What is the WhatsApp Forensic Tool?
The WhatsApp Forensic Tool is a comprehensive forensic solution designed to extract, decrypt, and analyze WhatsApp backups (msgstore.db.cryptXX) from Android devices. This tool works seamlessly on PC (Windows/Linux/macOS) via ADB and directly on Android devices using Termux.
Developed by Cedroid ([email protected]) for educational and forensic analysis purposes.
Key Capabilities
The tool provides end-to-end forensic capabilities for WhatsApp data analysis:Zero-Config Installation
Automatically installs Python, sets up virtual environments, downloads ADB, and installs all dependencies with a single command.
Cross-Platform Support
Run on Windows, Linux, macOS, or directly on Android devices via Termux for maximum flexibility.
Automated Extraction
Scans for WhatsApp and WhatsApp Business backups automatically across multiple users and storage locations.
Advanced Decryption
Supports crypt12, crypt14, and crypt15 formats with intelligent offset scanning and key derivation.
Supported Platforms
The tool runs on all major operating systems:- Windows - Full ADB support with automated setup
- Linux - Native support with automatic Python installation
- macOS - Complete compatibility with Homebrew integration
- Android (Termux) - Direct on-device analysis with internal storage access
Supported Encryption Formats
The decryption engine handles all modern WhatsApp backup formats:| Format | Description | Key Type |
|---|---|---|
| crypt12 | Legacy format (pre-2016) | 64-character hexadecimal key |
| crypt14 | Modern format with E2EE support | 64-character hexadecimal key |
| crypt15 | Latest format with enhanced encryption | 64-character hexadecimal key |
Use Cases
This tool is designed for legitimate forensic and analysis purposes:Digital Forensics
Law enforcement and forensic investigators analyzing legal evidence from WhatsApp communications.
Data Recovery
Recovering lost or deleted WhatsApp conversations from backup files for personal or business use.
Security Research
Security professionals studying WhatsApp’s encryption and backup mechanisms for research purposes.
Architecture Overview
The tool follows a modular architecture designed for maintainability and extensibility:Core Components
main.py - Application Controller
The main entry point (
main.py:704) initializes the application, detects the runtime environment (PC vs Termux), and manages the interactive menu system. It coordinates all operations between core modules.crypto_manager.py - Decryption Engine
Handles AES-GCM decryption with intelligent offset scanning (
crypto_manager.py:129-192). Implements key derivation using HMAC-SHA256 and supports multiple crypt formats through adaptive decryption strategies.device_manager.py - ADB Interface
Manages ADB operations including device scanning, backup extraction, and media dumping (
device_manager.py:13-283). Automatically downloads and configures ADB platform tools for the host OS.Key Features Implementation
Automatic Device Detection (main.py:141-175)
The tool automatically scans for connected Android devices via ADB, queries detailed device information including model, manufacturer, Android version, battery level, RAM, storage, and installed WhatsApp packages.
Multi-Format Decryption (crypto_manager.py:129-192)
The decryption engine attempts multiple strategies:
- Known offset patterns for crypt14/15
- Key derivation using HMAC-SHA256
- Brute-force offset scanning (0-190 byte range)
- GCM authentication tag validation
crypto_manager.py:28-112)
Decryption keys are stored in an encrypted format using AES-GCM with a machine-specific key derived from the system’s MAC address. This prevents key files from being readable on other machines.
Next Steps
Ready to get started? Follow these guides:Installation
Set up the tool on your platform with step-by-step instructions
Quick Start
Complete your first WhatsApp backup extraction and decryption
