In an era dominated by messaging apps, WhatsApp has become a key platform for personal and professional communication. As WhatsApp messages often contain critical information, it’s vital to have the means to extract and analyze them for security or forensic investigations. Whapa is a powerful toolset designed specifically for analyzing WhatsApp data from Android and iOS devices. Developed in Python, Whapa is compatible across platforms, including Linux, Windows, and macOS.
Whapa consists of several tools tailored to forensic analysis. Each tool addresses specific aspects of WhatsApp data, whether stored on the device itself or in backups. The suite works seamlessly on both Android and iOS, ensuring wide compatibility for investigators.
Setting up Whapa is easy and can be done in a few simple steps. Follow the instructions for your operating system to install the necessary dependencies.
Linux and macOS Users:
To get started, first clone the repository:
git clone https://github.com/B16f00t/whapa.git && cd whapa
Next, install the required dependencies using pip:
pip3 install --upgrade -r ./doc/requirements.txt
Windows Users:
On Windows, clone the repository as well:
git clone https://github.com/B16f00t/whapa.git && cd whapa
Then, install dependencies with:
pip install --upgrade -r .\doc\requirements.txt
To run Whapa, use the following command for Linux/macOS:
python3 whapa-gui.py
For Windows, use:
python whapa-gui.py
Alternatively, you can click on whapa-gui.bat to launch the GUI.
Whapa is a valuable tool for anyone performing WhatsApp forensic analysis. It allows investigators to extract and decrypt essential data from both Android and iOS devices. Despite some limitations with newer WhatsApp versions and iCloud backup extraction, Whapa remains a leading tool for digital forensic investigations. It provides all the essential tools needed to examine WhatsApp data with ease.
To stay updated or contribute to the project, visit the Whapa GitHub repository.