Skip to content

Extract Widevine L3 keys from Android devices effortlessly, spanning multiple Android versions for DRM research and education.

License

Notifications You must be signed in to change notification settings

hyugogirubato/KeyDive

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

KeyDive: Widevine L3 Key Extractor for Android

KeyDive is a Python tool designed to extract Widevine L3 DRM keys from Android devices seamlessly, supporting multiple Android versions for DRM research, education, and analysis.

Important

For dynamic key extraction on devices with Android SDK > 33 (OEM API 18+), a minimum frida-server 16.6.0 is required. Otherwise, pre-extracted functions from Ghidra are necessary.

Features

  • ๐Ÿš€ Easy installation with pip
  • ๐Ÿ”„ Automated Widevine L3 key extraction supporting SDK > 21
  • ๐Ÿ“ฑ Supports a wide range of Android devices and versions
  • ๐Ÿ’พ Export extracted keys and device credentials in multiple formats including pywidevine .wvd
  • ๐ŸŒ Offline extraction mode available
  • ๐Ÿ–ฅ๏ธ Flexible command-line interface with multiple customization options
  • ๐Ÿ› ๏ธ Supports injecting custom Widevine functions extracted from Ghidra XML files
  • โค๏ธ Fully open-source and actively maintained

Prerequisites

  • ADB (Android Debug Bridge): Make sure to install ADB and include it in your system's PATH environment variable for easy command-line access.
  • frida-server: Install frida-server on your target Android device. This requires root access on the device. For installation instructions and downloads, visit the official Frida documentation.
  • Python 3.8+

Installation

Follow these steps to set up KeyDive:

  1. Ensure all prerequisites are met (see above).
  2. Install KeyDive directly from PyPI:
    pip install keydive

Usage

  1. Run the KeyDive script:
    keydive -kw -a player
  2. The script will install and launch the Kaltura DRM test app (if not already installed).
  3. Follow these steps within the app:
    • Provision Widevine (if the device isn't provisioned).
    • Refresh to intercept the keybox or private key.
    • Test DRM Playback to extract the challenge.
  4. KeyDive automatically captures the Widevine keys, saving them as:
    • client_id.bin (device identification data).
    • private_key.pem (RSA private key).

This will automatically install and launch the recommended DRM test app (Kaltura), provision Widevine if necessary, and perform the extraction steps.

Tip

This sequence ensures that the DRM-protected content is active and ready for key extraction by the time the KeyDive script is initiated, optimizing the extraction process.

Command-Line Options

Usage: keydive [-h] [-s <serial>] [-d <delay>] [-v] [-l <dir>] [-V] [-o <dir>] [-w] [-k] [-a <type>] [--no-detect] [--no-disabler] [--no-stop] [--unencrypt] [--symbols <symbols>] [--challenge <challenge>] [--rsa-key <rsa-key>] [--aes-key <aes-key>]

Extract Widevine CDM components from an Android device.

Optional Arguments:
  -h, --help            show this help message and exit

Global Options:
  -s, --serial <serial>
                        ADB serial number of the target Android device.
  -d, --delay <delay>   Delay in seconds between process status checks. (default: 1.0)
  -v, --verbose         Enable detailed logging for debugging.
  -l, --log <dir>       Directory to save log files.
  -V, --version         Show tool version and exit.

Cdm Extraction:
  -o, --output <dir>    Directory to store extracted CDM files. (default: ./device)
  -w, --wvd             Export data in pywidevine-compatible WVD format.
  -k, --keybox          Export Widevine keybox if available on the device.
  -a, --auto <type>     Automatically launch a DRM playback test. ("web" or "player")

Advanced Options:
  --no-detect           Disable automatic detection of OEM private key function.
  --no-disabler         Disable liboemcrypto-disabler module (patches memory protection).
  --no-stop             Do not stop once minimum CDM data is intercepted.
  --unencrypt           Force the license challenge to keep client ID data unencrypted.
  --symbols <symbols>   Path to Ghidra-generated XML symbol file for function mapping.
  --challenge <challenge>
                        Protobuf challenge file(s) captured via MITM proxy.
  --rsa-key <rsa-key>   RSA private key(s) in PEM or DER format for client ID decryption.
  --aes-key <aes-key>   AES key(s) in hex, base64, or file form for decrypting keybox data.

Note

The advanced options are primarily intended for debugging and development purposes. Regular users do not need to use them.

Advanced Usage

Extracting Functions

Custom functions extracted from Widevine libraries with Ghidra can be provided to KeyDive to improve compatibility on some devices. See the Functions Extraction Guide.

Offline Extraction

KeyDive supports offline extraction workflows suitable for restricted environments. See the Offline Mode Guide.

Using Unencrypted Challenge Data

Caution

The --unencrypt option forces the license challenge to keep client ID data unencrypted. This option can cause repetitive crashes or instability in the Widevine library on certain devices.

When client ID extraction fails, provide an unencrypted challenge via --challenge. See the Challenge Extraction Guide.

Temporary Disabling L1 for L3 Extraction

Warning

Usage of the module is now deprecated because the deactivation of the library was natively added.

Some manufacturers (e.g., Xiaomi) allow the use of L1 keyboxes even after unlocking the bootloader. In such cases, it's necessary to install a Magisk module called liboemcrypto-disabler to temporarily disable L1, thereby facilitating L3 key extraction.

Disclaimer

KeyDive is intended for educational and research purposes only. The use of this tool in unauthorized testing of protected content is strictly prohibited. Please ensure you have permission before proceeding with DRM key extraction.

Contributors

hyugogirubato FoxRefire azimabid00 JohnDoe1964 Nineteen93 sn-o-w samu87d8dh2

Licensing

This software is licensed under the terms of MIT License.
You can find a copy of the license in the LICENSE file in the root folder.


ยฉ hyugogirubato 2025

About

Extract Widevine L3 keys from Android devices effortlessly, spanning multiple Android versions for DRM research and education.

Topics

Resources

License

Stars

Watchers

Forks

Contributors 7