2 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
ZeroCrumb is a tool that bypasses Chrome's Elevation Service to extract app-bound credentials and cookies. It uses Transacted Hollowing to impersonate a Chrome instance and decrypt keys, allowing access to sensitive data. Users can implement it as a library and customize it for other credential types.
If you do, here's more
ZeroCrumb is a tool designed to extract app-bound protected credentials and cookies from Chrome without needing elevated privileges. It achieves this by impersonating a Chrome instance through a technique called Transacted Hollowing. By bypassing the Chrome Elevation Service, ZeroCrumb utilizes the IElevator COM interface to decrypt the App Bound Key. This key is crucial for decrypting stored cookies and passwords in browsers like Chrome, Brave, and Edge.
The tool operates by running a key dumper in a hollowed Chrome instance, which then communicates the decrypted key back to ZeroCrumb using a Named Pipe. This method allows any application that can access the Windows API to connect to the ZeroCrumb pipe and retrieve the App Bound Key. Users looking to integrate ZeroCrumb into their applications can compile a DLL that handles the hollowing process and key extraction. The process requires two dependencies: sqlite3 and libsodium.
For practical use, ZeroCrumb provides easy-to-use classes for reading cookies and passwords stored in the browser. The output includes detailed information like cookie names, sites, paths, and values, allowing users to dump this data for further use. While cookies are encrypted with the app-bound key, passwords aren't encrypted in the same way yet. The implementation isn't the stealthiest and could be detected by security software, although it has bypassed Windows Defender during testing. The article suggests that users may need to enhance the stealth features if the tool attracts attention from antivirus programs.
Questions about this article
No questions yet.