Translate

Avilla Forensics 3.0 FREE NO NEED ACTIVATION - Translated into english (v1_0_0_183)

Avilla Forensics 3.0 English Version FREE

Avilla Forensics is a must-needed tool for android users for backup devices, analyzing devices, or decrypt WhatsApp data or many features which help users to restore data from the various application. I have described below you can check.

Credit goes to:: https://github.com/AvillaDaniel

🔎A very powerful set of tools for a forensic specialist. For full-fledged work, Java and python are required (packages:instaloader, mvt, pycryptodome, and Whacipher).

Only to work with smartphones, they must have debugging mode enabled.

But the abundance of opportunities that we get for free is just amazing. Yes, there are products from Oxygen Software in Russia, but they are paid, although not much better, probably only working with cloud services like Oxygen, which is not enough, but do not forget that it's all completely free.

  • Free Mobile Forensics Tool that allows you to:
  • It is important that you take the training to ensure greater security and success in acquisitions without data loss (Brief training in the English language).
  • É importante que você faça o treinamento para garantir maior segurança e sucesso nas aquisições sem perda de dados, veja no final da página.

  1. Backup ADB.
  2. APK Downgrade in 15 Apps: WhatsApp (com.whatsapp), Telegram (org.telegram.messenger), Messenger (com.facebook.orca), ICQ (com.icq.mobile.client), Twitter (com.twitter.android), Instagram (com.instagram.android), Signal (org.thoughtcrime.securems), Linkdin (com.linkedin.android), Tiktok (com.zhiliaoapp.musically), Snapchat (com.snapchat.android), Tinder (com.tinder), Badoo (com.badoo.mobile), Mozilla Firefox (org.mozilla.firefox), Dropbox (com.drobox.android), Alibaba (com.alibaba.intl.android.apps.poseidon)).
  3. Parser Chats WhatsApp.
  4. Miscellaneous ADB collections: (System Properties (Full), Dumpsys (Full), Disktats (Disk Information), Android Geolocation Dump (Location Manager State), IMEI (01 ,02), S/N (Serial Number), Processes, TCP (Active Internet connections), Accounts (UserInfo), DUMP Wifi, DUMP Detailed Wifi, CPU Information, Memory Information, Display Information (WINDOW MANAGER DISPLAY CONTENTS), Resources, Resolution (Physical size), Screen Dump (.XML file), Dump Backup (Backup Manager is enabled), List Installed Third-Party Applications, List Native System Applications, Contacts, SMS, System Events, Active Users, Android Version, DB Info (Applications Database Info), On/Off History, LogCat, Space In Use Information, Carrier, Bluetooth (Bluetooth Status), Image File Location, Audio File Location, Video File Location, Face Recognition DUMP, Global Settings, Security Settings a, System Settings, Remove/Add PIN (Requires current PIN), DUMP ADB (ADB Connections), Reboot, Reboot Recovery Mode, Reboot Bootloader Mode, Reboot Fastboot Mode.
  5. Tracking, Downloading and Decryption of Whatsapp .ENC files.
  6. Contact List Search.
  7. Deleted WhatsApp Photos Avatars and Contacts.
  8. Decrypting WhatsApp Databases.
  9. Screenshots.
  10. Screen DUMP.
  11. Chat Capture.
  12. Automatic integration with IPED.
  13. Automatic integration with AFLogical.
  14. Automatic integration with Alias ​​Connector.
  15. Conversion from.AB to .TAR.
  16. Fast Scan and Real-time Transfer .
  17. Image Finder (Hash, Metadata, Geolocation, Plotting the location on Google Maps and Google Earch).
  18. Plotting (IN BATCHES) of the Geolocation of images on Google Earch (geo.kml) with patch and thumbnails of the images.
  19. Installing and Uninstalling APKs via ADB.
  20. HASH Calculator.
  21. Android Folder Browser (PULL and PUSH).
  22. Device Mirroring.
  23. Instagram Data Scraping.
  24. Automatic integration with MVT-1.5.3.
  25. Access Through the Tool to JADX.
  26. Access Through the Tool to WhatsApp Viewer.
  27. Access Through the Tool to the BCV.
  28. Access Through the Tool to SQLStudio.
  29. PRUNE GPS Tool Access.


