Skip to content

Something Awesome Project for COMP6841 Extended Security Engineering and Cyber Security 👻

Notifications You must be signed in to change notification settings

axieax/krwm-tools

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

52 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

KrwmTools

A tool for extracting sensitive data from Chromium browsers on Windows. Able to extract:

  • Credentials
  • Autofill fields
  • Autofill profiles
  • Autofill addresses
  • Autofill names
  • Autofill emails
  • Autofill phone numbers
  • Credit card info
  • Cookies
  • History (search terms and web history)

Please check out my writeup as well :)

Local Extraction

Local Demo

Setup:

Option 1: Windows executable

  1. Download krwmtools-win.zip from Releases (on the right)
  2. Extract and run the containing krwmtools.exe file.

Option 2: Directly with Python

  1. Install dependencies with pip install client/requirements.txt
  2. Start the program with python client/main.py

Extracted data will be placed in your Documents\KrwmTools\Client Logs directory.

Remote Extraction

Remote Demo

Server Setup:

  1. Install dependencies with pip install server/requirements.txt
  2. Start the program with python server/server.py

Extracted data will be placed in the server's Documents\KrwmTools\Server Logs directory.

Client Setup:

Option 1: Windows executable

  1. Download krwmtools-win.zip from Releases (on the right)
  2. Extract krwmtools.exe from the zip file
  3. Open Command Prompt and change to the directory containing the extracted executable file
  4. Start the executable with the -r or --remote flag: krwmtools.exe -r [OPTIONAL: server_host] [OPTIONAL: server_port]

Option 2: Directly with Python

  1. Install dependencies with pip install client/requirements.txt
  2. Start the program with the -r or --remote flag: python client/main.py -r [OPTIONAL: server_host] [OPTIONAL: server_port]

Note: if no server_host is specified, the client will try to find the server on localhost. Extracted data will also be placed in the client's Documents\KrwmTools\Client Logs directory.

Disclaimer

This tool was made for educational purposes (for a university security project). Please do not use it on others illegally or without their explicit consent, and note that I am not responsible for any damage.

About

Something Awesome Project for COMP6841 Extended Security Engineering and Cyber Security 👻

Topics

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages