A comprehensive Python tool for extracting and analyzing data from Chrome's browser storage mechanisms including localStorage, cookies, and IndexedDB across all browser profiles.
- localStorage Extraction: Read Chrome's localStorage LevelDB files
- Cookies Analysis: Extract and analyze Chrome's SQLite cookie database
- IndexedDB Support: Parse Chrome's IndexedDB using Google's dfindexeddb tool
- Multi-Profile Support: Search and extract data across all Chrome profiles
- Powerful Search: Find websites containing specific terms across all storage types
- Bulk Data Dump: Extract all data from matching websites with
--search-and-dump - Flexible Output: Control output verbosity with
--fullflag - Cross-Platform: Works on Windows, Linux, and macOS
- Python 3.11 or higher
- Chrome browser installed
- System dependencies:
- Linux:
sudo apt install libsnappy-dev - macOS:
brew install snappy - Windows: Usually works out of the box
- Linux:
git clone https://github.com/your-username/chrome-storage-extractor.git
cd chrome-storage-extractor
uv syncgit clone https://github.com/your-username/chrome-storage-extractor.git
cd chrome-storage-extractor
pip install -e .-
Copy the example environment file:
cp .env.example .env
-
Edit
.envand set your Chrome User Data path:Windows:
CHROME_USER_DATA_PATH=C:\Users\YourUsername\AppData\Local\Google\Chrome\User Data\Linux:
CHROME_USER_DATA_PATH=/home/username/.config/google-chrome/macOS:
CHROME_USER_DATA_PATH=/Users/username/Library/Application Support/Google/Chrome/
# List Chrome profiles
uv run python extract_localstorage.py --list-profiles
# List websites with localStorage data
uv run python extract_localstorage.py --list
# List websites with cookies
uv run python extract_localstorage.py --list-cookies
# List websites with IndexedDB data
uv run python extract_localstorage.py --list-indexeddb# Extract localStorage from a website
uv run python extract_localstorage.py --extract https://example.com
# Extract cookies for a domain
uv run python extract_localstorage.py --extract-cookies google.com
# Extract IndexedDB data
uv run python extract_localstorage.py --extract-indexeddb https://example.com# Search all storage types
uv run python extract_localstorage.py --search github
# Search only cookies
uv run python extract_localstorage.py --search google -t cookies
# Search and dump ALL data from matching sites
uv run python extract_localstorage.py --search-and-dump openrouter# Use specific Chrome profile
uv run python extract_localstorage.py --list --profile "Profile 2"
# Show full data without truncation
uv run python extract_localstorage.py --extract https://example.com --full
# Extract specific localStorage key only
uv run python extract_localstorage.py --extract https://example.com --key "user_settings"Storage Types Supported
| Storage Type | Description | File Location |
|---|---|---|
| localStorage | Key-value storage persisting across sessions | Local Storage/leveldb/ |
| Cookies | HTTP cookies with metadata | Network/Cookies (SQLite) |
| IndexedDB | Large structured data storage | IndexedDB/[origin]_0.indexeddb.leveldb/ |
� Important Security Notice:
This tool accesses sensitive browser data including:
- Website authentication tokens
- Personal information stored by websites
- Browsing history and preferences
- Potentially sensitive application data
Recommended usage:
- For legitimate forensics, research, or personal data analysis only
- Ensure you have proper authorization before analyzing others' browser data
- Be aware of privacy laws and regulations in your jurisdiction
- Consider running on isolated systems when analyzing sensitive data
Contributions are welcome! Please feel free to submit a Pull Request.
This project is licensed under the MIT License - see the LICENSE file for details.
- Google's dfindexeddb for IndexedDB parsing
- plyvel for LevelDB access
- Chrome browser team for comprehensive storage mechanisms
This tool is for educational, research, and legitimate forensic purposes only. Users are responsible for complying with applicable laws and regulations. The authors are not responsible for misuse of this tool.