
Chromepass is a python-based console application that generates Windows executable with the following features:
- Decrypt Chrome saved passwords
- Send a file with the login/password combinations remotely (email or reverse-HTTP)
- Custom icon
- Completely undetectable by AntiVirus Engines
AV Detection!
Due to the way this has been coded, it is currently fully undetected. Here are some links to scans performed using a variety of websites
- VirusTotal Scan (0/68) 30-09-2019
- this is an educational project, so distribution (or the lack thereof) is not a concern, hence the usage of VirusTotal
- AntiScan (0/26) 24-09-2019
- Hibrid Analysis All Clean (CrowdStrike Falcon, MetaDefender and Virustotal) 24-09-2019
Getting started
Dependencies and Requirements
This is a very simple application, which uses only:
- Python - Only tested on 3.7.4 but should work in 3.6+
Installation
Chromepass requires Python 3.6+ to run.
Install the dependencies:
> cd chromepass
> pip install -r requirements.txt
If any errors occur, to make sure you're running on the proper environment (if applicable) and that you have python 3.6+ (preferably 3.7.4). If the errors persist, try:
> python -m pip install --upgrade pip
> python -m pip install -r requirements.txt
Usage
Chromepass is very straightforward. Start by running:
> python create_server.py
It will ask you to select between two options:
- (1) via email [To be fixed]
- This will ask you for an email address and a password
- It will then ask you if you wish to send to another address or to yourself
- Next, you're asked if you want to display an error message. This is a fake message that if enabled will appear when the victim opens the executable after the passwords have been transferred.
- You can then write your own message or leave it blank
- You're done! Wait for the executable to be generated and then it's ready.
- (2) via client.exe [Recommended at the moment]
- First, you're asked to input an IP Address for a reverse connection. This is the address that belongs to the attacker. It can be a local IP address or a remote IP Address. If a remote address is chosen, Port Forwarding needs to be in place.
- You're then asked if you want to display an error message. This is a fake message that if enabled will appear when the victim opens the executable after the passwords have been transferred.
- You can then write your own message or leave it blank
- You're done! Wait for the executables to be generated and then it's ready.
- The client.exe must be started before the server_ip.exe. The server_ip.exe is the file the victim receives.
- Note: To set a custom icon, replace icon.ico by the desired icon with the same name and format.
Todo
- Sending Real-time precise location of the victim (completed, releases next update)
- Also steal Firefox passwords (Completed, releases next update)
- The option of installing a backdoor allowing remote control of the victim's computer (completed, releases next update)
- Support for more email providers (in progress)
- Also steal passwords from other programs, such as keychains(in progress)
- Add Night Mode (in progress)
Errors, Bugs, and feature requests
If you find an error or a bug, please report it as an issue. If you wish to suggest a feature or an improvement please report it in the issue pages.
Please follow the templates shown when creating the issue.
Learn More
For access to a community full of aspiring computer security experts, ranging from the complete beginner to the seasoned veteran, join our Discord Server: WhiteHat Hacking
If you wish to contact me, you can do so via: [email protected]
Disclaimer
I am not responsible for what you do with the information and code provided. This is intended for professional or educational purposes only.
Author

- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
Latest Articles
Blog2022.12.13What are the Common Security Weaknesses of Cloud Based Networks?
Blog2022.10.12Vulnerability management with Wazuh open source XDR
Blog2022.08.29Deception Technologies: Improving Incident Detection and Response by Alex Vakulov
Blog2022.08.25Exploring the Heightened Importance of Cybersecurity in Mobile App Development by Jeff Kalwerisky