RRepoGEO

REPOGEO REPORT · LITE

moonD4rk/HackBrowserData

Default branch main · commit 5d67d3c3 · scanned 5/9/2026, 7:12:15 AM

GitHub: 13,780 stars · 1,751 forks

AI VISIBILITY SCORE
35 /100
Critical
Category recall
0 / 2
Not recommended in any query
Rule findings
1 pass · 1 warn · 0 fail
Objective metadata checks
AI knows your name
3 / 3
Direct prompts that named your repo
HOW TO READ THIS REPORT

Action plan is what to do next — copy-pasteable changes prioritized by impact. Category visibility is the real GEO test: when a user asks an AI a brand-free question that should surface moonD4rk/HackBrowserData, does the AI actually recommend you — or your competitors? Objective checks verify the metadata signals AI engines weight first. Self-mention check detects whether AI even knows you exist by name.

Action plan — copy-paste fixes

3 prioritized changes generated by gemini-2.5-flash. Mark items done after you ship the fix.

OVERALL DIRECTION
  • hightopics#1
    Update repository topics for precise categorization

    Why:

    CURRENT
    browser, browser-extension, chrome, edge, firefox, golang, hacking, macos, pentest-tool, windows
    COPY-PASTE FIX
    browser-data-extraction, credential-dumping, browser-forensics, security-research-tool, chrome, edge, firefox, safari, golang, hacking, macos, pentest-tool, windows, linux
  • mediumhomepage#2
    Add a homepage URL to the repository's About section

    Why:

    COPY-PASTE FIX
    https://github.com/moonD4rk/HackBrowserData
  • lowreadme#3
    Reinforce the unique value proposition in the README's opening

    Why:

    CURRENT
    `HackBrowserData` is a command-line tool for decrypting and exporting browser data (passwords, history, cookies, bookmarks, credit cards, download history, localStorage, sessionStorage and extensions) from the browser. It supports the most popular Chromium-based browsers and Firefox on Windows, macOS and Linux, plus Safari on macOS.
    COPY-PASTE FIX
    `HackBrowserData` is a **cross-platform, Go-based command-line tool** for decrypting and exporting browser data (passwords, history, cookies, bookmarks, credit cards, download history, localStorage, sessionStorage and extensions) from the browser. It compiles into a **single static binary with no external dependencies**, supporting the most popular Chromium-based browsers and Firefox on Windows, macOS and Linux, plus Safari on macOS.

Category GEO backends resolved for this scan: google/gemini-2.5-flash, deepseek/deepseek-v4-flash

Category visibility — the real GEO test

Brand-free queries asked to google/gemini-2.5-flash. Did AI recommend you, or someone else?

Same questions for every model — switch tabs to compare answers and rankings.

Recall
0 / 2
0% of queries surface moonD4rk/HackBrowserData
Avg rank
Lower is better. #1 = top recommendation.
Share of voice
0%
Of all named tools, what % are you?
Top rival
Puppeteer
Recommended in 1 of 2 queries
COMPETITOR LEADERBOARD
  1. Puppeteer · recommended 1×
  2. Selenium WebDriver · recommended 1×
  3. Mimikatz · recommended 1×
  4. sqlite3 module · recommended 1×
  5. System.Data.SQLite · recommended 1×
  • CATEGORY QUERY
    How can I programmatically extract sensitive data from multiple web browsers across different OS?
    you: not recommended
    AI recommended (in order):
    1. Puppeteer
    2. Selenium WebDriver
    3. Mimikatz
    4. sqlite3 module
    5. System.Data.SQLite
    6. Windows Credential Manager
    7. macOS Keychain
    8. Burp Suite
    9. OWASP ZAP

    AI recommended 9 alternatives but never named moonD4rk/HackBrowserData. This is the gap to close.

    Show full AI answer
  • CATEGORY QUERY
    What Go-based CLI tools exist for decrypting saved browser credentials and history?
    you: not recommended
    AI recommended (in order):
    1. LastPass
    2. 1Password
    3. Bitwarden

    AI recommended 3 alternatives but never named moonD4rk/HackBrowserData. This is the gap to close.

    Show full AI answer

Objective checks

Rule-based audits of metadata signals AI engines weight most.

  • Metadata completeness
    warn

    Suggestion:

  • README presence
    pass

Self-mention check

Does AI even know your repo exists when asked about it directly?

  • Compared to common alternatives in this category, what is the core differentiator of moonD4rk/HackBrowserData?
    pass
    AI named moonD4rk/HackBrowserData explicitly

    AI answers can be confidently wrong. Read for accuracy: does it match your actual tech stack, audience, and differentiator?

  • If a team adopts moonD4rk/HackBrowserData in production, what risks or prerequisites should they evaluate first?
    pass
    AI named moonD4rk/HackBrowserData explicitly

    AI answers can be confidently wrong. Read for accuracy: does it match your actual tech stack, audience, and differentiator?

  • In one sentence, what problem does the repo moonD4rk/HackBrowserData solve, and who is the primary audience?
    pass
    AI named moonD4rk/HackBrowserData explicitly

    AI answers can be confidently wrong. Read for accuracy: does it match your actual tech stack, audience, and differentiator?

Embed your GEO score

Drop this badge into the README of moonD4rk/HackBrowserData. It auto-updates whenever the report is rescanned and links back to the latest report — easy public proof that you care about AI discoverability.

RepoGEO badge previewLive preview
MARKDOWN (README)
[![RepoGEO](https://repogeo.com/badge/moonD4rk/HackBrowserData.svg)](https://repogeo.com/en/r/moonD4rk/HackBrowserData)
HTML
<a href="https://repogeo.com/en/r/moonD4rk/HackBrowserData"><img src="https://repogeo.com/badge/moonD4rk/HackBrowserData.svg" alt="RepoGEO" /></a>
Pro

Subscribe to Pro for deep diagnoses

moonD4rk/HackBrowserData — Lite scans stay free; this card itemizes Pro deep limits vs Lite.

  • Deep reports10 / month
  • Brand-free category queries5 vs 2 in Lite
  • Prioritized action items8 vs 3 in Lite