Decrypt passwords/cookies/history/bookmarks from the browser.

HackBrowserData

CI Build Hack-Browser-Data Release

中文说明

hack-browser-data is an open-source tool that could help you decrypt data ( passwords|bookmarks|cookies|history ) from the browser. It supports the most popular browsers on the market and runs on Windows, macOS and Linux.

Statement: This tool is limited to security research only, and the user assumes all legal and related responsibilities arising from its use! The author assumes no legal responsibility!

Supported Browser

Windows

Browser Password Cookie Bookmark History
Google Chrome
Google Chrome Beta
Chromium
Firefox
Microsoft Edge
360 Speed Browser
QQ Browser
Brave Browser
Opera Browser
OperaGX Browser
Vivaldi Browser
Internet Explorer

MacOS

Based on Apple's security policy, some browsers require a current user password to decrypt.

Browser Password Cookie Bookmark History
Google Chrome
Google Chrome Beta
Chromium
Firefox
Microsoft Edge
Brave Browser
Opera Browser
OperaGX Browser
Vivaldi Browser
Safari

Linux

Browser Password Cookie Bookmark History
Google Chrome
Google Chrome Beta
Chromium
Firefox
Microsoft Edge Dev
Brave Browser
Opera Browser
Vivaldi Browser

Install

Installation of hack-browser-data is dead-simple, just download the release for your system and run the binary.

In some situations, this security tool will be treated as a virus by Windows Defender or other antivirus software and can not be executed, after version 0.2.6 will use UPX try to simply bypass, then no longer with antivirus software to do unnecessary security confrontations.The code is all open source, you can modify and compile by yourself.

Building from source

support go 1.14+

git clone https://github.com/moonD4rk/HackBrowserData

cd HackBrowserData

go get -v -t -d ./...

go build
Cross compile

Need install target OS's gcc library, here's an example of use Mac building for Windows and Linux

Windows

brew install mingw-w64

CGO_ENABLED=1 GOOS=windows GOARCH=amd64 CC="x86_64-w64-mingw32-gcc" go build

Linux

brew install FiloSottile/musl-cross/musl-cross

CC=x86_64-linux-musl-gcc CXX=x86_64-linux-musl-g++ GOARCH=amd64 GOOS=linux CGO_ENABLED=1 go build -ldflags "-linkmode external -extldflags -static"

Run

You can double-click to run, or use command line.

PS C:\test> .\hack-browser-data.exe -h
NAME:
   hack-browser-data - Export passwords/cookies/history/bookmarks from browser

USAGE:
   [hack-browser-data -b chrome -f json -dir results -cc]
   Get all data(password/cookie/history/bookmark) from chrome

VERSION:
   0.3.3
GLOBAL OPTIONS:
   --verbose, --vv                     verbose (default: false)
   --compress, --cc                    compress result to zip (default: false)
   --browser value, -b value           available browsers: all|opera|firefox|chrome|edge (default: "all")
   --results-dir value, --dir value    export dir (default: "results")
   --format value, -f value            format, csv|json|console (default: "csv")
   --profile-dir-path value, -p value  custom profile dir path, get with chrome://version
   --key-file-path value, -k value     custom key file path
   --help, -h                          show help (default: false)
   --version, -v                       print the version (default: false)

PS C:\test>  .\hack-browser-data.exe -b all -f json --dir results -cc
[x]:  Get 44 cookies, filename is results/microsoft_edge_cookie.json
[x]:  Get 54 history, filename is results/microsoft_edge_history.json
[x]:  Get 1 passwords, filename is results/microsoft_edge_password.json
[x]:  Get 4 bookmarks, filename is results/microsoft_edge_bookmark.json
[x]:  Get 6 bookmarks, filename is results/360speed_bookmark.json
[x]:  Get 19 cookies, filename is results/360speed_cookie.json
[x]:  Get 18 history, filename is results/360speed_history.json
[x]:  Get 1 passwords, filename is results/360speed_password.json
[x]:  Get 12 history, filename is results/qq_history.json
[x]:  Get 1 passwords, filename is results/qq_password.json
[x]:  Get 12 bookmarks, filename is results/qq_bookmark.json
[x]:  Get 14 cookies, filename is results/qq_cookie.json
[x]:  Get 28 bookmarks, filename is results/firefox_bookmark.json
[x]:  Get 10 cookies, filename is results/firefox_cookie.json
[x]:  Get 33 history, filename is results/firefox_history.json
[x]:  Get 1 passwords, filename is results/firefox_password.json
[x]:  Get 1 passwords, filename is results/chrome_password.json
[x]:  Get 4 bookmarks, filename is results/chrome_bookmark.json
[x]:  Get 6 cookies, filename is results/chrome_cookie.json
[x]:  Get 6 history, filename is results/chrome_history.json
[x]:  Compress success, zip filename is results/archive.zip