Features Avilla Forensics:


🤖 Backup ADB:

  • Android default backup.
📱 APK Downgrade in 15 Applications (Access to root files without the need for ROOT):
WhatsApp (com.whatsapp)
Telegram (org.telegram.messenger)
Messenger (com.facebook.orca)
ICQ (com.icq.mobile.client)
Twitter (com.twitter.android)
Instagram (com.instagram.android)
Signal (org.thoughtcrime.securems)
Linkdin (com.linkedin.android)
Tiktok (com.zhiliaoapp.musically)
Snapchat (com.snapchat.android)
Tinder (com.tinder)
Badoo (com.badoo.mobile)
Mozilla Firefox (org.mozilla.firefox)
Dropbox (com.drobox.android)
Alibaba (com.alibaba.intl.android.apps.poseidon)

  • Examples:


📱 Caution:

atencao

  • The Backup Downgrade procedure in ANDROID 12 can damage the database

🛠 DOWNGRADE APK Test:

  • The tool does a test in a generic application (com.aplicacaoteste.apk) before starting the DOWNGRADE process in the target APP.
  • Tips: XIAOMI phones may come with USB protections, remove these protections without taking the device out of airplane mode by following the steps below:
  1. Enable developer options.
  2. Settings -> Additional Settings -> Disable MIUI optimizations
  3. Reset phone
  4. Settings -> Additional Settings -> Developer Options -> Allow USB Debugging
  5. Security (system app) -> Manage apps -> Permissions -> Gear icon (top right) -> Install via USB (true)
  6. Reset phone
  7. Settings -> Additional Settings -> Developer Options -> Enable USB Installation

💬 (NEW) Parser Chats WhatsApp from NEW Database SCHEME:

  1. Select the Chats destination folder (Copy the "Media" folder in this same location).
  2. Select the folder: \com.whatsapp\f\Avatars
  3. Select the .DB file: \com.whatsapp\db\msgstore.db
  • (NEW) In the "Generate Whatsapp Chats" modules it is possible to plot the transcripts in HTML.

  • (NEW) You can also transcribe the audios along with the Whatsapp parser process.

  • New Schema (Table: message):

  • Fields:

_id, chat_row_id, from_me, key_id, sender_jid_row_id, status,broadcast, recipient_count, participant_hash, origination_flags, origin, timestamp received_timestamp, receipt_server_timestamp, message_type, text_data (Mensagens), starred, lookup_tables, message_add_on_flags, sort_id


💬 (NEW) Parser Chats WhatsApp from previous database schema:

  1. Select the Chats destination folder (Copy the "Media" folder in this same location).
  2. Select the folder: \com.whatsapp\f\Avatars
  3. Select the .DB file: \com.whatsapp\db\msgstore.db
  • (NEW) In the "Generate Whatsapp Chats" modules it is possible to plot the transcripts in HTML.

  • (NEW) You can also transcribe the audios along with Whatsapp parser process.

  • Old Schema (Table: messages)

  • Fields:

_id, key_remote_jid, key_from_me, key_id, status, needs_push, data (Mensagens), timestamp, media_url, media_mime_type, media_wa_type, media_size, media_name, media_caption, media_hash, media_durationorigin, latitude, longitude, thumb_image, remote_resource, received_timestamp, send_timestamp, receipt_server_timestamp, receipt_device_timestamp, read_device_timestamp, played_device_timestamp, raw_data, recipient_count, participant_hash, starred, quoted_row_id, mentioned_jids, multicast_id, edit_version, media_enc_hash, payment_transaction_id, forwarded, preview_type, send_count, lookup_tables, future_message_type, message_add_on_flags.

💬 (NEW) Whatsapp .opus audio transcription and transcription plot in CHATS HTML PARSER:

  • In the "OPUS audio transcription" module you can transcribe one or thousands of audios at the same time.
  • In the "Generate Whatsapp Chats" modules it is possible to plot the transcripts in HTML.
  • You can also transcribe the audios along with the Whatsapp parser process.



