Versions:

  • 3.4.0
  • 3.3.0
  • 3.1.8

ALEAPP CLI 3.4.0, published by abrignoni, is a command-line forensic utility designed to extract, parse and present Android logs, events and protobuf artifacts in a format that investigators can immediately analyze. The tool targets the volatile data that smartphones continuously generate—system logs, crash reports, usage-events, notification histories, and application-specific protobuf files—transforming them into readable CSV, TSV or SQLite records that map cleanly to timelines of user activity. Typical use-cases include incident-response triage on rooted or non-rooted handsets, after-the-fact reconstruction of deleted chat sessions, correlation of location history with network events, and bulk auditing of enterprise devices for policy compliance. Because it operates entirely from the shell, ALEAPP CLI can be scripted into unattended workflows, run inside virtual machines, or launched from bootable forensic Linux sticks, making it equally valuable to police labs, private examiners and internal security teams who need repeatable, court-admissible output without manual clicking. Three successive versions have refined artifact coverage, added support for Android 14 partitions and introduced modular plug-ins so new parsers can be dropped into the same engine without waiting for a full release. The software belongs to the “Digital Forensics” category, sits alongside the complementary iLEAPP framework for iOS, and shares a common reporting template that lets analysts merge Android and Apple evidence into a single timeline. ALEAPP CLI is available for free on get.nero.com, with downloads supplied through trusted Windows package sources such as winget, always serving the latest build and enabling batch installation alongside other forensic or utilities software.

Tags: