Information Gathering

WhatsApp OSINT Tool: Revolutionizing Digital Investigations

The WhatsApp OSINT Tool is a pioneering tool developed for intelligence gathering on WhatsApp. It enables tracking and monitoring of user activities, offering insights and data analysis for digital investigations. This versatile tool supports multiple languages and provides Excel format outputs, making it essential for online investigations and digital forensics.

Welcome to the first WhatsApp OSINT tool. This was developed in early 2019 but I decided to restart the project now for fun.

English

How to Install

First, install requirements:

pip install -r requirements.txt
  • You will need chromedriver, or you can modify the code and use GeckoDriver or any other drivers for Selenium.
  • You will need a GUI to execute the code since it interacts with web.whatsapp.com to get statuses
  • Replace the name in the file with whichever name you want to track

How to Run

The language you choose depends on the language in which you have your web whatsapp some of the languages already integrated are the following:

IdiomaAbreviatura
Spanishes
Englishen
Frenchfr
Turkishtr

In the user section you must put the user you want to monitor through the program, so the execution as such would be as follows:

python3 whatsappbeacon.py --username <username_to_track> --language "<language_code>"

Excel format to get data

To obtain the data generated by means of excel you can execute the following command with the flag “-e”

python3 whatsappbeacon.py --username <username_to_track> --language "<language_code>" -e

Example

where language_code is either ‘en’ ‘tr’ ‘es’ for English,Turkish and Spanish languages. Future language support will be added.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 day ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 weeks ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago