Chrome URL Dumper Logo

Chrome URL Dumper

Accessing databases stored on a machine by the Chrome browser and dumping URLs found.

42
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

Chrome URL Dumper Description

Accessing databases stored on a machine by the Chrome browser and dumping URLs found. Getting Started: These instructions will help you set up the project on your local machine for development and testing purposes. Prerequisites: Python 2.7 is required. Installing: Run 'pip install -r requirements.txt' to install necessary packages. Check packages: - For Windows: 'pip list | Findstr /L "package"' - For Linux: 'pip list | grep "package"' Running the tests: - To kill Chrome processes for deeper analysis on Windows: 'python main.py -k -d' - To kill Chrome processes for deeper analysis on Linux: './main.py -k -d' Authors: Tomer Eyzenberg - Initial work - eLoopWoo

Chrome URL Dumper FAQ

Common questions about Chrome URL Dumper including features, pricing, alternatives, and user reviews.

Chrome URL Dumper is Accessing databases stored on a machine by the Chrome browser and dumping URLs found.. It is a Security Operations solution designed to help security teams with Browser Security, URL.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

Menlo Security Browsing Forensics Logo

Browser session recording & forensics for incident investigation & analysis

0
HexPrism Logo

HexPrism is a fast, privacy-first hex editor built for CTFs and digital forensics.

0
unfurl Logo

Unfurl is a URL analysis tool that extracts and visualizes data from URLs, breaking them down into components and presenting the information visually.

0
libmsiecf Logo

A library for accessing and parsing Microsoft Internet Explorer cache files (index.dat) to extract URLs, timestamps, and cached content for digital forensic analysis.

0
WayBackMachine Logo

A digital archive of the internet, allowing users to capture and browse archived web pages.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox