Browser Data Trojan for Windows - Project

3 minute read

  3 minute read

This client-server project allows the client to recompile all the information from the Chrome, Edge and OperaGX browsers and then compresses it and send it to the server via TCP to the server, although it also has the option of doing so via Stmp.

Then the server allows decrypting all files, including passwords, cookies, etc …


This project was made for the sole purpose of education and research for developers or end users, and that can help create countermeasures for current threats. I DO NOT assume any responsibility for how you choose to use any of the executables/source code of any files provided.

Getting Started

Prerequisites ⚙️

  • Python3.
  • Libraries : python -m pip install -r requirements.txt

How it works

browser data trojan windows

Client-Server TCP Diagram

browser data trojan windows 1

Work Flow

Regarding the process for decrypting the master key used for decrypting passwords and cookies, it was based on the following scheme, from which it can be extrapolated based on how the browser encrypts and decrypts passwords and cookies, how to decrypt them.

It must be considered that each password and cookie are encrypted in the same way but individually.

browser data trojan windows 2

Passords and master_key Encrypt/Decrypt


  • Client (in fact this is the client’s working flow):

    • Recompilation of the following files from Chrome, Edge and OperaGX browsers:
      • Local State
      • Login Data
      • Cookies
      • History
      • Bookmarks
    • Dumpped to a directory in /temp, zipped, moved to desktop and erased upon completion (placing it on the desktop at the end avoids the need for administrator permissions to run the program.)
    • Sending the file via TCP to the chosen port, by default 5679 ( to the root dir of the server.
    • Sending the file via smtp from and to the chosen email. (
  • Server:

    • Run Server (by default listening in port 5679)
    • Unpack Data (by default unpacked in /Data)
    • Decrypt Passwrds and Generate a DB
    • Check Historial
    • Decrypt Cookies
    • Check Bookmarks
    • Close

Except for the bookmarks, the other decrypted data will be dumped into a new database.

Bypassing firewalls

We need to obfuscate the code and compile it to an executable. For that we can use pyarmor and pyinstaller That easy in one line in the right directory :

  • If you want via TCP : pyarmor pack --clean -e "--onefile "
  • If you want via SMTP: pyarmor pack --clean -e "--onefile "

The resultant execuable will be placed in the /dist path.

Using this we can avoid most antivirus, this was tested in our own laboratory.

In addition, As this is an educational project, it does not matter to upload it to VirusTotal, in the event that we were cybercriminals or with intentions contrary to the objective of this project, we would never upload our executable / code to a page like this.

Configuring 🔧

Modify all the parameters in the code (normally expressed as “xxxx”), guide yourself according to the comments

Executing the code

  • You can use the comand python -u "C:/Path/to/" , It’s necessary to have python path specified in environment variables.

  • If you are using an IDE or a configured code editor just compile and run the code.

If you are using the client via TCP you will need to run the server. And then when the client is executed the server will accept the connection and the file will be sent and received.

You have to open the port in the router config (In the server side), otherwise you wouldn’t receive anything.

In the case of being via smtp it is not necessary to run the server, just to process and decrypt the files.

Things to keep in mind

  • The server is created to handle a single connection


  • Decrypt Edge Cookies not working because of unknown encode, not UTF-8, not windows-1251.

Things that will be implemented in the future

  • Export the rest of the decrypted files to xlsx format