Here is the markdown description:
Andriller CE (Community Edition)
Automated data extraction and decoding Data extraction of non-rooted devices by Android Backup (Android versions 4.x, varied/limited support) Data extraction with root permissions: root ADB daemon, CWM recovery mode, or SU binary (Superuser/SuperSU) Data parsing and decoding for Folder structure, Tarball files (from nanddroid backups), and Android Backup (backup.ab files) Selection of individual database decoders for Android apps Decryption of encrypted WhatsApp archived databases (.crypt to .crypt12, must have the right key file) Lockscreen cracking for Pattern, PIN, Password (not gatekeeper) Unpacking the Android backup files Screen capture of a device's display screen
3.6-3.10 (64-bit version recommended)
adb
python3-tk
Create a virtual environment using Python 3:
python3 -m venv env
Activate the virtual environment (Linux/Mac):
source env/bin/activate
Install Andriller with its Python dependencies (same command to upgrade it):
pip install andriller -U
Run GUI:
python -m andriller
MIT License
> Visit andriller Website <