Andriller has the means of decoding pattern locks, and cracking PIN codes and Passwords.
Pattern, PIN and Password Cracking These features require a little more processing power, so are best to be performed locally on your own machine. The methods are explained below.
Get Salt from... Salt is an integer value, which is required for cracking the passwords. Salt can be positive as well as negative integers. The salt value can be obtained by parsing setting.db or locksettings.db files; when successfully fetched, the Salt value will be printed into the main terminal window.
To decode a Pattern lock, click [Browse] and select the gesture.key file located at /data/system/gesture.key on your Android device.
Else, just submit the gesture pattern hash (hexadecimal string of the gesture.key file), and click [Decode].
When decoded, the pattern will be shown as a sequence list. When Pattern is filled, click [Draw] and the pattern displayed in a visualised form.
Right-click on the drawn pattern to save is as a PostScrip file.
Tip: if you wish to draw a pattern but don't have a gesture hash key or value, you can double-click on the disabled Pattern field, this will re-enable the field for editing. Enter the pattern in a form of a list, and click [Draw]. The pattern will be drawn, which can be saved as a file.
Once Start is clicked, a percentage progress will be displayed.
You can pause and resume cracking at any time. Last tried PIN will be shown just to let you know how far you've gone.
Also includes Samsung cracking, which uses different type of password hashing than other Android vendors.
Once Start is clicked, tried password will be displayed while cracking.
You can pause and resume cracking at any time, just like with PIN cracking.
Also includes Samsung cracking, which uses different type of password hashing than other Android vendors.
This cracking method cannot be paused/resumed like with other methods.
Andriller supports decryption of encrypted WhatsApp databases:
Plain Crypt (msgstore.db.crypt) The encrypted database is automatically decrypted into an SQLite3 database. Browse and select the encrypted file, Andriller will decode to a new file in the same directory.
msgstore.db.crypt ==> msgstore.db
Crypt5 (msgstore.db.crypt5) To successfully decrypt this type of database, an email address is required, which is synchronised with the Android device. Browse and select the encrypted file, you will be prompted to enter the email address. Once successful, it will decode to a new file in the same directory.
msgstore.db.crypt5 ==> msgstore.db
Crypt7-12 (msgstore.db.crypt7-12) To successfully decrypt this type of database, an encryption key file is required for the following location: '/data/data/com.whatsapp/files/key' <-- absolute path 'apps/com.whatsapp/f/key' <-- from Android backup This file should be automatically extracted during normal Andriller extraction (root and AB), and saved in the 'db' folder of the extraction
Browse and select the encrypted file, you will be prompted to browse and select the key file next. Once successful, it will decode to a new file in the same directory.
msgstore.db.crypt7 ==> msgstore.db
Facebook This utility will decode multiple Facebook databases and produce combined messages on one report (without duplicates). This is useful if attempting to combine "threads_db2" databases from com.facebook.katana and com.facebook.orca applications directories.
WhatsApp This utility will decode multiple WhatsApp databases and produce combined messages on one report (without duplicates). Use recovered (from /data/data/com.whatsapp) and decrypted backup databases (such as decrypted msgstore.db.crypt8 from /sdcard/WhatsApp/Databases).
Andriller has a feature to unpack Android backup files from Android versions 4.x and above.
AB to TAR Converts backup.ab file to Tarball.
backup.ab ==> backup.ab.tar
AB to folder Converts and extracts backup.ab to a folder.
backup.ab ==> backup.ab_extracted/
New Feature for Andriller - take screen captures.
Supports Android devices version 4.x and above. Screen captures are saved at same resolution that the device display supports. Generate a report from taken screen captures. Add notes to taken captures.
Configation preferences is located at File > Configurations
I agree Our site saves small pieces of text information (cookies) on your device in order to deliver better content and for statistical purposes. You can disable the usage of cookies by changing the settings of your browser. By browsing our website without changing the browser settings you grant us permission to store that information on your device.