WhatsSpy : Trace The Moves Of A WhatsApp User

WhatsSpy Public (not to confuse with WhatsSpy) is an web-oriented application that tracks every move on WhatsApp of whoever you like to follow (by only knowing their phonenumber).

This application is setup as an Proof of Concept that WhatsApp is broken in terms of privacy. It keeps track of the following activities:

What can WhatsSpy Public do?

Profile your daily habits and smartphone usage throughout the day, if you like that or not.

It contains the following functions:

  • Track user status / status message and profile picture (history).
  • Track any privacy setting changes.
  • Be notified via various services if a user comes online/changed any of the above in WhatsApp.
  • Compare users statuses to draw conclusions.
  • Get a timeline view just like Facebook about the tracked users.
  • Group all tracked users and view statistics about them.
  • Share profiles via unique tokens.
  • Full language support for EN,DE,ES,NL

Also Read – XSSCon : Simple XSS Scanner Tool

Installling

Setting up WhatsSpy Public requires somewhat IT knowledge and you might need a second SIM card. There are for both the normal and Raspberry Pi image installation videos available.

You have three options to setup WhatsSpy Public:

For updates please check updatelog and how to update.

Screenshots

Overview

Overview edit contact

Compare

Timeline

Statistics

And it’s even mobile (pinning the webpage, not an APK)!

An external installation pinned to the home-screen of an Android phone

R K

Recent Posts

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

11 hours ago

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…

11 hours ago

My Awesome List : Tools And Their Functions

"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…

11 hours ago

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…

11 hours ago

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…

11 hours ago

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

14 hours ago