Forensics

Whapa – Comprehensive Guide To The WhatsApp Forensic Toolset

In the digital age, forensic analysis of messaging applications like WhatsApp is crucial for both security and investigative purposes.

‘Whapa’ offers a sophisticated suite of tools designed to parse and analyze WhatsApp data on Android and iOS devices.

Developed with Python and supported on multiple operating systems, Whapa enhances forensic capabilities with its robust features and compatibility.

Whatsapp Parser Toolset

Updated: May 2022

WhatsApp Messenger Version 2.21.9.14

Whapa is a set of graphical forensic tools to analyze whatsapp from Android and soon iOS devices. All the tools have been written in Python 3.8 and have been tested on linux, windows and macOS systems.

Note: Whapa provides 10x more performance and fewer bugs on linux systems than on windows.

Whapa is included as standard in distributions such as Tsurugi Linux (Digital Forensics) and BlackArch Linux (Penetration Testing).

Whapa toolset is divided in five tools:

Android

  • Whapa (Whatsapp Parser)(Only working with old database, Working in Progress…)
  • Whacipher (Whatsapp Encryption/Decryption) *** Not support Crypt15 ***
  • Whagodri (Whataspp Google Drive Extractor)
  • Whamerge (Whatsapp Merger) (Only working with old database, Working in Progress…)
  • Whachat (Whatsapp Chat Exporter)

IPhone

  • Whacloud (Whatsapp ICloud Extractor) (Not working)
  • Whachat (Whatsapp Chat Exporter)

Do you like this project? Support it by donating

Installation

You can download the latest version of whapa by cloning the GitHub repository:

git clone https://github.com/B16f00t/whapa.git && cd whapa

then (Linux or macOS):

pip3 install --upgrade -r ./doc/requirements.txt

or (Windows):

pip install --upgrade -r .\doc\requirements.txt

Start

if you use Linux system:

python3 whapa-gui.py

if you use Windows system:

python whapa-gui.py
or 
click on whapa-gui.bat

For more information click here.

Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

4 hours ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

1 day ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

4 weeks ago