• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Andriller v3.5.2 - a collection of forensic tools for smartphones

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,607
Solutions
2
Reputation
32
Reaction score
100,453
Points
2,313
Credits
32,590
‎6 Years of Service‎
 
76%
android-forensic.png


Andriller CE (Community Edition)

Andriller – is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has features, such as powerful Lockscreen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (some Apple iOS & Windows) databases for decoding communications. Extraction and decoders produce reports in HTML and Excel formats.

Features

    Automated data extraction and decodingThis feature allows importing individual App database files for automated parsing of the data. There are decoders mainly for Android and some for Apple iOS Apps. Once successfully decoded, reports will be shown on your web browser. Databases can be exported from mainstream forensic tools, such as XRY, UFED Cellebite, Oxygen Forensic, and imported into Andriller for individual decoding. The output from Andriller offers cleaner output data.
    Data extraction of non-rooted without devices by Android Backup (Android versions 4.x, varied/limited support)
    Data extraction with root permissions: root ADB daemon, CWM recovery mode, or SU binary (Superuser/SuperSU)
    Data parsing and decoding for Folder structure, Tarball files (from nanddroid backups), and Android Backup (backup.ab files)This will parse folder structures from Android filesystems and will produce Andriller style reports. These could be exports of the filesystem from raw image files, or from ‘adb pull /data’ extractions, or unpacked ‘.tar’ files content.Tarball Files This will parse and decode nanddroid backup files such as ‘data.tar’ (including concatenated files), and will produce Andriller style reports. Nanddroid tarball backups are usually produced by custom recoveries, such as ClockWorkMod and TWRP.Android Backup Files This will parse and decode ‘backup.ab’ files, and will produce Andriller style reports.
    Selection of individual database decoders for Android apps
    Decryption of encrypted WhatsApp archived databases (.crypt to .crypt12, must have the right key file)
    Lockscreen cracking for Pattern, PIN, Password (not gatekeeper)
    Unpacking the Android backup files
    Screen capture of a device’s display screen

Changelog v3.5.2

    Switched timeouts to wrapt_timeout_decorator to fix bug with Python 3.8

To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top