EXTRACT
DECODE
VIEW

bash

$ ./fz-extractor

Loading XML configuration...

Found 12 servers...

decoding passwords... DONE

Server: example.com
User: admin
Pass: *********

> SYTEM_CAPABILITIES

Auto Decode

Instantly decodes Base64 passwords. No more manual copy-pasting into decoders.

Search & Filter

Dynamic filtering allows you to find specific server credentials in milliseconds.

Modern UI

Built with PyQt6, featuring a clean, dark mode interface that fits your workflow.

XML Validation

Automatically validates imported files to ensure data integrity and prevent errors.

Structured Data

Presents messy XML data in a clean, sortable, and readable table format.

Cross Platform

Compatible with Windows, macOS, and Linux. Standalone EXE available for Windows.

> SETUP_PROTOCOL

// Option 1: Windows Executable (Recommended)

1. Visit the Releases Page.
2. Download the latest .exe file.
3. Run the application (Ignore SmartScreen warning if it appears).

// Option 2: Python (Dev Mode)

Prerequisites: Python 3.7+

git clone https://github.com/Deadpool2000/fz-credentials-extractor
cd fz-credentials-extractor
pip install -r requirements.txt
python main.py

> EXECUTION_GUIDE

[1] Open FileZilla Client
[2] Go to File > Export...
[3] Check "Export Site Manager entries"
[4] Save the XML file
[5] Launch Extractor & Load XML

FileZilla.xml


Processing...

> FREQUENTLY_ASKED

Yes, it is 100% safe. The project is open-source, so you can review the code securely on GitHub. It runs locally on your machine and does not send any data to external servers or third parties.

FileZilla stores saved connections in a FileZilla.xml file (or similar) with Base64 encoded passwords. This tool parses that file, finds the credentials, and decodes the passwords back to plain text for you to view.

Yes! Since the core tool is written in Python, it runs seamlessly on Windows, macOS, and Linux. We also provide a standalone .exe for Windows users who don't want to set up Python.