ylytdeng

WeChat 4.0 database decryptor - extract keys from memory, decrypt SQLCipher 4 databases, real-time message monitor

1,350
1,051
69% credibility
Found Feb 28, 2026 at 514 stars 3x -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

A Windows tool that extracts encryption keys from running WeChat processes to decrypt local chat databases, enabling offline viewing, real-time monitoring, and AI-powered querying of personal messages.

How It Works

1
🔍 Discover the Helper

You search online for a way to unlock and view your own WeChat chat history saved on your Windows computer.

2
💻 Get It Ready

Download the files to your Windows PC and make sure WeChat is running with simple preparations.

3
📁 Point to Your Files

Tell the tool where WeChat stores your personal chat files by updating a simple settings note.

4
🔑 Unlock the Secrets

Run the finder while WeChat is open—it peeks into the app's memory to grab the hidden unlocks for all your chat files.

5
🔓 Open Your Chats

The tool uses those unlocks to reveal all your chat databases, ready to browse like normal files.

6
Choose Your View
🌐
Live Web View

Open a local web page to see new messages pop up in real-time, like a personal dashboard.

💬
AI Chat Search

Link to an AI so you can ask questions about your chats and get summaries or searches instantly.

Chats Unlocked!

Now you can fully access your entire WeChat history, monitor new messages, and explore with ease—all from your own data.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 514 to 1,350 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is wechat-decrypt?

This Python tool decrypts PC WeChat 4.0 databases on Windows by extracting encryption keys from the running WeChat process memory, cracking SQLCipher 4 protection across all local DBs like chats, contacts, and media indexes. Users get plain SQLite files for direct querying, plus real-time message monitoring via CLI or a web dashboard at localhost:5678 with ~100ms latency using SSE streams. It solves accessing WeChat desktop backups or exporting chat history without manual key hunting.

Why is it gaining traction?

Unlike generic SQLCipher crackers, it auto-matches per-DB keys for WeChat 4.0's unique setup, handles WAL changes for live monitoring, and includes a web UI for instant message streams—perfect for github wechat export or robot prototypes. The Claude AI integration via MCP server lets you query chats semantically, standing out for devs blending WeChat data with LLMs. Low setup: tweak config.json, run key extraction, then decrypt or monitor.

Who should use this?

Windows devs building github wechat robot, clone, or web scrapers needing raw chat data for analysis or backups. Researchers decrypting WeChat 4.0 messages for forensics, or hobbyists exporting desktop history to clean/github wechat clean archives. AI tinkerers hooking Claude to live WeChat streams for natural language queries on contacts and history.

Verdict

Solid for personal WeChat 4.0 db decrypt and monitoring if you're on Windows with admin access—docs are clear, features deliver. At 102 stars and 0.7% credibility, it's early but functional; test on your data first, heed the legal disclaimer.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.