Run with custom browser profile path

PS C:\Users\User\Desktop> .\hack-browser-data.exe -b edge -p 'C:\Users\User\AppData\Local\Microsoft\Edge\User Data\Default' -k 'C:\Users\User\AppData\Local\Microsoft\Edge\User Data\Local State'

[x]:  Get 29 history, filename is results/microsoft_edge_history.csv
[x]:  Get 0 passwords, filename is results/microsoft_edge_password.csv
[x]:  Get 1 credit cards, filename is results/microsoft_edge_credit.csv
[x]:  Get 4 bookmarks, filename is results/microsoft_edge_bookmark.csv
[x]:  Get 54 cookies, filename is results/microsoft_edge_cookie.csv


PS C:\Users\User\Desktop> .\hack-browser-data.exe -b edge -p 'C:\Users\User\AppData\Local\Microsoft\Edge\User Data\Default'

[x]:  Get 1 credit cards, filename is results/microsoft_edge_credit.csv
[x]:  Get 4 bookmarks, filename is results/microsoft_edge_bookmark.csv
[x]:  Get 54 cookies, filename is results/microsoft_edge_cookie.csv
[x]:  Get 29 history, filename is results/microsoft_edge_history.csv
[x]:  Get 0 passwords, filename is results/microsoft_edge_password.csv

Contributors

404StarLink 2.0 - Galaxy

HackBrowserData is a part of 404Team StarLink-Galaxy, if you have any questions about HackBrowserData or want to find a partner to communicate with,please refer to the Starlink group.

TODO

Desktop Browser Market Share Worldwide

Chrome Safari Firefox Edge Legacy IE Other
68.33% 9.4% 8.91% 4.41% 3% 3%

Desktop Browser Market Share China

Chrome 360 Safe Firefox QQ Browser IE Sogou Explorer
39.85% 22.26% 9.28% 6.5% 5.65% 4.74%
  • Chrome
  • QQ browser
  • Edge
  • 360 speed browser
  • Firefox
  • Safari
  • IE
Owner
ᴍᴏᴏɴD4ʀᴋ
ᴛʜᴇʀᴇ ɪs ɴᴏ ᴅᴀʀᴋ sɪᴅᴇ ᴏғ ᴛʜᴇ ᴍᴏᴏɴ ʀᴇᴀʟʟʏ. ᴍᴀᴛᴛᴇʀ ᴏғ ғᴀᴄᴛ ɪᴛ's ᴀʟʟ ᴅᴀʀᴋ.
ᴍᴏᴏɴD4ʀᴋ
Comments
  • find browser Chrome failed, profile folder is not exist

    find browser Chrome failed, profile folder is not exist

    Describe the bug ./hack-browser-data -vv :

