ChromeStealer is an educational tool developed by @bernKing20 to demonstrate how to extract and decrypt stored passwords from Google Chrome on Windows systems using C/C++.
The project aims to address gaps in existing resources by providing a functional and detailed implementation.
ChromeStealer focuses on decrypting passwords stored locally by Google Chrome. Chrome uses the AES-GCM algorithm for encrypting sensitive data, with the encryption key stored in a Local State
JSON file and the encrypted passwords in an SQLite database called Login Data
.
ChromeStealer retrieves these files, extracts the encryption key using Windows API functions like CryptUnprotectData
, and decrypts the stored passwords.
The tool is built with dependencies such as:
To use ChromeStealer, ensure you have Visual Studio 2022 and vcpkg installed. Follow these steps:
git clone https://github.com/BernKing/ChromeStealer.git
cd ChromeStealer
vcpkg install libsodium jsoncpp sqlite3
ChromeStealer is designed for educational purposes only, helping users understand how password storage works in Chrome.
Misuse of this tool can lead to legal consequences, and users are advised to operate it only on systems they own or have explicit permission to test.
The project is open-source under the MIT License. It acknowledges contributions from libraries like libsodium, nlohmann/json, and sqlite3.
For further technical details or code, visit ChromeStealer’s GitHub repository or read the full write-up on BernKing’s blog.
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…