Skip to content

v1.0.0 — Architecture Rewrite, Safari, and Chrome ABE

Latest

Choose a tag to compare

@github-actions github-actions released this 29 Apr 01:51
· 1 commit to main since this release
439ff52

After 2+ years and 80+ commits since v0.4.6, HackBrowserData reaches 1.0. This release is a near-complete rewrite plus three major capability additions: Chrome App-Bound Encryption on Windows, Safari support and Firefox 144+.

Highlights

A new architecture

The browser, crypto, filemanager, and output layers were rebuilt from scratch. The CLI moved to Cobra with proper subcommands (extract, list, ...), the logging system was redesigned for CLI use, and a shared keychain retriever now prompts only once across all browsers and profiles.

Chrome App-Bound Encryption (Windows)

Chrome 127+ introduced ABE (cookie v20), which broke every browser-data tool in late 2024. v1.0.0 ships a first-party C payload reflectively injected into chrome.exe to retrieve the ABE master key — no third-party loaders, no vendored code. Edge, Brave, Vivaldi, Opera, CocCoc, Yandex, 360, QQ, Sogou are all covered through the same path.

Safari, end-to-end (macOS)

First-class Safari support: history, cookies (BinaryCookies), passwords (via Keychain), bookmarks & downloads (plist), localStorage, installed extensions, and multi-profile.

Firefox 144+

Firefox switched its profile master-key cipher to AES-256-CBC in 144; v1.0.0 adds full support, including the new padding/key-derivation paths.

Other notable additions

  • Yandex password & credit-card decryption
  • MSIX/UWP browsers on Windows (Arc, DuckDuckGo)
  • list --detail no longer triggers decryption (much faster on big profiles)
  • Chrome 130+ cookie host_key prefix handled correctly
  • Linux v11 cipher prefix supported for Chromium decryption

Compatibility & build

  • Go 1.20 minimum (Windows 7 still supported)
  • Windows ABE payload is now built and shipped automatically by goreleaser

Thanks

Full Changelog: v0.4.6...v1.0.0