Forensic Solutions: All Listings 

Results 1 - 20 of 128 This Category · All Listings
Filter listings...

srm

GPL
Pricing Model

srm is a secure replacement for rm(1). Unlike the standard rm, it overwrites the data in the target files before unlinking them. This prevents command-line recovery of the data by examining the raw block device. It may also help frustrate physical examina ...

Modified
GPL
Pricing Model

ya-wipe is a tool that effectively degausses the surface of a hard disk, making it virtually impossible to retrieve the data that was stored on it. This tool is designed to make sure that sensitive data is completely erased from magnetic media.

Modified
Freeware
Pricing Model

Darik's Boot and Nuke ("DBAN") is a self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for ...

Modified
Commercial
Pricing Model

BCWipe can be run from My Computer as well as from a command-line prompt. BCWipe v.3 is a powerful set of utilities which complies with the US DoD 5200.28-STD standard and Peter Gutmann wiping scheme. You can also create and use you own customized wiping ...

Modified
BCWipe
Arne Vidstrom
Freeware
Pricing Model

Includes file encryption tools that can encrypt with either 3-DES or IDEA.

Modified
Cypherix Encryption Software
Commercial
Pricing Model

Secure IT 2000 is an easy to use, feature packed, file and folder encryption program based on 448-bit strong encryption using the Blowfish algorithm. It includes a customizable file shredder, and the ability to generate self decrypting email attachments.

Modified
Naval Criminal Investigative Service (NCIS)
COMMERCIAL
Pricing Model

Tracks Eraser Pro is designed to protect you by cleaning up all the tracks of Internet activities on your computer. With only one click, Tracks Eraser allows you to erase the cache, cookies, history, typed URLs, autocomplete memory, index.dat from your br ...

Modified
Commercial
Pricing Model

east-tec InvisibleSecrets is a steganography and file encryption software that allows you to encrypt file and folder structures that contain confidential data and hide files, making it completely invisible to any user. Other useful features include: Powe ...

Modified
Guidance Software, Inc.
Commercial
Pricing Model

With an intuitive, yet flexible GUI, and unmatched performance, EnCase Version 4 provides investigators with the tools to conduct large-scale and complex investigation with accuracy and efficiency. Our award winning solution yields completely non-invasive ...

Modified
Commercial
Pricing Model

OpenText EnCase Forensic is a court-proven solution for finding, decrypting, collecting and preserving forensic data from a wide variety of devices, while ensuring evidence integrity and seamlessly integrating investigation workflows. Thorough evidence c ...

Category Remote Forensics
Modified
EnCase Forensic
Commercial
Pricing Model

FTK is a digital investigations solution built for speed, stability and ease of use. It quickly locates evidence and forensically collects and analyzes any digital device or system producing, transmitting or storingdata by using a single application from ...

Modified
FTK Forensic Toolkit
Dan Farmer and Wietse Venema
OPEN SOURCE
Pricing Model

TCT is a collection of programs by Dan Farmer and Wietse Venema for a post-mortem analysis of a UNIX system after break-in. The software was presented first in a Computer Forensics Analysis class in August 1999 (handouts can be found here). Examples of us ...

Modified
Brian Carrier
FREEWARE
Pricing Model

The @stake Sleuth Kit (TASK) allows an investigator examine the file systems of a suspect computer in a non-intrusive fashion. TASK is a collection of UNIX-based command line tools that can analyze NTFS, FAT, FFS, EXT2FS, and EXT3FS file systems. TASK rea ...

Modified
Dave Bullock
Freeware
Pricing Model

snarl is a bootable forensics ISO based on FreeBSD and using @stake's autopsy and task as well as scmoo's list of known good checksums. Once you boot the iso just log in as root there is no password. You will boot into a dialog driven menu. select the fir ...

Modified
droopy and ranger-x
Open Source
Pricing Model

PLAC is a business card sized bootable cdrom running linux. It has network auditing, disk recovery, and forensic analysis tools. ISO will be avialable and scripts to roll you own cd.

Modified
Klaus Knopper
GPL
Pricing Model

KNOPPIX is a bootable CD with a collection of GNU/Linux software, automatic hardware detection, and support for many graphics cards, sound cards, SCSI and USB devices and other peripherals. KNOPPIX can be used as a Linux demo, educational CD, rescue syste ...

Modified
Commercial
Pricing Model

SMART is a software utility that has been designed and optimized to support data forensic practitioners and Information Security personnel in pursuit of their respective duties and goals. The SMART software and methodology have been developed with th ...

Modified
Zynamix GmbH
Commercial
Pricing Model

Do you need to analyze multiple variations of essentially the same program ? Do you need to understand the changes between two versions of a program ? Are you trying to detect code theft ? SABRE BinDiff uses a unique graph-theoretical approach to allow co ...

Category Forensic Tools
Modified
Commercial
Pricing Model

CD/DVD Inspector reads all major CD and DVD filesystem formats including ISO-9660, Joliet, UDF, HSG, HFS and HFS+.  When the disc being examined contains more than a single filesystem, all filesystems found are displayed.  Multiple filesystems a ...

Category Forensic Tools
Modified
CD/DVD Inspector
dtSearch Corp.

Provides over two dozen indexed and unindexed text search options for all popular file types. Supports full-text as well as field searching in all supported file types. Has multiple relevancy-ranking and other search sorting options. dtSearch can instantl ...

Category Forensic Tools
Modified