- I have a passion for mobile digital forensics and the art of data extractions.
- Free Mobile Forensics Tool that allows you to:
- It is important that you take the training to ensure greater security and success in acquisitions without data loss (Brief training in the English language).
- Γ importante que vocΓͺ faΓ§a o treinamento para garantir maior seguranΓ§a e sucesso nas aquisiçáes sem perda de dados, veja no final da pΓ‘gina.
- Backup ADB.
- APK Downgrade in 15 Apps: WhatsApp (com.whatsapp), Telegram (org.telegram.messenger), Messenger (com.facebook.orca), ICQ (com.icq.mobile.client), Twitter (com.twitter.android), Instagram (com.instagram.android), Signal (org.thoughtcrime.securems), Linkdin (com.linkedin.android), Tiktok (com.zhiliaoapp.musically), Snapchat (com.snapchat.android), Tinder (com.tinder), Badoo (com.badoo.mobile), Mozilla Firefox (org.mozilla.firefox), Dropbox (com.drobox.android), Alibaba (com.alibaba.intl.android.apps.poseidon)).
- Parser Chats WhatsApp.
- (NEW) Whatsapp .opus audio transcription and transcription plot in CHATS HTML PARSER:
- Miscellaneous ADB collections: (System Properties (Full), Dumpsys (Full), Disktats (Disk Information), Android Geolocation Dump (Location Manager State), IMEI (01 ,02), S/N (Serial Number), Processes, TCP (Active Internet connections), Accounts (UserInfo), DUMP Wifi, DUMP Detailed Wifi, CPU Information, Memory Information, Display Information (WINDOW MANAGER DISPLAY CONTENTS), Resources, Resolution (Physical size), Screen Dump (.XML file), Dump Backup (Backup Manager is enabled), List Installed Third-Party Applications, List Native System Applications, Contacts, SMS, System Events, Active Users, Android Version, DB Info (Applications Database Info), On/Off History, LogCat, Space In Use Information, Carrier, Bluetooth (Bluetooth Status), Image File Location, Audio File Location, Video File Location, Face Recognition DUMP, Global Settings, Security Settings a, System Settings, Remove/Add PIN (Requires current PIN), DUMP ADB (ADB Connections), Reboot, Reboot Recovery Mode, Reboot Bootloader Mode, Reboot Fastboot Mode.
- Tracking, Downloading and Decryption of Whatsapp .ENC files.
- Contact List Search.
- Deleted WhatsApp Photos Avatars and Contacts.
- (NEW) Decrypting WhatsApp Databases Crypt 14/15
- Screenshots.
- Screen DUMP.
- Chat Capture.
- Automatic integration with IPED.
- (NEW) Access Through the Tool to IPED Tools.
- Automatic integration with AFLogical.
- Automatic integration with Alias Connector.
- Conversion from .AB to .TAR.
- Fast Scan and Real-time Transfer .
- Image Finder (Hash, Metadata, Geolocation, Plotting the location on Google Maps and Google Earch).
- Plotting (IN BATCHES) of the Geolocation of images on Google Earch (geo.kml) with patch and thumbnails of the images.
- Installing and Uninstalling APKs via ADB.
- HASH Calculator.
- Android Folder Browser (PULL and PUSH).
- Device Mirroring.
- Instagram Data Scraping.
- General single copy
- Automatic integration with MVT-1.5.3.
- Access Through the Tool to JADX.
- Access Through the Tool to WhatsApp Viewer.
- Access Through the Tool to the BCV.
- Access Through the Tool to SQLStudio.
- PRUNE GPS Tool Access.
- Access Through the Tool to jExiftool GUI.
- Conversion of .csv/.txt files with GEOLIZATION information provided by court decisions into .KML for police investigations.
- Merge WhatsApp DATABASES
- Android default backup.
-
WhatsApp (com.whatsapp)
-
Telegram (org.telegram.messenger)
-
Messenger (com.facebook.orca)
-
ICQ (com.icq.mobile.client)
-
Twitter (com.twitter.android)
-
Instagram (com.instagram.android)
-
Signal (org.thoughtcrime.securems)
-
Linkdin (com.linkedin.android)
-
Tiktok (com.zhiliaoapp.musically)
-
Snapchat (com.snapchat.android)
-
Tinder (com.tinder)
-
Badoo (com.badoo.mobile)
-
Mozilla Firefox (org.mozilla.firefox)
-
Dropbox (com.drobox.android)
-
Alibaba (com.alibaba.intl.android.apps.poseidon)
-
Examples:
- The tool does a test in a generic application (com.aplicacaoteste.apk) before starting the DOWNGRADE process in the target APP.
