Different code samples for Chrome browser analysis & post exploitation
ChromeForensics should NOT be used for the purposes of unethical system hijacking or doxxing, and was made with the intentions of security research, pentests and data analysis. Any issues or complaints: [email protected]
These samples are designed for finding and analysing different sources of data extracted from a Windows based Google Chrome browser, the samples listed are designed to fetch and format data from the target systems internal files and locally stored cache. They are designed for researchers and cyber security professionals to effectively and quickly extract sensitive data from a chrome profile and format them in a timebased, analytical state.
ChromeForensics samples are capable of harvesting the following data from a chrome profile
It can detect whether Google Chrome is installed and if it is currently being used as the default browser on the system
It can download the users currently used profile image locally from Chromes cache to the desktop
What browser extentions the user currently has installed on their Google Chrome profile
What bookmarks the user has added on their topbar within the browser
All of the users recent and old download history, including links, timestamps and external sources
All of the users search history from within the systems cache and default browser settings including timestamps, urls and visited 3rd party redirects
All of the users 'kept' site logins, along with password hashes, full urls, timestamps and when the login was created on the system