browsingdata.go:59,Output] Successfully exported to file results

Related Articles

Understanding Strong and Weak References in Java

Strong References Strong reference are the most prevalent type of object referencing in Java. When an object has a strong reference pointing to it, the garbage collector will not reclaim its memory. F...

Comprehensive Guide to SSTI Explained with Payload Bypass Techniques

Introduction Server-Side Template Injection (SSTI) is a vulnerability in web applications where user input is improper handled within the template engine and executed on the server. This exploit can r...

Implement Image Upload Functionality for Django Integrated TinyMCE Editor

Django’s Admin panel is highly user-friendly, and pairing it with TinyMCE, an effective rich text editor, simplifies content management significantly. Combining the two is particular useful for bloggi...

Leave a Comment

Anonymous

◎Feel free to join the discussion and share your thoughts.