Skip to content

kp-forks/WhatsApp-Key-Database-Extractor

 
 

Repository files navigation



Logo

WhatsApp Key/Database Extractor

Extract key/msgstore.db from /data/data/com.whatsapp in Android v4.0+ without root.

-----------------------------------------------------

-----------------------------------------------------

About The Project

This project is inspired by EliteAndroidApps/WhatsApp-Key-DB-Extractor. Since Android v4.0+ Google has removed adb backup and apps no longer supported being backed up by "adb backup -f myApp.ab -apk com.foobar.app". However there is one catch in this scenario and that is some old version of many apps including WhatsApp support that to this day, and that's the idea...

The idea is to install "Legacy Version" of WhatsApp on you device via adb and use "adb backup" to fetch files from "/data/data/com.whatsapp" folder which includes both the 'key' and 'msgstore.db' (non encrypted) file and after that restore current WhatsApp.

Built With

Depends on

  • Java (To extract backup)

-----------------------------------------------------

Getting Started

Before doing anything take a backup of your chats and turn off your phone's internet so you don't lose any new messages. For that go to 'WhatsApp Settings → Chat Settings → Chat Backup' here take a local bacakup. Prepare for Worst. After intallation follow on screen instructions.

Prerequisites

  • O/S: Any Windows/Mac/Linux. Do not have access to any of these? Try Termux Edition.
  • Python 3.x
  • Java
  • ADB Drivers
  • USB Debugging must be enabled on the target device. Settings → Developer Options → USB debugging.
    • If you cannot find Developer Options then please go to: Settings → About phone/device and tap the Build number multiple times until you're finally declared a developer.
  • Android device with Android 4.0 or higher. i.e. Ice Cream Sandwich, Jelly Bean, KitKat, Lollipop, Marshmallow, Nougat, Oreo, Pie, Q.

Installation

  1. Clone the repo
git clone https://github.com/YuvrajRaghuvanshiS/WhatsApp-Key-Database-Extractor.git && cd WhatsApp-Key-Database-Extractor
  1. Install dependencies (for linux and OSX only) : skip sudo for mac.
chmod +x bin/linux_dependencies.sh
sudo ./bin/linux_dependencies.sh
  1. Run wa_kdbe.py
python3 wa_kdbe.py

Command Line Flags

Short Flag Type Behaviour Status
-ar --allow-reboot Optional Bool Reboots device before installing Legacy WhatsApp. Stable
-ip --tcp-ip IP_ADDRESS Optional String Connects to a remote device via TCP mode. Stable
-p --tcp-port PORT Optional String Port number to connect to. Default : 5555. Stable
-s --scrcpy Optional Bool Show device screen as a window using ScrCpy. Stable

Example usage :

python3 wa_kdbe.py --allow-reboot --tcp-ip 192.168.43.130 --tcp-port 5555 --scrcpy

Standalone Operations

These operations are standalone implementation of their defined task. One should run these when specifically needed. For ex : Process finished but WhatsApp was not reinstalled on device.

  1. Run view_extract.py : To unpack whatsapp.ab to whatsapp.tar and extract files.
python3 view_extract.py
  • IMP : For this to work there should be 'whatsapp.ab' file either in 'extracted/' folder or in 'tmp' folder.
  1. Run protect.py : To compress/decompress user folder with(out) password for safekeeping.
python3 protect.py
  • IMP : For this to work there should either be "userName" folder or "userName.7z" file in 'extracted' folder. Where "userName" is reference user name you entered earlier.
  1. Run restore_whatsapp.py : To reinstall WhatsApp on device.
python3 restore_whatsapp.py

Features & ToDo

  • ✔️ Extracts msgstore.db from /data/data/com.whatsapp. (duh)
  • ✔️ Works wirelessly without USB cable using "ADB over TCP" with --tcp-ip IP --tcp-port PORT flags.
  • ✔️ See and control your android phone with your computer using ScrCpy using --scrcpy flag.
  • ✔️ Works with any android device v4.0+ so far.
  • ✔️ Works with any android device no matter where it is in universe as long as it is running ADB over TCP.
  • ✔️ Moves msgstore.db to your phone.
  • ✔️ Creates password protected 7z file so keep your extraction safe.
  • ✔️ Continues without JAVA installed and make "whatsapp.tar" out of "whatsapp.ab" once java is installed by running python3 view_extract.py.
  • ✔️ Command line arguments
  • ✔️ ADB Devices menu.
  • ✔️ Implement datetime.
  • ✔️ Extracts backup created over TCP { #24 bin\tar.exe: Unexpected EOF on archive file in Windows.}.
  • ❌ Works with WhatsApp Business.

Demo

YuvrajRaghuvanshiS#33

Troubleshooting

  • If list is empty close terminal, remove and replug the device, and re-run the script. Read More

  • If you have never used USB Debugging before, you may also need to verify the fingerprint by ticking the checkbox and tapping 'allow' on device popup.

  • If you have set a default backup password in your Android settings, then this MUST be the backup password that you PROVIDE when prompted to backup your data. Else it WILL fail!

  • If you get an error saying "AES encryption not allowed" then you need to update your Oracle Java Cryptography Extension (JCE) to Unlimited Strength Jurisdiction Policy Files.

  • WhatsApp crashing? Run python3 restore_whatsapp.py. Or "clear data/storage" / uninstall and reinstall from Play Store.

  • In MIUI, "Failure [INSTALL_FAILED_USER_RESTRICTED: Install canceled by user]" occurs during installation of LegacyWhatsapp.apk, fix it by allowing install via adb

  • If "[INSTALL_FAILED_VERSION_DOWNGRADE]" run with --allow-reboot flag.

    python3 wa_kdbe.py --allow-reboot
    
  • If "[INSTALL_PARSE_FAILED_NOT_APK]" delete helpers/LegacyWhatsApp.apk and re-run.

  • If "adb: error: cannot create 'tmp/WhatsAppbackup.apk': Permission denied" on macOS run script with sudo.

    sudo python3 wa_kdbe.py
    

-----------------------------------------------------

Roadmap

See the open issues for a list of proposed features (and known issues).

-----------------------------------------------------

Limitations

There always are limitations on how much we can make it work and this is what allows us to keep going. Well no matter what I do sometimes this tool just won't work on some devices and if that's your case you can try this fork of MarcoG3's WhatsDump by Alessandro Maggio.

-----------------------------------------------------

Contributing

Contributions are what make the open source community such an amazing place to be learn, inspire, and create. Any contributions you make are greatly appreciated.

  1. Fork the Project
  2. Create your Feature Branch (git checkout -b feature/AmazingFeature)
  3. Commit your Changes (git commit -m 'Add some AmazingFeature')
  4. Push to the Branch (git push origin feature/AmazingFeature)
  5. "Draft" a pull request and mark it "Ready for review" once work is done.

-----------------------------------------------------

License

Distributed under the MIT License. See LICENSE for more information.

-----------------------------------------------------

Agreement

I made this project because it was hard for me to kill time and the other one was very old. This tool is provided "as-is" and hence you will be responsible however you use it. Cheers☕

-----------------------------------------------------

Contact

Yuvraj Raghuvanshi - Send me a mail

Project Link: https://github.com/yuvrajraghuvanshis/WhatsApp-Key-Database-Extractor

-----------------------------------------------------

About

The most advanced and complete solution for extracting WhatsApp key/DB from package directory (/data/data/com.whatsapp) without root access

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 98.1%
  • Shell 1.6%
  • Other 0.3%