    [NOTICE] [browser.go:46,pickChromium] find browser OperaGX failed, profile folder is not exist
    [NOTICE] [browser.go:46,pickChromium] find browser CocCoc failed, profile folder is not exist
    [INFO] [chromium.go:89,getItemPath] Brave profile parentDir: C:\Users\User\AppData\Local\BraveSoftware\Brave-Browser\User Data
    [INFO] [chromium.go:90,getItemPath] Brave profile baseDir: Default
    [NOTICE] [browser.go:50,pickChromium] find browser Brave success
    [NOTICE] [browser.go:46,pickChromium] find browser QQ failed, profile folder is not exist
    [INFO] [chromium.go:89,getItemPath] Microsoft Edge profile parentDir: C:\Users\User\AppData\Local\Microsoft\Edge\User Data
    [INFO] [chromium.go:90,getItemPath] Microsoft Edge profile baseDir: Default
    [NOTICE] [browser.go:50,pickChromium] find browser Microsoft Edge success
    [NOTICE] [browser.go:46,pickChromium] find browser Opera failed, profile folder is not exist
    [NOTICE] [browser.go:46,pickChromium] find browser Chrome Beta failed, profile folder is not exist
    [NOTICE] [browser.go:46,pickChromium] find browser Vivaldi failed, profile folder is not exist
    [NOTICE] [browser.go:46,pickChromium] find browser Yandex failed, profile folder is not exist
    [NOTICE] [browser.go:46,pickChromium] find browser 360speed failed, profile folder is not exist
    [NOTICE] [browser.go:46,pickChromium] find browser Chrome failed, profile folder is not exist
    [NOTICE] [browser.go:46,pickChromium] find browser Chromium failed, profile folder is not exist
    
    • Cannot find Chrome folder: find browser Chrome failed, profile folder is not exist

      • My Chrome Version: 101.0.4951.54 (Official Build) (64-bit)
    • Cannot find Chromium folder: find browser Chromium failed, profile folder is not exist

    • Cannot find OperaGX folder: find browser OperaGX failed, profile folder is not exist

      • My OperaGX Version: LVL3 (core: 77.0.4054.298)

    Desktop (please complete the following information):

    • OS Name: Windows 8.1 Pro
    • Browser Name 1: Chrome
    • Browser Version 1: 101.0.4951.54 (Official Build) (64-bit)
    • Browser Name 2: OperaGX
    • Browser Version 2: LVL3 (core: 77.0.4054.298)

    Additional context Browsers profile folders are not recognized even though I use them and all data is saved in them.

  • Chrome >84 version password field is

    Chrome >84 version password field is ""

    Thanks for the author this tools Describe the bug A clear and concise description of what the bug is. cannot get password, just password field null value, other field was fine. HackBrowserData V0.2.5

    Desktop (please complete the following information):

    • OS Name 操作系统名称: Ubuntu20.04 , Mac Seria
    • Browser Name 浏览器名称: Chrome
    • Browser Version 浏览器版本:(ubuntu) 85.0.4183.102(正式版本) (64 位) ,(Mac)86.0.4240.111

    Additional context Add any other context about the problem here.

  • Problems with chrome cookies

    Problems with chrome cookies

    Describe the bug Use ./hack-browser-data -vv paste result here

    Desktop (please complete the following information):

    • OS Name: Windows 10 Pro
    • Browser Name: Chrome
    • Browser Version: 96.0.4664.93 64 bit

    Additional context Add any other context about the problem here.

    Does not load chrome cookies, also completely ignores the Yandex browser, cookies are not imported in json or svc if you convert them to netscape

  • 无法正常提取qq浏览器的password和书签内容,360浏览器的数据提取完全无法工作

    无法正常提取qq浏览器的password和书签内容,360浏览器的数据提取完全无法工作

    Describe the bug

    无法正常提取qq浏览器的password和书签内容

    错误返回

    browser.go:132: debug qq find bookmark File Success
    browser.go:132: debug qq find cookie File Success
    browser.go:132: debug qq find history File Success
    browser.go:132: debug qq find password File Success
    [x]:  Get 20 bookmarks, filename is results/qq_bookmark.csv
    [x]:  Get 1318 cookies, filename is results/qq_cookie.csv
    [x]:  Get 7440 history, filename is results/qq_history.csv
    [x]:  Get 0 passwords, filename is results/qq_password.csv
    browser.go:181: error Firefox find bookmark file failed, ERR:find places.sqlite
    failed
    browser.go:181: error Firefox find cookie file failed, ERR:find cookies.sqlite f
    ailed
    browser.go:181: error Firefox find history file failed, ERR:find places.sqlite f
    ailed
    browser.go:175: error Firefox find password file failed, ERR:find logins.json fa
    iled
    cmd.go:53: error open C:\Users\Administrator/AppData/Local/BraveSoftware/Brave-B
    rowser/User Data/Local State: The system cannot find the path specified.
    browser.go:128: error Brave find cookie file failed, ERR:find Cookies failed
    browser.go:128: error Brave find history file failed, ERR:find History failed
    browser.go:128: error Brave find password file failed, ERR:find Login Data faile
    d
    browser.go:128: error Brave find bookmark file failed, ERR:find Bookmarks failed
    
    browser.go:132: debug Chrome find cookie File Success
    browser.go:132: debug Chrome find history File Success
    browser.go:132: debug Chrome find password File Success
    browser.go:132: debug Chrome find bookmark File Success
    [x]:  Get 76 cookies, filename is results/chrome_cookie.csv
    [x]:  Get 237 history, filename is results/chrome_history.csv
    [x]:  Get 6 passwords, filename is results/chrome_password.csv
    [x]:  Get 8 bookmarks, filename is results/chrome_bookmark.csv
    cmd.go:53: error open C:\Users\Administrator/AppData/Local/Microsoft/Edge/User D
    ata/Local State: The system cannot find the path specified.
    browser.go:128: error Microsoft Edge find history file failed, ERR:find History
    failed
    browser.go:128: error Microsoft Edge find password file failed, ERR:find Login D
    ata failed
    browser.go:128: error Microsoft Edge find bookmark file failed, ERR:find Bookmar
    ks failed
    browser.go:128: error Microsoft Edge find cookie file failed, ERR:find Cookies f
    ailed
    browser.go:128: error 360speed find bookmark file failed, ERR:find Bookmarks fai
    led
    browser.go:128: error 360speed find cookie file failed, ERR:find Cookies failed
    browser.go:128: error 360speed find history file failed, ERR:find History failed
    
    browser.go:128: error 360speed find password file failed, ERR:find Login Data fa
    iled
    
    

    Desktop (please complete the following information):

    • OS Name 操作系统名称: Windows 7 64bit
    • Browser Name 浏览器名称:QQ浏览器
    • Browser Version 浏览器版本:10.6.4212.400

    Additional context

    QQ浏览器中导出的密码是空的(只有列标题)

    此外QQ浏览器中导出的书签虽然有数据,但似乎被经过伪造

    Chrome数据导出正常,但是360浏览器的数据完全没导出(连空的csv都没有产生)

    运行的hacker-browse版本为hacker-browserr-data-v0.2.7的Release中二进制文件,非自行编译

  • Doesn't extract passwords from Firefox

    Doesn't extract passwords from Firefox

    I am using both release 0.2.8 and my build from latest source with this commands:

    • .\hack-browser-data.exe -b all -f json -dir results -cc
    • .\hack-browser-data.exe -b firefox -f json -dir results -cc
    • .\hack-browser-data.exe -b all

    It does find Everthing on Edge (version 86.0.622.69) and chrome (version 86.0.4240.198) but no luck in finding passwords from firefox.

    Desktop :

    • OS Name : Windows 10 2004
    • Browser Name : FireFox
    • Browser Version : 78.0.1 and 82.0.3 (latest)

    Additional context : I have tried both running command in privileged mode and while firefox processes are terminated. Also logs aren't clear and too much go error in case it doesn't find anything. For firefox and this command .\hack-browser-data.exe -b all -f json -dir results -cc logs look like this: decrypt_windows.go:122: error asn1: structure error: tags don't match (16 vs {class:0 tag:4 length:20 isCompound:false}) {optional:false explicit:false application:false private:false defaultValue:<nil> tag:<nil> stringType:0 timeType:0 set:false omitEmpty:false} SequenceC @2 parse.go:523: error decrypt meta data failed asn1: structure error: tags don't match (16 vs {class:0 tag:4 length:20 isCompound:false}) {optional:false explicit:false application:false private:false defaultValue:<nil> tag:<nil> stringType:0 timeType:0 set:false omitEmpty:false} SequenceC @2 cmd.go:77: error asn1: structure error: tags don't match (16 vs {class:0 tag:4 length:20 isCompound:false}) {optional:false explicit:false application:false private:false defaultValue:<nil> tag:<nil> stringType:0 timeType:0 set:false omitEmpty:false} SequenceC @2 [x]: Get 0 passwords, filename is results/firefox_password.json [x]: Get 27 bookmarks, filename is results/firefox_bookmark.json [x]: Get 854 cookies, filename is results/firefox_cookie.json [x]: Get 21277 history, filename is results/firefox_history.json

