Most Recent
Read More

FastIR Collector

FastIR Collector is a “Fast Forensic” acquisition tool. It collects different artifacts on live Windows and records the results in csv or json files. Traditional forensics expertise does not keep pace with the development of information technology.


Read More

Oxygen Software 9.4 has released

Oxygen Software Produces a version of the flagship forensic software, Oxygen Software Detective v.9.4. This update contains the following information: Samsung for its flagship product, Oxygen Forensic Suite Detective 9.4, and in partnership with Passware, Inc. Overcome the encryption of data on Android devices. Another addition to Detective 9.4 is the Oxygen Forensic Cloud Extractor, which added the ability to decrypt the WhatsApp backup from Google Drive without the encryption key from the device.

Version 9.4 introduces another method of data decryption from the Popular messenger. Now, forensic experts can decrypt data through the security code. The new Oxygen Forensic [...]

Read More

SQLite Forensics with Visual NAND Reconstructor

Rusolut added SQLite analysis functionality to their top software Visual NAND Reconstructor.


Read More

Hiberfil.sys Analysis with Hibernation Recon

Forensic examination in the registry has long been referred to the analysis of only readily available Registries from Microsoft Windows®, often one at a time, in vain takes a lot of time and an archaic way. Registry Recon is not just another Registry parser. Digital forensics experts armed with Hibernation Recon are now able to leverage not only the active contents of Windows hibernation files, but also massive volumes of information in the multiple types (and levels) of slack space that often exist within them.


Latest Headlines
Read More
Read More
Read More

Trending Topics
digital forensics
computer forensics
mobile forensics
digital forensics software
Android forensics
iOS forensics
iphone forensics
Top Stories
Right Now
bstrings 1.0 released
Top Five
Heat Index
Chip-off Technique in Mobile Forensics
Extracting WhatsApp database and the cipher key from a non-rooted Android device
Extracting data from a damaged iPhone via chip-off technique
Free Course: Investigating Cybersecurity Incidents
Extracting data from a damaged iPhone via chip-off technique – Part 2