|
WhatsAppTrafficTracker is a professional cybersecurity dashboard designed for:
|
|
| Feature | Description |
|---|---|
| π¨ | Cybersecurity Dark Theme β Modern SOC-inspired UI design |
| π‘ | Smart Packet Capture β Filter-based intelligent capturing |
| π§ | IP Tracker β Location mapping & traffic correlation |
| π | Live Monitoring β Real-time traffic visualization |
| π§Ύ | Detailed Logs β Severity levels & timestamps |
| π€ | Export Options β CSV & JSON support |
| π§΅ | Performance β Thread-safe, non-blocking GUI |
| π± | Responsive Design β Works on all screen sizes |
| π | Cross-Platform β Windows, macOS, Linux support |
π± Mobile View - Tap to see features
| π¨ Dark Theme | π‘ Packet Capture | π§ IP Tracker |
|---|---|---|
| Modern UI | Smart Filtering | Location Map |
| π Live Monitor | π§Ύ Logs | π€ Export |
|---|---|---|
| Real-time | Severity | CSV/JSON |
graph LR
A[π¦ Download ZIP] --> B[π Extract Files]
B --> C[βΆοΈ Run .exe]
C --> D[π― Start Capture]
D --> E[π Make Call]
E --> F[π View Data]
style A fill:#25D366,stroke:#128C7E,color:#fff
style B fill:#25D366,stroke:#128C7E,color:#fff
style C fill:#25D366,stroke:#128C7E,color:#fff
style D fill:#25D366,stroke:#128C7E,color:#fff
style E fill:#25D366,stroke:#128C7E,color:#fff
style F fill:#25D366,stroke:#128C7E,color:#fff
π± Mobile View - Quick Start Steps
π¦ Step 1: Download ZIP
β¬οΈ
π Step 2: Extract Files
β¬οΈ
βΆοΈ Step 3: Run .exe
β¬οΈ
π― Step 4: Start Capture
β¬οΈ
π Step 5: Make Call
β¬οΈ
π Step 6: View Data
π₯ Click to expand installation steps
| Step | Action | Details |
|---|---|---|
| 1 | π¦ Download | Get the latest release ZIP |
| 2 | π Extract | Unzip to any location |
| 3 | Launch whatsapptracker.exe |
|
| 4 | Click More info β Run anyway | |
| 5 | π― Start | Click Start Capture button |
| 6 | π¬ WhatsApp | Install from Microsoft Store & open |
| 7 | π Call | Start a voice call (with consent) |
| 8 | π View | Check IP Tracker tab for metadata |
Note
If the remote user has "Protect IP address" enabled, IP details will not appear β this is expected behavior.
| β What We DO | β What We DON'T |
|---|---|
| Capture metadata only | Access messages |
| Log IPs & ports | Inspect payloads |
| Track protocols | Bypass encryption |
| Record timestamps | Intercept credentials |
| Respect privacy | Run hidden processes |
Important
Use only on systems or networks you own or have explicit permission to analyze.
π± Mobile View - Tech Stack
| Technology | Description |
|---|---|
| π Python 3.11+ | Modern async/await support |
| πΌοΈ PyQt6 | Beautiful dark UI framework |
| π‘ Packet Interception | Windows native APIs |
| ποΈ Modular Architecture | Production-ready codebase |
| π Cross-Platform | Windows, macOS, Linux |
| π± Responsive | Mobile-friendly docs |
[!CAUTION] This project is intended strictly for educational, debugging, and defensive security purposes.
Unauthorized interception of network traffic may violate local laws.The author takes no responsibility for misuse.
This project is not affiliated with WhatsApp or Meta.
We welcome contributions! Here's how you can help:
| Type | Description |
|---|---|
| π¨ | UI/UX improvements |
| β‘ | Performance optimizations |
| π§ | Additional analysis modules |
| π | Documentation updates |
| π | Bug fixes |
Tip
Please keep all contributions legal and privacy-respecting.