hashlookup-forensic-analyser
whapa
Our great sponsors
hashlookup-forensic-analyser | whapa | |
---|---|---|
5 | 10 | |
116 | 1,060 | |
4.3% | - | |
5.5 | 4.3 | |
7 months ago | 23 days ago | |
Python | Python | |
GNU General Public License v3.0 or later | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
hashlookup-forensic-analyser
- hashlookup-forensic-analyser: Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https://circl.lu/services/hashlookup/
- Hashlookup-Forensic-Analyser
- Hashlookup forensic analyser version 0.8 released including a report functionality
- Hashlookup forensic analyser – finding known files for digital forensic triage
whapa
-
How to save WhatsApp chats with more than 130k messages? (more information below)
I searched a lot on this subreddit and found two github solutions: B16f00t/whapa: WhatsApp Parser Toolset v1.59 (github.com) and ElDavoo/wa-crypt-tools: Decrypts WhatsApp .crypt12, .crypt14 and .crypt15 files. (github.com)
-
Show HN: WhatsApp-Llama: A clone of yourself from your WhatsApp conversations
To batch it (I think, trying it now): https://github.com/B16f00t/whapa
-
Open source chat app with plain text chat logs
I've used "WHAGODRI" from https://github.com/B16f00t/whapa to download my backup from Google Drive. However, the message database (msgstore.db.crypt15) requires a key file to decrypt. My phone is not rooted, so I am unable to access the decryption key. I have tried https://github.com/YuvrajRaghuvanshiS/WhatsApp-Key-Database-Extractor but I did not succeed in retrieving the key.
-
Are there hackers capable of somehow retrieving deleted whatsapp conversations and photos
If you are technically inclined, you can also check some free tools. I used one some times ago: https://github.com/B16f00t/whapa
-
WhatsApp backups corrupted?
You can try whapa to download your database backup from Google Drive, then you clear WhatsApp data, copy the backup to the corresponding folder in /storage/emulated/0/Android/media/com.whatsapp/WhatsApp/Databases and then see if the WhatsApp app can recover the local backup. Note that you lost your local backups because uninstalling the app will trigger Android to clear its local data (all backups and media files)
-
Backup of Whatsapp NOT THE "BACK UP TO GOOGLE DRIVE AUTO UPLOAD"
The result is a sqlite database that can be dumped or browsed with the regular (database) tools; there are 2 projects I know of that are actually reading the data and presenting it nicely but both are broken just now as Whatsapp changed the name of some tables (the changes are only cosmetic, the data is still there): https://github.com/B16f00t/whapa and https://github.com/andreas-mausch/whatsapp-viewer .
-
Whatsapp Parser Toolset - Not official Kali but WOW
Whatsapp Parser Toolset
-
Are there any tools (free/paid) to open WhatsApp backups and read the chats inside?
I've used this: https://github.com/B16f00t/whapa awesome repository and works like a charm. Had a bit of a problem with finding my key until I rooted though.
-
How to backup whatsapp chat locally on hard drive?
I download from my Google Drive backup with https://github.com/B16f00t/whapa.
-
Cryptography Dispatches: The Most Backdoor-Looking Bug I’ve Ever Seen
https://github.com/B16f00t/whapa (among other tools) appears to download it from Google without requiring any key from facebook or a rooted device.
What are some alternatives?
APT-Hunter - APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
WhatsApp-Key-DB-Extractor - Allows WhatsApp users to extract their cipher key and databases on non-rooted Android devices.
threathunting - A Splunk app mapped to MITRE ATT&CK to guide your threat hunts
WhatsApp-GD-Extractor-Multithread - Allows WhatsApp users on Android to extract their backed up WhatsApp data from Google Drive.
RELY - RELY (Name composed on project members Romy, Esther, Lucille and Yassir) is a python tool developed to help a Digital Forensics Triage procedure on some Microsoft Windows devices.
whatsapp-chat-parser - A package to parse WhatsApp chats with Node.js or in the browser 💬
PurpleCloud - A little tool to play with Azure Identity - Azure Active Directory lab creation tool
wa-crypt-tools - Manage WhatsApp .crypt12, .crypt14 and .crypt15 files.