-
I just downloaded the lastest version of your Signal fork (6.0.1.0-JW) here on github, and trying to import a decrypted msgstore.db according to [this guide](https://johanw.home.xs4all.nl/Signal/signa…
-
Hi,
Is there a possibility to add the option to decrypt the file "stickers.db.crypt14"?
Thanks!
-
Using the latest Whatsapp non-beta (2.22.2.73), whatsapp-viewer 1.15.
Since 23rd the msgstore-2022*crypt14 changed in a way that fails decryption with whatsapp-viewer. Apart from possibly updating W…
-
When opening a database I get a message that I am using an older version of the viewer.
When opening the database with a sql viewer I saw they changed and hashed a lot of data like phone numbers etc.…
wjp79 updated
2 years ago
-
Please connect your Android device with USB Debugging enabled:
* daemon not running; starting now at tcp:5037
* daemon started successfully
./WhatsAppKeyDBExtract.sh: line 57: [: -eq: unary opera…
-
I have a OnePlus Android 12 Phone.
Using `WhatsApp-Key-DB-Extractor` I can successfully extract the whatsapp databases. My whatsapp backups are not password protected.
However, after explorer th…
-
I really don't have the time and the need to do that, but now that the file formats are documented and almost 100% parsed, it is now definitely possible to create an encrypter. If someone else wants t…
-
I have forgotten the password and I also do not have the 64-digit key. Can I still decrypt the file?
-
Using the WhatsApp extractor ([YuvrajRaghuvanshiS](https://github.com/YuvrajRaghuvanshiS) /
[WhatsApp-Key-Database-Extractor](https://github.com/YuvrajRaghuvanshiS/WhatsApp-Key-Database-Extractor)) w…
-
Hey guys, I have the following problem concerning the encryption function:
I have and old database `msgstore_old.db.crypt14` and the corresponding key file. Using the decryption function `wadecrypt…