Chrome/Firefox extension for pen-testing to retrieve encryption keys of Widevine protected content !DON'T DECRYPT CONTENT UNLESS YOU HAVE THE RIGHT TO DO IT!
chrome-extensionchrome-extensionsdrmencrypted-media-extensionsfirefox-add-onsfirefox-addonfirefox-addonsfirefox-extensionfirefox-extensionsfirefox-webextensionpyodidepywidevinewasmweb-extweb-extensionweb-extensionswebassemblywebextensionwebextensionswidevine
d101caddd4
Pywidevine does this without having to do it on the scheme side. This makes the scheme more concise. |
||
---|---|---|
pyodide | ||
python | ||
wheels | ||
.gitattributes | ||
.gitignore | ||
background.js | ||
blockRules.conf | ||
content.js | ||
icon.png | ||
inject.js | ||
jsonview.js | ||
LICENSE | ||
manifest.json | ||
popup_drawList.js | ||
popup_showHistory.js | ||
popup_updateNotice.js | ||
popup.html | ||
popup.js | ||
README.md | ||
selectRules.conf |
WVGuesserExtension-NextGen
Looking for legacy version?: https://github.com/FoxRefire/wvg/tree/legacy
For more details, see docs
Installation
-
Download or clone this code
-
At the same directory of
manifest.json
(root directory of this extension), put the one of the following Android L3 CDM file(s).-
Supported CDM Types
-
device.wvd
-
device_client_id_blob
+device_private_key
-
client_id.bin
+private_key.pem
-
remote.json
(How to use Remote CDM)
-
-
-
Install extension
-
Firefox (Permanent method)
1. Navigate to
about:debugging#/runtime/this-firefox
2. Load temporary addon
-
Chrome
1. Navigate to
chrome://extensions/
2. Load unpacked
-
Kiwi Browser(Android)
1. Navigate to ︙ --> Extensions
2. +(from .zip/.crx/.user.js)
-
Demo
Screencast_20240505_014046.webm