  • Cannot recover Chrome using files copied from Widnows 10 to Linux

    Cannot recover Chrome using files copied from Widnows 10 to Linux

    After recovering files from old qemu VM image where Windows 10 was installed (using qemu-nbd --connect) I copied files with Google Chrome profile to my Fedora laptop.

    When running HackBrowserData from CLI I get:

     $ ./hack-browser-data -p "$HOME/Pobrane/google-mms-old/Chrome/User Data/Default" -b chrome
    [x]:  Get 4 bookmarks, filename is results/chrome_bookmark.csv 
    panic: crypto/cipher: input not full blocks
    
    goroutine 1 [running]:
    crypto/cipher.(*cbcDecrypter).CryptBlocks(0xc0000bc1e0, 0xc0000bab40, 0x103, 0x103, 0xc0000baa23, 0x103, 0x103)
    	/usr/lib/golang/src/crypto/cipher/cbc.go:119 +0x4e9
    hack-browser-data/core/decrypt.aes128CBCDecrypt(0xc000090920, 0x10, 0x14, 0xa96540, 0x10, 0x10, 0xc0000baa23, 0x103, 0x103, 0xa8e560, ...)
    	/home/mateusz/hack-browser-data/HackBrowserData/core/decrypt/decrypt.go:26 +0x12a
    hack-browser-data/core/decrypt.ChromePass(0xc000090920, 0x10, 0x14, 0xc0000baa20, 0x106, 0x106, 0x0, 0x0, 0xc0000afc80, 0x0, ...)
    	/home/mateusz/hack-browser-data/HackBrowserData/core/decrypt/decrypt_linux.go:24 +0xf6
    hack-browser-data/core/data.(*cookies).ChromeParse(0xc0000d3000, 0xc000090920, 0x10, 0x14, 0x0, 0x0)
    	/home/mateusz/hack-browser-data/HackBrowserData/core/data/parse.go:247 +0x8a5
    hack-browser-data/cmd.Execute.func1(0xc000060800, 0xc00000ed00, 0xe)
    	/home/mateusz/hack-browser-data/HackBrowserData/cmd/cmd.go:85 +0x5a6
    github.com/urfave/cli/v2.(*App).RunContext(0xc000001980, 0x8bd800, 0xc00001c118, 0xc0000120a0, 0x5, 0x5, 0x0, 0x0)
    	/home/mateusz/go/pkg/mod/github.com/urfave/cli/[email protected]/app.go:315 +0x70d
    github.com/urfave/cli/v2.(*App).Run(...)
    	/home/mateusz/go/pkg/mod/github.com/urfave/cli/[email protected]/app.go:215
    hack-browser-data/cmd.Execute()
    	/home/mateusz/hack-browser-data/HackBrowserData/cmd/cmd.go:114 +0x7c5
    main.main()
    	/home/mateusz/hack-browser-data/HackBrowserData/main.go:8 +0x25
    
    $ tree results 
    results
    └── chrome_bookmark.csv
    
    0 directories, 1 file
    

    Desktop (please complete the following information):

    • OS Name: Source files from Windows 10 Pro, running passwords recovery on Fedora 33
    • Browser Name: Google Chrome
    • Browser Version Source files version unknow at the moment (at least 6 months old):

    Additional context Cannot run this VM anymore - Windows is in unbootable state. I can recover more files from qcow2 image if needed.

    I'm trying to recover password that was saved only on that VM in Google Chrome.

  • 编译后无法正确运行

    编译后无法正确运行

    Mac上跨平台编译Windows exe 编译后无法正确运行

    browser.go:121: error Chrome find bookmark file failed, ERR:find Bookmarks failed
    panic: runtime error: invalid memory address or nil pointer dereference
            panic: runtime error: invalid memory address or nil pointer dereference
    [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x113e396]
    
    goroutine 1 [running]:
    database/sql.(*Rows).close(0x0, 0x0, 0x0, 0x0, 0x0)
            /usr/local/Cellar/go/1.14.5/libexec/src/database/sql/sql.go:3063 +0x76
    database/sql.(*Rows).Close(...)
            /usr/local/Cellar/go/1.14.5/libexec/src/database/sql/sql.go:3059
    hack-browser-data/core/common.(*historyData).ChromeParse.func2(0x0)
            /intranet_tools/mutil/HackBrowserData/core/common/parse.go:312 +0x37
    panic(0x1274840, 0x14c62b0)
            /usr/local/Cellar/go/1.14.5/libexec/src/runtime/panic.go:969 +0x166
    database/sql.(*Rows).Next(0x0, 0x13188c0)
            /usr/local/Cellar/go/1.14.5/libexec/src/database/sql/sql.go:2744 +0x30
    hack-browser-data/core/common.(*historyData).ChromeParse(0xc000078ba0, 0xc000016760, 0x10, 0x14, 0x0, 0x0)
            /intranet_tools/mutil/HackBrowserData/core/common/parse.go:316 +0x137
    hack-browser-data/cmd.Execute.func1(0xc00010e740, 0xc00000ca00, 0xc)
            /intranet_tools/mutil/HackBrowserData/cmd/cmd.go:71 +0x537
    github.com/urfave/cli/v2.(*App).RunContext(0xc000001200, 0x13188c0, 0xc0000181e0, 0xc000010210, 0x1, 0x1, 0x0, 0x0)
            /Users/l/gocode/pkg/mod/github.com/urfave/cli/[email protected]/app.go:315 +0x70b
    github.com/urfave/cli/v2.(*App).Run(...)
            /Users/l/gocode/pkg/mod/github.com/urfave/cli/[email protected]/app.go:215
    hack-browser-data/cmd.Execute()
            /intranet_tools/mutil/HackBrowserData/cmd/cmd.go:100 +0x739
    main.main()
            /intranet_tools/mutil/HackBrowserData/main.go:8 +0x20
    
  • Chromium panic: runtime error: slice bounds out of range [:-86]

    Chromium panic: runtime error: slice bounds out of range [:-86]

    Describe the bug Use ./hack-browser-data -vv paste result here

    
    browser.go:158: debug Chromium find bookmark File Success
    browser.go:158: debug Chromium find cookie File Success
    browser.go:158: debug Chromium find history File Success
    browser.go:158: debug Chromium find download File Success
    browser.go:158: debug Chromium find password File Success
    browser.go:158: debug Chromium find creditcard File Success
    [x]:  Get 940 bookmarks, filename is results/chromium_bookmark.csv 
    panic: runtime error: slice bounds out of range [:-86]
    
    goroutine 1 [running]:
    hack-browser-data/core/decrypt.PKCS5UnPadding(...)
            /src/HackBrowserData/core/decrypt/decrypt.go:189
    hack-browser-data/core/decrypt.aes128CBCDecrypt({0xc000202c48?, 0xf1773c001?, 0x0?}, {0xc0002a0640, 0x10, 0x10}, {0xc00001e583, 0x30, 0x30})
            /src/HackBrowserData/core/decrypt/decrypt.go:182 +0x159
    hack-browser-data/core/decrypt.ChromePass({0xc000202c48, 0x10, 0x14}, {0xc00001e580, 0x33, 0x33})
            /src/HackBrowserData/core/decrypt/decrypt_linux.go:9 +0xc5
    hack-browser-data/core/data.(*cookies).ChromeParse(0xc000261bf0, {0xc000202c48, 0x10, 0x14})
            /src/HackBrowserData/core/data/parse.go:251 +0x648
    hack-browser-data/cmd.Execute.func1(0xc000140000?)
            /src/HackBrowserData/cmd/cmd.go:86 +0x48a
    github.com/urfave/cli/v2.(*App).RunContext(0xc00013c000, {0x84d328?, 0xc0000b60e0}, {0xc0000a6000, 0x4, 0x4})
            /.go/pkg/mod/github.com/urfave/cli/[email protected]/app.go:315 +0x9cc
    github.com/urfave/cli/v2.(*App).Run(...)
            /.go/pkg/mod/github.com/urfave/cli/[email protected]/app.go:215
    hack-browser-data/cmd.Execute()
            /src/HackBrowserData/cmd/cmd.go:115 +0x9d2
    main.main()
            /src/HackBrowserData/main.go:8 +0x17
    