📱 Miscellaneous ADB collections in .TXT format:

  • System Properties (Full).
  • Dumpsys (Complete).
  • Disktats (Disk information).
  • Android Geolocation Dump (Location Manager State).
  • IMEI (01 .02).
  • Y/N (Serial Number).
  • Law Suit.
  • TCP (Active Internet connections).
  • Accounts (UserInfo).
  • DUMP Wifi.
  • Detailed Wifi DUMP.
  • CPU information.
  • Memory Information.
  • Display Information (WINDOW MANAGER DISPLAY CONTENTS).
  • Resources.
  • Resolution (Physical size).
  • Screen Dump (.XML file).
  • Dump Backup (Backup Manager is enabled).
  • List Installed Third-Party Applications.
  • List Native System Applications.
  • Contacts.
  • SMS.
  • System Events.
  • Active Users.
  • Android version.
  • DB Info (Applications Database Info).
  • On/Off History.
  • LogCat.
  • Space in Use Information.
  • Operator.
  • Bluetooth (Bluetooth Status).
  • Location of Image Files.
  • Location of Audio Files.
  • Location of Video Files.
  • Face Recognition DUMP
  • Global Settings.
  • Security Settings.
  • System Settings.
  • Remove/Add PIN (Requires current PIN).
  • DUMP ADB (Connections ADB).
  • Reboot.
  • Reboot Recovery Mode.
  • Reboot Bootloader Mode.
  • Reboot Fastboot Mode.

  • Examples:
  • Dump ADB: ADB.txt, in this example we can check the last computer connected via ADB with the device:

  • Dumpsys: dumpsys.txt, in addition to bringing thousands of device information, in this example we can check the uninstall date of an application:
  • Note: The information can be in Unix Timestamp time format, use the link below to convert:
  • 1649374898421 (Unix Timestamp) = Thu Apr 07 2022 23:41:38 GMT+0000 (GMT)
  • https://www.unixtimestamp.com/

⚡️ (NEW) Tracking, Downloading and Decrypting Whatsapp .ENC Files:


  • Generate the Script and run the generated .bat file.

"C:\Forensics\bin\whatsapp-media-decrypt\decrypt.py"

⚡️ (NEW) Contact List Search, Avatar Photos and Deleted WhatsApp Contacts:

  1. Select the folder: \com.whatsapp\f\Avatars
  2. Select .DB file: \com.whatsapp\db\wa.db

📐 WhatsApp Database Decryption:

  • Crypt12.
  • Crypt14.

📸 Screenshots, Screen DUMP and Chat Capture:



🚀 Automatic integration with IPED:

  • Indexing of folders, .zip, .tar, .dd, .ufdr.


🚀 Automatic integration with AFLogical OSE 1.5.2:

  • Performs the acquisition automatically without user intervention.
  • "C:\Forensics\bin\AFLogicalOSE152OSE.apk"

🚀 Automatic integration with Alias Connector:

  • Performs the acquisition automatically without user intervention.
  • "C:\Forensics\bin\com.alias.connector.apk"

📐 Conversion from.AB to. TAR:

  • Passworded ADB backups may take longer to convert.
  • Try not to put passwords in the backups requested in "ADB Backup" or "Downgrade", so you speed up the conversion process.
  • If this module doesn't work, try to add the "C:\Forensics" patch to the system variables

 Fast Scan and Real-time Transfer:

  • Images: .jpg, .jpeg, .png, .psd, .nef, .tiff, .bmp, .tec, .tif, .webp
  • Videos: .aaf, .3gp, .asf, .avi, .m1v, .m2v, .m4v, .mp4, .mov, .mpeg, .mpg, .mpe, .mp4, .rm, .wmv, .mpv , .flv, .swf
  • Audios: .opus, .aiff, .aif, .flac, .wav, .m4a, .ape, .wma, .mp2, .mp1, .mp3, .aac, .mp4, .m4p, .m1a, .m2a , .m4r, .mpa, .m3u, .mid, .midi, .ogg
  • Archives: .zip, .rar, .7zip, .7z, .arj, .tar, .gzip, .bzip, .bzip2, .cab, .jar, .cpio, .ar, .gz, .tgz, .bz2
  • Databases: .db, .db3, .sqlite, .sqlite3, .backup (SIGNAL)
  • Documents: .htm, .html, .doc, .docx, .odt, .xls, .xlsx, .ppt, .pptx, .pdf, .txt, .rtf
  • Executables: .exe, .msi, .cmd, .com, .bat, .reg, .scr, .dll, .ini, .apk

🔠 Image Finder (Hash, Metadata, Geolocation, Plot location on Google Maps and Google Earth):

  • Note: For this module DO NOT save your acquisitions on the Desktop, save for example in "C:\folder_name\collection_01" to run the image search.


