Dump wechat messages from android
Jake 5da9994eef Update README.md (#99) | 4 months ago | |
---|---|---|
legacy | 4 years ago | |
screenshots | 10 years ago | |
third-party | 4 years ago | |
3 years ago | ||
.gitattributes | 9 years ago | |
.gitignore | 4 years ago | |
LICENSE.txt | 10 years ago | |
README.md | 4 months ago | |
android-interact.sh | 4 years ago | |
count-message.sh | 7 years ago | |
decrypt-db.py | 1 year ago | |
dump-audio.py | 4 years ago | |
dump-html.py | 3 years ago | |
dump-msg.py | 4 years ago | |
emoji-cache-tool.py | 4 years ago | |
list-chats.py | 4 years ago | |
plot-num-msg-by-time.py | 4 years ago | |
requirements.txt | 3 years ago |
WeChat, as the most popular mobile IM app in China, doesn't provide any methods to export structured message history.
We reverse-engineered the storage protocol of WeChat messages, and provide this tool to decrypt and parse WeChat messages on a rooted android phone. It can also render the messages into self-contained html files including voice messages, images, emojis, videos, etc.
If the tool works for you, please take a moment to add your phone/OS to the wiki.
./third-party/compile_silk.sh
)pip install -r requirements.txt
../android-interact.sh db
. It may use an incorrect userid.${userid}
by inspecting the contents of /data/data/com.tencent.mm/MicroMsg
on the root filesystem of the device. It should be a 32-character-long name consisting of hexadecimal digits./data/data/com.tencent.mm/MicroMsg/${userid}/EnMicroMsg.db
from the device.Decrypt database file:
./decrypt-db.py decrypt --input EnMicroMsg.db
./decrypt-db.py uin
, which looks for uin in /data/data/com.tencent.mm/shared_prefs/
document.cookie
./decrypt-db.py imei
implements some ways to find device id.*#06#
on your phoneDecrypt database with combination of uin and device id:
./decrypt-db.py decrypt --input EnMicroMsg.db --imei <device id> --uin <uin>
NOTE: you may need to try different ways to get device id and find one that can decrypt the
database. Some phones may have multiple IMEIs, you may need to try them all.
See #33.
The command will dump decrypted database at EnMicroMsg.db.decrypted
.
If the above decryption doesn't work, you can also try the password cracker to brute-force the key. The encryption key is not very strong.
Copy the WeChat user resource directory /mnt/sdcard/tencent/MicroMsg/${userid}/{avatar,emoji,image2,sfs,video,voice2}
from the phone to the resource
directory:
./android-interact.sh res
RES_DIR
in the script if the location of these directories is different on your phone.tar
with or without compression, and then copy the archive,
busybox tar
is recommended as the Android system's tar
may choke on long paths.resource
directory with the following subdir: avatar,emoji,image2,sfs,video,voice2
.(Optional) Download the emoji cache from here
and decompress it under wechat-dump
. This will avoid downloading too many emojis during rendering.
wget -c https://github.com/ppwwyyxx/wechat-dump/releases/download/0.1/emoji.cache.tar.bz2
tar xf emoji.cache.tar.bz2
Parse and dump text messages of every chat (requires decrypted database):
./dump-msg.py decrypted.db output_dir
List all chats (required decrypted database):
./list-chats.py decrypted.db
Generate statistics report on text messages (requires output_dir
from ./dump-msg.py
):
./count-message.sh output_dir
Dump messages of one contact to html, containing voice messages, emojis, and images (requires decrypted database and resource
):
./dump-html.py "<contact_display_name>"
The output file is output.html
.
Check ./dump-html.py -h
to use different paths.
Screenshots of generated html:
See here for an example html.
grep 'TODO' wechat -R