    Desktop (please complete the following information):

    • OS Name: Arch Linux
    • Browser Name: Chromium
    • Browser Version: 100.0.4896.75

    Additional context Add any other context about the problem here.

  • Cookies/password decrypt in chrome/chromium 88

    Cookies/password decrypt in chrome/chromium 88

    Describe the bug A clear and concise description of what the bug is. 描述一下遇到的 Bug,和对应的报错信息 ./hack-browser-data -vv Hi It isnt decrypting Cookies and Password values in Google Chrome 88 and Brave 1.19.92 (Chromium: 88)

    d251113d-384f-492c-a510-f7fe043a669e

    In firefox it works fine

    Desktop (please complete the following information):

    • OS Name 操作系统名称: Debian Buster
    • Browser Name 浏览器名称: Google Chrome and Chromium
    • Browser Version 浏览器版本: 88

    Additional context Add any other context about the problem here. 其他有用的信息

  • warning when build on windows 10

    warning when build on windows 10

    github.com/mattn/go-sqlite3

    sqlite3-binding.c: In function 'sqlite3SelectNew':
    sqlite3-binding.c:129019:10: warning: function may return address of local variable [-Wreturn-local-addr] 129019 | return pNew;
    | ^~~~ sqlite3-binding.c:128979:10: note: declared here 128979 | Select standin; | ^~~~~~~

    ========================== all .csv file have random column have random name (ex: chrome_password.csv : QoWJyY3V,NVYpZ7ht,IfHzGZiO,EtIP2BI3 chrome_cookie.csv: FqlOsfmu,NX4QOYkP,ZajoU5Q2,ZyX4bNBf,VOBmxR5G,AcqHYqrO,AXWDloTC,Vbzl53Ym,ElYv41bL,AYam4ZAJ )

  • Is it because of my misoperation

    Is it because of my misoperation

    hackbrowser.exe -b chrome -f console I used the above command, and the result is not correct. Is it because the chrome version is too new version:95.0.4638.69 Or is it because the order is wrong image

Sign, verify, encrypt and decrypt data with GPG in your browser.
Sign, verify, encrypt and decrypt data with GPG in your browser.

keygaen Sign, verify, encrypt and decrypt data with GPG in your browser. ⚠️ keygaen has not yet been audited! While we try to make keygaen as secure a

Nov 22, 2022
🌰 encrypt/decrypt using ssh keys

ssh-vault ?? encrypt/decrypt using ssh private keys Documentation https://ssh-vault.com Usage $ ssh-vault -h Example: $ echo "secret" | ssh-vault -u

Dec 30, 2022
ddlcpad, *Doki Doki Literature Club Plus Asset Decrypter*, is a tool to decrypt the encrypted asset file on the Doki Doki Literature Club Plus. Writing in golang.

ddlcpad 简体中文 What is this ddlcpad is short of Doki Doki Literature Club Plus Asset Decrypter You can decrypt the *.cy file from Doki Doki Literature C

Nov 27, 2022
ThanosDecryptor is an project to decrypt files encrypted by Thanos ransomware.