📜 (NEW) Plot (BATCH) of Geolocation of images on Google Earch (geo.kml) with patch and thumbnails of images:

  • Note: To plot the thumbnails along with the yellow points, download Google Earch Pro, if you plot on Google Earch Online, only the blue points will be plotted without the images.
  • Click on GENERATE KML to batch generate the geo.kml file




🛠 Installing and Uninstalling APKs via ADB:

  • .APK files

 HASH Calculator:

  • Note: For this module DO NOT save your acquisitions on the Desktop, save for example in "C:\folder_name\collection_02" to calculate the Hashs of the files.
  • Calculates the Hash of all files in an acquisition.
  • SHA-256.
  • SHA-1.
  • SHA-384.
  • SHA-512.
  • SHA-MD5.


📱 (NEW) Android Folder Browser (PULL and PUSH):

  • A Simple folder browser to PULL and PUSH files or folders.

🎥 Device Mirroring:

  • "C:\Forensics\bin\scrcpy"

🚀 Instagram data scraping:


🚀 Automatic integration with MVT-1.5.3:

  • "C:\Forensics\bin\mvt-1.5.3\mvt.bat"

🚀 Access Through the Tool to JADX (Dex to Java Decompiler):

  • "C:\Forensics\bin\jadx-1.2.0\jadx-gui-1.2.0-no-jre-win.exe"

🚀 Access Via Tool to WhatsApp Viewer:

  • "C:\Forensics\bin\WhatsAppViewer.exe"

🚀 Access Through the Tool to BCV (Byte Code Viewer):

  • "C:\Forensics\bin\bycodeviewer\GUI-ByteCode.bat"

🚀 Access Through the Tool to SQLStudio:

  • "C:\Forensics\bin\SQLiteStudio\SQLiteStudio.exe"

🚀 PRUNE GPS Tool Access:

  • "C:\Forensics\bin\gpsprune\GUI-GPSPrune.bat"

📱 Conversion of .csv/.txt files with GEOLIZATION information provided by court decisions into.KML for police investigations.

  • Plotting thousands of points on the map in seconds
  • In this example below, more than 36 thousand points were plotted on the map
  • Example data from .csv file: 2022-04-15T02:59:45.368Z,2022-04-15T02:59:45.368, (Latitude/Column 2) -23.7416538, (Longitude/Column 3) -46.5744873,15,WIFI,1663554331,ANDROID



⚙️ Tool Prerequisites:

  • TECHNICAL knowledge of Forensics in Mobile Devices.
  • Minimal computer knowledge
  • The device with DEBUG mode is activated.
  • Windows 10/11 with its proper updates.

⚙️ Prerequisites Third-Party Tools:

How To Use?


  1. First, you need to download the zip file from the below link
  2. Next, you can unzip all files at c: drive it's very important
  3. Next, open the folder which you have to extract all files
  4. Run the "Avilla_Forensics.exe"
  5. Next, you can install all drivers if you already installed skip this step
  6. Connect the phone and try to do any function
  7. Enjoy !!!

 

File Download:



File Name: Avilla Forensics 3.0 FOLLOW ON INSTAGRAM: HEREFile Size: 1.8 GB

Download Mirror Link:: HERE 

Source Link:: HERE

README:


Compatibility: The tool runs perfectly on Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, and Windows 10 (32-bit and 64-bit).

Take a Backup: If you are willing to try the above tool, then please take a backup of your personal data from your Android Smartphone or Tablet. As flashing any Firmware or recovery may brick the device.

Credits: Avilla Forensics 3.0 is created and distributed by the developer. So, full credits go to the developer for sharing the tool for free.

Post a Comment

0 Comments