Extract WhatsApp private key from any non-rooted Android device (Android 7+ supported)
Extract WhatsApp private key from any Android device (Android 7+ supported). This tool spawns a clean Android 6 emulator and attempts to register with your number to extract msgstore private key.
NOTE: this tool is in beta stage and might not be stable. You're more than welcome to improve this software by submitting a PR or an issue!
To use WhatsDump without installing Python and its dependencies, you can find pre-built binaries (thanks to PyInstaller) here: https://github.com/MarcoG3/WhatsDump/releases
You want to decrypt and/or extract msgstore.db database from your Android device.
| Flag | | Behaviour |
| ------------- | ------------- | ------------- |
| --wa-phone | Required | WhatsApp phone number associated with msgstore database
from which you will receive verification SMS (with prefix, ex. +393387182291 |
| --wa-verify | Required | Phone verification method to use (SMS or CALL) |
| --install-sdk | Optional | Installs Android SDK on android-sdk/ directory. This is mandatory to run WhatsDump |
| --msgstore | Optional | Location of msgstore database to decrypt (or plug in device to USB port) |
| --verbose | Optional | Show verbose (debug) output |
| --show-emulator | Optional | Show emulator screen (by default headless) |
| --no-accel | Optional | Disable hardware acceleration (very slow emulator) |
python whatsdump.py --wa-phone +15417543010 --wa-verify sms
python whatsdump.py --msgstore /path/to/msgstore.db --wa-phone +15417543010 --wa-verify sms
SIM card associated with msgstore.db to receive WhatsApp confirmation PIN (SMS or CALL)
Install all the Python library dependencies by running the following command:
pip install -r requirements.txt