Prometheus-Decryptor Prometheus-Decryptor is an project to decrypt files encrypted by Prometheus ransomware. Command Arguments Usage of ./bin/promethe

Dec 16, 2022
Finds common flaws in passwords. Like cracklib, but written in Go.

crunchy Finds common flaws in passwords. Like cracklib, but written in Go. Detects: ErrEmpty: Empty passwords ErrTooShort: Too short passwords ErrNoDi

Dec 30, 2022
Proof of History in Golang. Taking key concepts from the Solana whitepaper and providing examples in Go

Proof of History - Concepts in Go ________ ________ ___ ___ |\ __ \|\ __ \|\ \|\ \ \ \ \|\ \ \ \|\ \ \ \\\ \

Oct 13, 2022
Gopass Browser Bindings

JSON API gopass-jsonapi enables communication with gopass via JSON messages. This is particularly useful for browser plugins like gopassbridge running

Dec 21, 2022
Build apps that run everywhere with Go and a browser engine of your choice (Chrome, Firefox, Epiphany or Android WebView).

hydrapp Build apps that run everywhere with Go and a browser engine of your choice (Chrome, Firefox, Epiphany or Android WebView). Overview ?? This pr

Dec 14, 2022
hack-browser-data is an open-source tool that could help you decrypt data from the browser.
hack-browser-data is an open-source tool that could help you decrypt data  from the browser.

hack-browser-data is an open-source tool that could help you decrypt data ( password|bookmark|cookie|history|credit card|download

Dec 23, 2022
Mange your browser bookmarks with CLI.
Mange your browser bookmarks with CLI.

go-bookmark Mange your browser bookmarks with CLI.

Dec 3, 2022
Alfred 4 workflow to easily search and launch bookmarks from the Brave Browser

Alfred Brave Browser Bookmarks A simple and fast workflow for searching and launching Brave Browser bookmarks. Why this workflow? No python dependency

Nov 28, 2022
One Time Passwords (OTPs) are an mechanism to improve security over passwords alone.

otp: One Time Password utilities Go / Golang Why One Time Passwords? One Time Passwords (OTPs) are an mechanism to improve security over passwords alo

Jan 7, 2023
Sign, verify, encrypt and decrypt data with GPG in your browser.
Sign, verify, encrypt and decrypt data with GPG in your browser.

keygaen Sign, verify, encrypt and decrypt data with GPG in your browser. ⚠️ keygaen has not yet been audited! While we try to make keygaen as secure a

Nov 22, 2022
Query browser cookies for golang

browser cookie query Only supported temporarily macOS,theoretically,it supports all chromium browsers valid browser : Edge Chrome Installation exec go

Dec 12, 2021
Shows your recent browser history in tree style. 树状展示浏览器历史 (For Edge / Chromium / Chrome)
Shows your recent browser history in tree style. 树状展示浏览器历史  (For Edge / Chromium / Chrome)

Tree Style Histyle This extension shows your recent browser history in tree style. When you browser pages from internet, you always jump from one page

Jan 3, 2023
Libraries and CLIs for my personal all-in-one productivity system including components like bookmarks, notes, todos, projects, etc.

bntp.go Libraries and CLIs for my personal all-in-one productivity system including components like bookmarks, notes, todos, projects, etc. Neovim int

Sep 13, 2022
🌭 The hotdog web browser and browser engine 🌭
🌭 The hotdog web browser and browser engine 🌭

This is the hotdog web browser project. It's a web browser with its own layout and rendering engine, parsers, and UI toolkit! It's made from scratch e

Dec 30, 2022
[DEPRECATED] Go package authcookie implements creation and verification of signed authentication cookies.

Package authcookie import "github.com/dchest/authcookie" Package authcookie implements creation and verification of signed authentication cookies. Co

Dec 22, 2022
🌰 encrypt/decrypt using ssh keys

ssh-vault ?? encrypt/decrypt using ssh private keys Documentation https://ssh-vault.com Usage $ ssh-vault -h Example: $ echo "secret" | ssh-vault -u

Dec 30, 2022
🌰 encrypt/decrypt using ssh keys

ssh-vault ?? encrypt/decrypt using ssh private keys Documentation https://ssh-vault.com Usage $ ssh-vault -h Example: $ echo "secret" | ssh-vault -u

Dec 30, 2022