raphaelnapi

Script em python para descriptografar arquivos de mídia trafegados pelo aplicativo WhatsApp.

14
1
100% credibility
Found Mar 16, 2026 at 14 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

A script that unlocks encrypted media files from WhatsApp using details from the app's records, designed for digital forensics and investigations.

How It Works

1
🔍 Discover the Recovery Tool

While researching ways to recover locked photos, videos, or documents from WhatsApp chats for legitimate investigations, you find this simple script.

2
📁 Gather Your Locked Media

Locate and save the encrypted media file from WhatsApp's records, along with the special unlock code stored in the app's chat history.

3
📝 Note the Media Type

Identify if it's a photo, video, sound, or document so the tool knows how to handle it properly.

4
🔓 Run the Unlock Magic

Tell the script about your locked file, its type, the unlock code, and where to place the recovered version – it does the rest effortlessly.

5
Watch It Work

The tool quietly processes everything, deriving the right secrets and peeling away the locks to reveal the original content.

Enjoy Your Recovered Media

Open the new file to see the original photo, video, audio, or document exactly as it was shared, ready for your investigation.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 14 to 14 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is decrypt_wpp_media?

This Python script decrypts WhatsApp's encrypted media files (.enc) downloaded from chat databases like msgstore.db, turning them into usable images, videos, audio, or documents. You run a simple CLI command with the input file, media type, hex media key from the DB, and output name—handles HKDF key derivation and AES-CBC decryption automatically. It's built for recovering files from Android backups or similar, even view-once messages that stick around in storage.

Why is it gaining traction?

Unlike bloated forensic suites, this is a lightweight, offline Python GitHub script that runs anywhere—Windows 10, Linux, or even in GitHub Actions workflows for batch processing WhatsApp arquivos. Developers dig the no-setup vibe: pip install cryptography, feed it args, done; supports exact WhatsApp media types without fluff. The clear README with examples and legal warnings makes it a quick win for targeted decryption over reverse-engineering from scratch.

Who should use this?

Digital forensics investigators analyzing WhatsApp msgstore.db from seized phones or backups. Peritos handling court cases needing to reconstruct media from aplicativos like WhatsApp on Android. Researchers or pentesters scripting Python GitHub tools for privacy audits or app reverse-engineering.

Verdict

Useful one-trick pony for WhatsApp media recovery, with solid docs and CLI ease, but 14 stars and 1.0% credibility score scream early maturity—lacks tests and MAC verification, so validate outputs manually. Worth forking if you're in forensics; skip for production otherwise. (178 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.