$ ./fz-extractor
Loading XML configuration...
Found 12 servers...
decoding passwords... DONE
Server: example.com
User: admin
Pass: *********
Instantly decodes Base64 passwords. No more manual copy-pasting into decoders.
Dynamic filtering allows you to find specific server credentials in milliseconds.
Built with PyQt6, featuring a clean, dark mode interface that fits your workflow.
Automatically validates imported files to ensure data integrity and prevent errors.
Presents messy XML data in a clean, sortable, and readable table format.
Compatible with Windows, macOS, and Linux. Standalone EXE available for Windows.
.exe file.Prerequisites: Python 3.7+
git clone https://github.com/Deadpool2000/fz-credentials-extractor
cd fz-credentials-extractor
pip install -r requirements.txt
python main.py
FileZilla.xml
Processing...
FileZilla.xml file (or similar) with
Base64 encoded passwords. This tool parses that file, finds the credentials, and decodes the
passwords back to plain text for you to view.
.exe for Windows users who don't want to
set up Python.