All Projects → MarcoG3 → Whatsdump

MarcoG3 / Whatsdump

Licence: lgpl-3.0
Extract WhatsApp private key from any non-rooted Android device (Android 7+ supported)

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Whatsdump

Forensic Tools
A collection of tools for forensic analysis
Stars: ✭ 204 (+3.03%)
Mutual labels:  whatsapp, forensics
LevelDBDumper
Dumps all of the Key/Value pairs from a LevelDB database
Stars: ✭ 23 (-88.38%)
Mutual labels:  forensics, whatsapp
Operative Framework
operative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links with target, export rapport to PDF file, add note to target or results, interact with RESTFul API, write your own modules.
Stars: ✭ 511 (+158.08%)
Mutual labels:  whatsapp, forensics
Webapp
Tinode web chat using React
Stars: ✭ 156 (-21.21%)
Mutual labels:  whatsapp
Joincap
Merge multiple pcap files together, gracefully.
Stars: ✭ 159 (-19.7%)
Mutual labels:  forensics
Re Whatsapp
Reverse engineering WhatsApp. Documentation and protocols.
Stars: ✭ 184 (-7.07%)
Mutual labels:  whatsapp
Tindroid
Tinode chat client application for Android
Stars: ✭ 194 (-2.02%)
Mutual labels:  whatsapp
Awesome Forensicstools
Awesome list of digital forensic tools
Stars: ✭ 120 (-39.39%)
Mutual labels:  forensics
Ctf Tools
Useful CTF Tools
Stars: ✭ 190 (-4.04%)
Mutual labels:  forensics
Tock
Tock - the open source conversational AI toolkit
Stars: ✭ 175 (-11.62%)
Mutual labels:  whatsapp
Remote Desktop Caching
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Stars: ✭ 171 (-13.64%)
Mutual labels:  forensics
Q Municate Ios
Q-municate iOS repository
Stars: ✭ 164 (-17.17%)
Mutual labels:  whatsapp
Whatsappbetaupdater
An app to update WhatsApp to the latest beta version available on Android. Based on Material Design.
Stars: ✭ 183 (-7.58%)
Mutual labels:  whatsapp
Siem
SIEM Tactics, Techiques, and Procedures
Stars: ✭ 157 (-20.71%)
Mutual labels:  forensics
Watoi
Whatsapp Android To iOS Importer
Stars: ✭ 189 (-4.55%)
Mutual labels:  whatsapp
Fb Messenger Whatsapp Discord Message Spammer
Annoying Python program that sends a users on your Facebook Messenger/Whatsapp/Discord any text, word by word
Stars: ✭ 154 (-22.22%)
Mutual labels:  whatsapp
Linuxforensics
Everything related to Linux Forensics
Stars: ✭ 189 (-4.55%)
Mutual labels:  forensics
Whatsapp Bot
BOT - WhatsApp Web in TypeScript
Stars: ✭ 170 (-14.14%)
Mutual labels:  whatsapp
Whatsapp Web.js
A WhatsApp client library for NodeJS that connects through the WhatsApp Web browser app
Stars: ✭ 4,103 (+1972.22%)
Mutual labels:  whatsapp
Rebel Framework
Advanced and easy to use penetration testing framework 💣🔎
Stars: ✭ 183 (-7.58%)
Mutual labels:  forensics

WhatsDump

Extract WhatsApp private key from any Android device (Android 7+ supported). This tool spawns a clean Android 6 emulator and attempts to register with your number to extract msgstore private key.

NOTE: this tool is in beta stage and might not be stable. You're more than welcome to improve this software by submitting a PR or an issue!

SUPPORTED OPERATING SYSTEMS

  • Mac OSX
  • Windows
  • Linux

RELEASES

To use WhatsDump without installing Python and its dependencies, you can find pre-built binaries (thanks to PyInstaller) here: https://github.com/MarcoG3/WhatsDump/releases

USE CASE

You want to decrypt and/or extract msgstore.db database from your Android device.

  1. Install SDK with --install-sdk flag
  2. Attach Android device to USB port and launch WhatsDump
  3. Wait the script to quickly register your phone number on emulator
  4. Wait for SMS or CALL with confirmation code
  5. Input 6-digit confirmation code
  6. Private key is extracted in output/ directory

OPTIONS

Flag Behaviour
--wa-phone Required WhatsApp phone number associated with msgstore database
from which you will receive verification SMS (with prefix, ex. +393387182291
--wa-verify Required Phone verification method to use (SMS or CALL)
--install-sdk Optional Installs Android SDK on android-sdk/ directory. This is mandatory to run WhatsDump
--msgstore Optional Location of msgstore database to decrypt (or plug in device to USB port)
--verbose Optional Show verbose (debug) output
--show-emulator Optional Show emulator screen (by default headless)
--no-accel Optional Disable hardware acceleration (very slow emulator)

EXAMPLES

PLUGGED IN PHONE

python whatsdump.py --wa-phone +15417543010 --wa-verify sms

EXTERNAL MSGSTORE.DB

python whatsdump.py --msgstore /path/to/msgstore.db --wa-phone +15417543010 --wa-verify sms

PREREQUISITES

  • Java JDK must be installed (JAVA_HOME environment variable must be set)

  • Hardware acceleration must be enabled to run Emulator without issues

  • SIM card associated with msgstore.db to receive WhatsApp confirmation PIN (SMS or CALL)

  • Install all the Python library dependencies by running the following command: pip install -r requirements.txt

THIRD-PARTY LIBRARIES USED

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].