WhatsApp-OSINT

OSINT tool for WhatsApp that allows you to obtain profile pictures, verify Business accounts, check status and user information, analyze linked devices, review privacy settings, and access complete data using the RapidAPI WhatsApp OSINT API. Supports 6 endpoints. https://github.com/kinghacker0/WhatsApp-OSINT

Whapa

A forensic toolkit for WhatsApp analysis on Android (and partially iOS) devices. Includes tools to parse SQLite databases (whapa), decrypt/encrypt backups (whacipher), extract data from Google Drive (whagodri) or iCloud (whacloud), merge chat databases (whamerge), and generate interactive HTML reports from exported chats (whachat). Designed for digital forensics, incident response, and OSINT investigations. https://github.com/B16f00t/whapa

tg-me.com

A Telegram group and channel directory that indexes public communities across multiple languages and regions—useful for discovering topic-specific groups, tracking community trends, or identifying influential channels in OSINT investigations. https://www.tg-me.com

Telephasma

An OSINT tool that maps Telegram gift-giving networks and uncovers channel ownership by scanning group members, analyzing bios for channel links, and tracing who sends gifts to whom. Outputs an interactive force-directed graph showing user relationships and channel affiliations. https://github.com/vxshellew/Telephasma

Device Activity Tracker

Proof-of-concept (PoC) tool that exploits WhatsApp and Signal delivery receipts to infer device status—active, standby, or offline—by analyzing Round-Trip Time (RTT) of silent acknowledgments. Reveals usage patterns, network changes, and potential surveillance vulnerabilities. https://github.com/gommzystudio/device-activity-tracker