- Tips: XIAOMI phones may come with USB protections, remove these protections without taking the device out of airplane mode by following the steps below:
- Select the Chats destination folder (Copy the "Media" folder in this same location).
- Select the folder: \com.whatsapp\f\Avatars
- Select the .DB file: \com.whatsapp\db\msgstore.db
-
(NEW) In the "Generate Whatsapp Chats" modules it is possible to plot the transcripts in HTML.
-
(NEW) You can also transcribe the audios along with Whatsapp parser process.
-
New Schema (Table: message):
-
Fields:
-
_id, chat_row_id, from_me, key_id, sender_jid_row_id, status,broadcast, recipient_count, participant_hash, origination_flags, origin, timestamp received_timestamp, receipt_server_timestamp, message_type, text_data (Mensagens), starred, lookup_tables, message_add_on_flags, sort_id
- Select the Chats destination folder (Copy the "Media" folder in this same location).
- Select the folder: \com.whatsapp\f\Avatars
- Select the .DB file: \com.whatsapp\db\msgstore.db
-
(NEW) In the "Generate Whatsapp Chats" modules it is possible to plot the transcripts in HTML.
-
(NEW) You can also transcribe the audios along with Whatsapp parser process.
-
Old Schema (Table: messages)
-
Fields:
-
_id, key_remote_jid, key_from_me, key_id, status, needs_push, data (Mensagens), timestamp, media_url, media_mime_type, media_wa_type, media_size, media_name, media_caption, media_hash, media_durationorigin, latitude, longitude, thumb_image, remote_resource, received_timestamp, send_timestamp, receipt_server_timestamp, receipt_device_timestamp, read_device_timestamp, played_device_timestamp, raw_data, recipient_count, participant_hash, starred, quoted_row_id, mentioned_jids, multicast_id, edit_version, media_enc_hash, payment_transaction_id, forwarded, preview_type, send_count, lookup_tables, future_message_type, message_add_on_flags.
- In the "OPUS audio transcription" module you can transcribe one or thousands of audios at the same time.
- In the "Generate Whatsapp Chats" modules it is possible to plot the transcripts in HTML.
- You can also transcribe the audios along with Whatsapp parser process.
- Generate HTML report with transcribed texts, hash, contact linked to audio and chat linked to audio.
- System Properties (Full).
- Dumpsys (Complete).
- Disktats (Disk information).
- Android Geolocation Dump (Location Manager State).
- IMEI (01 .02).
- Y/N (Serial Number).
- Law Suit.
- TCP (Active Internet connections).
- Accounts (UserInfo).
- DUMP Wifi.
- Detailed Wifi DUMP.
- CPU information.
- Memory Information.
- Display Information (WINDOW MANAGER DISPLAY CONTENTS).
- Resources.
- Resolution (Physical size).
- Screen Dump (.XML file).
- Dump Backup (Backup Manager is enabled).
- List Installed Third-Party Applications.
- List Native System Applications.
- Contacts.
- SMS.
- System Events.
- Active Users.
- Android version.
- DB Info (Applications Database Info).
- On/Off History.
- LogCat.
- Space in Use Information.
- Operator.
- Bluetooth (Bluetooth Status).
- Location of Image Files.
- Location of Audio Files.
- Location of Video Files.
- Face Recognition DUMP
- Global Settings.
- Security Settings.
- System Settings.
- Remove/Add PIN (Requires current PIN).
- DUMP ADB (Connections ADB).
- Reboot.
- Reboot Recovery Mode.
- Reboot Bootloader Mode.
- Reboot Fastboot Mode.
- Examples:
- Dump ADB: ADB.txt, in this example we can check the last computer connected via ADB with the device:
- Dumpsys: dumpsys.txt, in addition to bringing thousands of device information, in this example we can check the uninstall date of an application:
- Note: The information can be in Unix Timestamp time format, use the link below to convert:
- 1649374898421 (Unix Timestamp) = Thu Apr 07 2022 23:41:38 GMT+0000 (GMT)
- https://www.unixtimestamp.com/
- Generate the Script and run the generated .bat file.
"C:\Forensics\bin\whatsapp-media-decrypt\decrypt.py"
- Select the folder: \com.whatsapp\f\Avatars
- Select .DB file: \com.whatsapp\db\wa.db
- Crypt14.
- Crypt15.
- Indexing of folders, .zip, .tar, .dd, .ufdr.
