Dump login credentials saved by Google Chrome, just for fun :)
- The compiled binary for x86-64 machines can be found in dist/extract_saved_chrome_credentials_windows.exe
- The (uncompiled) script is named extract_saved_chrome_credentials_windows.py in the repository's root directory
-
To dump saved passwords from the default location, execute
extract_saved_chrome_credentials_windows.exe
-
To search for all instances of
Login Data
on your computer before dumping the saved passwords in them, executeextract_saved_chrome_credentials_windows.exe -a
- Compile 32-bit version of binary