Vivaldi
Browsersv1
Author: Sebastian Søgaard
description
Vivaldi Artifacts
paths
17 paths
› paths use Windows environment syntax
collection commands
# PowerShell Artifact Collection Script
# Target: Vivaldi
# Run as Administrator
#Requires -RunAsAdministrator
$ErrorActionPreference = "SilentlyContinue"
$DestBase = "D:\Evidence"
# Function to handle artifact collection with robocopy
function Collect-Artifact {
param (
[string]$SourceDir,
[string]$FolderName,
[string]$FileMask = "*"
)
$FullDest = Join-Path -Path $DestBase -ChildPath $FolderName
robocopy "$SourceDir" "$FullDest" "$FileMask" /E /COPY:DAT /R:0 /W:0 /NP /NFL /NDL /NJH /NJS | Out-Null
}
# 1. Vivaldi Cookies
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\Vivaldi\User Data\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Cookies*" -FolderName "Vivaldi_Cookies"
# 2. Vivaldi Network Persistent State
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\Vivaldi\User Data\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Network Persistent State" -FolderName "Vivaldi_Network_Persistent_State"
# 3. Vivaldi Favicons
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\Vivaldi\User Data\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Favicons*" -FolderName "Vivaldi_Favicons"
# 4. Vivaldi History
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\Vivaldi\User Data\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "History*" -FolderName "Vivaldi_History"
# 5. Vivaldi Sessions Folder
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\Vivaldi\User Data\*\Sessions\"
Collect-Artifact -SourceDir "$UserPath" -FolderName "Vivaldi_Sessions_Folder"
# 6. Vivaldi Login Data
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\Vivaldi\User Data\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Login Data" -FolderName "Vivaldi_Login_Data"
# 7. Vivaldi Network Action Predictor
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\Vivaldi\User Data\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Network Action Predictor" -FolderName "Vivaldi_Network_Action_Predictor"
# 8. Vivaldi Preferences
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\Vivaldi\User Data\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Preferences" -FolderName "Vivaldi_Preferences"
# 9. Vivaldi Top Sites
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\Vivaldi\User Data\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Top Sites*" -FolderName "Vivaldi_Top_Sites"
# 10. Vivaldi Bookmarks
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\Vivaldi\User Data\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Bookmarks*" -FolderName "Vivaldi_Bookmarks"
# 11. Vivaldi Visited Links
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\Vivaldi\User Data\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Visited Links" -FolderName "Vivaldi_Visited_Links"
# 12. Vivaldi Web Data
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\Vivaldi\User Data\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Web Data*" -FolderName "Vivaldi_Web_Data"
# 13. Vivaldi User Tracking
$UserPath = Join-Path $env:USERPROFILE ""
Collect-Artifact -SourceDir "$UserPath" -FileMask ".vivaldi_reporting_data*" -FolderName "Vivaldi_User_Tracking"
# 14. Vivaldi Calendar
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\Vivaldi\User Data\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Calendar*" -FolderName "Vivaldi_Calendar"
# 15. Vivaldi Contacts
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\Vivaldi\User Data\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Contacts*" -FolderName "Vivaldi_Contacts"
# 16. Vivaldi Notes
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\Vivaldi\User Data\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Notes*" -FolderName "Vivaldi_Notes"
# 17. Vivaldi Download Metadata
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\Vivaldi\User Data\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "DownloadMetadata*" -FolderName "Vivaldi_Download_Metadata"
Write-Host "Collection complete!" -ForegroundColor Green› Save as .ps1 and run as Administrator. Use: powershell -ExecutionPolicy Bypass -File script.ps1
› cyberchef recipes
Open in CyberChef to decode values extracted from this artifact.