- "C:\Forensics\bin\IPEDTools\IPEDTools.exe"
- Performs the acquisition automatically without user intervention.
- "C:\Forensics\bin\AFLogicalOSE152OSE.apk"
- Performs the acquisition automatically without user intervention.
- "C:\Forensics\bin\com.alias.connector.apk"
- Passworded ADB backups may take longer to convert.
- Try not to put passwords in the backups requested in "ADB Backup" or "Downgrade", so you speed up the conversion process.
- If this module doesn't work, try to add the "C:\Forensics" patch to the system variables
- Images: .jpg, .jpeg, .png, .psd, .nef, .tiff, .bmp, .tec, .tif, .webp
- Videos: .aaf, .3gp, .asf, .avi, .m1v, .m2v, .m4v, .mp4, .mov, .mpeg, .mpg, .mpe, .mp4, .rm, .wmv, .mpv , .flv, .swf
- Audios: .opus, .aiff, .aif, .flac, .wav, .m4a, .ape, .wma, .mp2, .mp1, .mp3, .aac, .mp4, .m4p, .m1a, .m2a , .m4r, .mpa, .m3u, .mid, .midi, .ogg
- Archives: .zip, .rar, .7zip, .7z, .arj, .tar, .gzip, .bzip, .bzip2, .cab, .jar, .cpio, .ar, .gz, .tgz, .bz2
- Databases: .db, .db3, .sqlite, .sqlite3, .backup (SIGNAL)
- Documents: .htm, .html, .doc, .docx, .odt, .xls, .xlsx, .ppt, .pptx, .pdf, .txt, .rtf
- Executables: .exe, .msi, .cmd, .com, .bat, .reg, .scr, .dll, .ini, .apk
- Note: For this module DO NOT save your acquisitions on the Desktop, save for example in "C:\folder_name\collection_01" to run the image search.
Video_1648769895.00_00_00-00_01_39.00_00_00-00_01_35.00_00_07-.mp4
π (NEW) Plot (BATCH) of Geolocation of images on Google Earch (geo.kml) with patch and thumbnails of images:
- Note: To plot the thumbnails along with the yellow points, download Google Earch Pro, if you plot on Google Earch Online, only the blue points will be plotted without the images.
- Click on GENERATE KML to batch generate the geo.kml file
- .APK files
- Note: For this module DO NOT save your acquisitions on the Desktop, save for example in "C:\folder_name\collection_02" to calculate the Hashs of the files.
- Calculates the Hash of all files in an acquisition.
- SHA-256.
- SHA-1.
- SHA-384.
- SHA-512.
- SHA-MD5.
- A Simple folder browser to PULL and PUSH files or folders.
- "C:\Forensics\bin\scrcpy"
- If you have problems with "adb pull" or "adb backup", copy all files from the device in separate processes, copying one at a time.
- "C:\Forensics\bin\mvt-1.5.3\mvt.bat"
- "C:\Forensics\bin\jadx-1.2.0\jadx-gui-1.2.0-no-jre-win.exe"
- "C:\Forensics\bin\WhatsAppViewer.exe"
- "C:\Forensics\bin\bycodeviewer\GUI-ByteCode.bat"
- "C:\Forensics\bin\SQLiteStudio\SQLiteStudio.exe"
- "C:\Forensics\bin\gpsprune\GUI-GPSPrune.bat"
- "C:\Forensics\bin\exiftoolgui\jExifToolGUI.exe"
π± Conversion of .csv/.txt files with GEOLIZATION information provided by court decisions into .KML for police investigations.
- Plotting thousands of points on the map in seconds
- In this example below, more than 36 thousand points were plotted on the map
- Example data from .csv file: 2022-04-15T02:59:45.368Z,2022-04-15T02:59:45.368, (Latitude/Column 2) -23.7416538, (Longitude/Column 3) -46.5744873,15,WIFI,1663554331,ANDROID
- "C:\Forensics\bin\merge\merge_databases_exe\merge_databases.exe -lv"
- TECHNICAL knowledge of Forensics in Mobile Devices.
- Minimal computer knowledge
- Device with DEBUG mode activated.
- Windows 10/11 with its proper updates.
- JAVA (https://www.java.com/pt-BR/).
- PHYTON (https://www.python.org/).
- ACADEMIA DE FORENSE DIGITAL - AFD (Advanced Extraction with Avilla Forensics).
