All Projects β†’ mgp25 β†’ Crypt12 Decryptor

mgp25 / Crypt12 Decryptor

Tool for decrypting WhatsApp Crypt12 databases

Programming Languages

java
68154 projects - #9 most used programming language

Labels

Projects that are alternatives of or similar to Crypt12 Decryptor

Sulla
πŸ‘©πŸ»β€πŸ”¬ Javascript Whatsapp api library for chatbots
Stars: ✭ 844 (+982.05%)
Mutual labels:  whatsapp
Whatsapp Sticker Maker
Whatsapp android sticker maker
Stars: ✭ 54 (-30.77%)
Mutual labels:  whatsapp
Wa status saver
A whatsApp status saver/downloader with flutter
Stars: ✭ 66 (-15.38%)
Mutual labels:  whatsapp
Ae Sticker App
stickers for whatsapp
Stars: ✭ 31 (-60.26%)
Mutual labels:  whatsapp
Kotlin Firebase Group Chat
Group and OneonOne chat using firebase built in Kotlin similar to whatsapp.
Stars: ✭ 44 (-43.59%)
Mutual labels:  whatsapp
Wappbot
Automatic answering of incoming messages by means of javascript and using Whatsapp Web
Stars: ✭ 55 (-29.49%)
Mutual labels:  whatsapp
Notify
A dead simple Go library for sending notifications to various messaging services.
Stars: ✭ 727 (+832.05%)
Mutual labels:  whatsapp
Whatsappwebtogo
[android] WhatsApp Web client for your phone/tablet with media support
Stars: ✭ 70 (-10.26%)
Mutual labels:  whatsapp
Whalesong
Whalesong is an asyncio python library to manage WebApps remotely. Currently WhatsappWeb is implemented
Stars: ✭ 46 (-41.03%)
Mutual labels:  whatsapp
Flutterwhatsappclone
Building a WhatsApp Clone in Flutter.
Stars: ✭ 1,107 (+1319.23%)
Mutual labels:  whatsapp
Whatsapptodiscord
WhatsAppToDiscord is a Discord bot uses WhatsApp Web for messaging in Discord built on top of go-whatsapp and discordgo
Stars: ✭ 35 (-55.13%)
Mutual labels:  whatsapp
Chatwoot
Open-source customer engagement suite, an alternative to Intercom, Zendesk, Salesforce Service Cloud etc. πŸ”₯πŸ’¬
Stars: ✭ 11,554 (+14712.82%)
Mutual labels:  whatsapp
Wishing Happy Aid
Wishing Happy Aid is a small web application encoded in HTML, PHP, JS, and CSS. If you want to earn from festival sessions then you can use Wishing Happy Aid script.
Stars: ✭ 57 (-26.92%)
Mutual labels:  whatsapp
Whatsapp Framework
βš—οΈWhatsapp python api
Stars: ✭ 945 (+1111.54%)
Mutual labels:  whatsapp
Multiselectrecyclerview
Multi select like WhatsApp in Android
Stars: ✭ 66 (-15.38%)
Mutual labels:  whatsapp
Chatistics
πŸ’¬ Python scripts to parse Messenger, Hangouts, WhatsApp and Telegram chat logs into DataFrames.
Stars: ✭ 814 (+943.59%)
Mutual labels:  whatsapp
Wbm
wbm is an unofficial API to send bulk messages in whatsapp.
Stars: ✭ 55 (-29.49%)
Mutual labels:  whatsapp
Whatsapp Clone React Native
The goal of this project is to build an Whatsapp exactly like the original application, but using React Native & Redux | Firebase
Stars: ✭ 76 (-2.56%)
Mutual labels:  whatsapp
Picker
Picker - A CameraX based WhatsApp Style Image-Video Picker
Stars: ✭ 69 (-11.54%)
Mutual labels:  whatsapp
Webwhatsappbot
Core to automatize whatsapp - working 11/2018
Stars: ✭ 59 (-24.36%)
Mutual labels:  whatsapp

Crypt12 Decryptor

Tool for decrypting WhatsApp Crypt12 databases.

Files required:

  • crypt12 db.
  • key file.

Java

Usage

java -classpath "lib/bc.jar:." Decrypt msgstore.db.crypt12 key

Compile

javac -classpath "lib/bc.jar:." Decrypt.java

img

PHP

Usage

php decrypt.php msgstore.db.crypt12 key

AES GCM

Inputs and Outputs to GCM

GCM has two operations, authenticated encryption and authenticated decryption. The authenticated encryption operation has four inputs, each of which is a bit string:

  • A secret key K, whose length is appropriate for the underlying block cipher.
  • An initialization vector IV, that can have any number of bits between 1 and 2^64. For a fixed value of key, each IV value must be distinct, but need not have equal lengths. 96-bit IV values can be processed more efficiently, so that length is recommended for situations in which efficiency is critical.
  • A plaintext P, which can have any number of bits between 0 and 2^39 - 256.
  • Additional authenticated data (AAD), which is denoted as A. This data is authenticated, but not encrypted, and can have any number of bits between 0 and 2^64.

The There two Outputs

  • A ciphertext C whose length is exactly that of the plaintext P.
  • An authentication tag T, whose length can be any value between 0 and 128. The length of the tag is denoted as t.

The authenticated decryption operation has five inputs: K, IV, C, A and T. It has only a single output, either the plaintext value P or a special symbol 'FAIL' that indicates that the inputs are not authentic. A ciphertext C, initialization vector IV, additional authenticated data A and tag T are authentic for key K when they are generated with the encrypt operation with inputs K, IV, A and P, for some plaintext P. The authenticated decrypt operation will, with high probability, return 'FAIL' when its inputs were not created by the encrypt operation with the identical key. The additional authenticated data A is used to protect information that needs to be authenticated, but which must be left unencrypted. When using GCM to secure network protocol, this input could include addresses, ports, sequence numbers, protocol version numbers, and other fields that indicate how the plaintext should be handled, forwarded, or processed. In many situations, its desirable to authenticate these fields, though they must be left in the clear for the network to function properly. when this data is included in the AAD, authentication is provided without copying the data into the ciphertext. The primary purpose of the IV is to be a nonce, that is, to be distinct for each invocation of the encryption operation for a fixed key. It is acceptable for the IV to be generated randomly, as long as the distinctness of the IV is highly likely. The IV is authenticated, and it is not necessary to include it in in the AAD field.

Decryption:

The authenticated decryption operation is similar to the encrypt operation, but with the order of the hash step and encrypt step reversed. The equations are as follows:

The authenticated decryption operation

Using GCM to decrypt and verify the authenticity of a packet

__

Reference: http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/gcm/gcm-spec.pdf

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].