- https://academiadeforensedigital.com.br/
- About the course: https://academiadeforensedigital.com.br/treinamentos/treinamento-de-avilla-forensics/
- Course content: https://drive.google.com/file/d/1mARPeClW1o3EBNIcLh3i9YzBn_fGuSet/view
- Webinar:
- Manual and step-by-step video prepared by Police Officer Emerson Borges - POLICE OF MINAS GERAIS - BRAZIL
- https://youtu.be/KuSmct1Qa30
- MANUAL_EXTRACAO_AVILLA_FORENSICS.pdf
- In progress
- Extract the tool from "C:\Forensics-3-5".
- Do not put spaces in the tool folder name.
Requires JAVA (https://www.java.com/pt-BR/):
- IPED-4.1.1: "C:\Forensics\IPED-4.0.6_and_plugins" (Just install JAVA).
- IPED Tools: "C:\Forensics\bin\IPEDTools\IPEDTools.exe" Just install JAVA).
- Bycode Viewer: "C:\Forensics\bin\bycodeviewer" (Just install JAVA).
- Jadx-1.2.0: "C:\Forensics\bin\jadx-1.2.0" (Just install JAVA).
- Backup Extractor: "C:\Forensics\backup_extractor" (Just install JAVA).
- The Backup Extractor module (.AB to .TAR) may require you to add the "C:\Forensics" patch to the system variables.
- GPS PRUNE: "C:\Forensics\bin\gpsprune" (Just install JAVA).
- jExiftool GUI: "C:\Forensics\bin\exiftoolgui\jExifToolGUI.exe" (Just install JAVA).
Requires python (https://www.python.org/):
- Instaloader: To install run the file "C:\Forensics\bin\instaloader-master\install_instaloader.bat" or:
pip install instaloader
- MVT-1.5.3: To install run the file "C:\Forensics\bin\mvt-1.5.3\install_mvt.bat" or:
pip install mvt
- Whacipher: To install run the file "C:\Forensics\bin\install_whacipher.bat" or:
pip install --upgrade -r requirements.txt
- WhatsApp-Crypt14-Crypt15-Decrypt: To install run the file "C:\Forensics\bin\WhatsApp-Crypt14-Crypt15-Decrypter-main\install-Decrypter.bat" or:
pip install -r requirements.txt
- https://academiadeforensedigital.com.br/treinamento-oficial-sobre-avilla-forensics/
- https://drive.google.com/u/0/uc?id=10zA6CDzIQDGvGfhvuR20fNFY5ix76pv-&export=download/
- SHA256: 77ba64d3211eabe8020ec6ac81f9ff2d42966724a699b913a8c8b36454d4db3a
-
CHAVE PIX: 3901d8ea-22ca-4ba8-a0fb-2615e5485b2c
-
Donate Pypal:
-
Link: https://www.paypal.com/donate/?hosted_button_id=PCMBCJFU2T4CG (Fernanda Santos)
- C#.
- Python.
- Java.
- Free Software.
-
IPED-4.1.1: https://github.com/sepinf-inc/IPED (Requires Java).
-
IPED Tools: https://github.com/thiagofuer/IPEDTools_Releases/releases (Requires Java).
-
Bytecode Viewer: https://github.com/phith0n/bytecode-viewer (Requires Java).
-
Jadx-1.2.0: https://github.com/skylot/jadx (Requer Java).
-
Android Backup Extractor: https://github.com/nelenkov/android-backup-extractor (Requires Java).
-
GPS PRUNE: https://activityworkshop.net/software/gpsprune/download.html (Requires Java).
-
jExiftool GUI: https://github.com/hvdwolf/jExifToolGUI (Requires Java).
-
Instaloader: https://github.com/instaloader/instaloader (Requires Python).
-
MVT: https://github.com/mvt-project/mvt (Requer Python).
-
WhatsApp-Crypt14-Crypt15-Decrypter: https://github.com/ElDavoo/WhatsApp-Crypt14-Crypt15-Decrypter (Requires Python).
-
Whatsapp-media-decrypt: https://github.com/sh4dowb/whatsapp-media-decrypt (Requires Python).
-
Screen Copy: https://github.com/Genymobile/scrcpy
-
AFLogical OSE 1.5.2: https://github.com/nowsecure/android-forensics
-
Alias Connector: https://www.newseg.seg.br/newseg/
-
SqlStudio: https://sqlitestudio.pl/
-
Audio transcription: https://github.com/Uberi/speech_recognition
-
Audio transcription: https://github.com/delcristianoritta/whatsapptranscriber
-
Audio transcription: https://www.newseg.seg.br/newseg/