Newest Listing

Top Rated

Most Popular

Forensic ToolsRSS

Forensic Tools

 These are tools for analyzing a breach in security in some way.  Typically they are used for collecting data about the breach after the fact, or analyzing software to see how it performs the attack.  Many reverse engineering tools will be listed here, as well as forensic recovery tools.

 

Other information about Forensic Tools

 

MailXaminer

Visit the Product Site

MailXaminer is a comprehensive email examination tool to carry out a thorough analysis of a bunch of emails and its header. With the help of this tool; forensicators can preview more than 20 email file types and perform advanced search operation within th ...

VendorSysTools Software
Pricing ModelShareware
Modified

Visit the Product Site

Do you need to analyze multiple variations of essentially the same program ? Do you need to understand the changes between two versions of a program ? Are you trying to detect code theft ? SABRE BinDiff uses a unique graph-theoretical approach to allow co ...

VendorZynamix GmbH
Pricing ModelCommercial
Modified

Visit the Product Site

DEFT (acronym for Digital Evidence & Forensics Toolkit) is a distribution made for Computer Forensics, with the purpose of running live on systems without tampering or corrupting devices (hard disks, pendrives, etc…) connected to the PC where the boot pro ...

VendorDEFT Linux
Pricing ModelOpen Source
Modified

Visit the Product Site

The standard in low-level applications for forensics and recovery has always been ByteBack. Now with version 4, we're even better. The addition of UDMA, ATA & SATA support, with memory management and greater ease and control of Partition and MBR manipulat ...

VendorTech Assist, Inc
Pricing ModelCOMMERCIAL
Modified

Visit the Product Site

History Reader reads all information in the complete history database and presents you a list, either in chronological or alphabetical order. Furthermore, you can open any URL in Internet Explorer ?, add URLs to Favorites, copy URLs, print out or save the ...

VendorWolfgang Baudisch
Pricing ModelSHAREWARE
Modified

Visit the Product Site

CD/DVD Inspector reads all major CD and DVD filesystem formats including ISO-9660, Joliet, UDF, HFS and HFS+. When the disc being examined contains more than a single filesystem, all filesystems found are displayed. Multiple filesystems are present for hy ...

VendorArrowkey, Inc.
Pricing ModelCOMMERCIAL
Modified

Visit the Product Site

Provides over two dozen indexed and unindexed text search options for all popular file types. Supports full-text as well as field searching in all supported file types. Has multiple relevancy-ranking and other search sorting options. dtSearch can instantl ...

VendordtSearch Corp.
Modified

Visit the Product Site

Hackman 7 is a freeware hex editor and disassembler. It comes with cryptography capabilities, decoding with ready and self-made algorithms and a fully-featured editor. You can edit virtually any file, disk, ZIP drive, Ram Drive, Smart Media, Compact Flash ...

VendorTechnoLogismiki
Pricing ModelSHAREWARE
Modified

Visit the Product Site

The Hex Workshop Hex Editor is a set of hexadecimal development tools for Microsoft Windows, combining advanced binary editing with the ease and flexibility of a word processor. With Hex Workshop you can edit, cut, copy, paste, insert, and delete hex, pri ...

VendorBreakPoint Software, Inc.
Modified

Visit the Product Site

Note: 10-12-2010 KaZAlyser is now unsupported software. KaZAlyser is the successor to the popular P2PView KaZaA/Morpheus database viewer. KaZAlyser provides significant enhancements to the investigation process. KaZAlyser provides the following functions ...

VendorSanderson Forensics Limited
Pricing ModelFreeware
Modified

Visit the Product Site

Keep this life-saving tool handy to recover forgotten passwords quickly whenever needed. Key Benefits 7 password recovery modules for MS Word, Excel, Windows, Outlook Express, and more, combined in one tool Instantly previews password-protected MS Wo ...

VendorPassware
Pricing ModelCommercial
Modified
Secret Explorer

Visit the Product Site

Using Secret Explorer you will be able to locate hidden information in any Windows-based system. This includes form AutoComplete data offered by Internet Explorer every time you enter something into an form on a web page; various Internet passwords: passw ...

VendorLastBit Software
Modified

Visit the Product Site

Forensically examine the most popular e-mail formats such as America Online (AOL), Outlook Exchange (PST), Eudora, and many others. Paraben's E-mail Examiner is one of the most comprehensive forensically sound e-mail examination tools available. E-mail ...

VendorParaben Corp
Pricing ModelCommercial
Modified

Visit the Product Site

Don't settle for half the data. Most commercial cell phone forensic software only gets logical data files. That's like doing an investigation on half a crime scene. If a tool doesn't have advanced analysis features, it's probably because they don't get ...

VendorParaben Corp.
Pricing ModelCommercial
Modified

Visit the Product Site

Maresware: The Suite provides an essential set of tools for investigating computer records plus powerful data analysis capabilities. This bundled suite of over 40 separate, highly-targeted programs gives you the flexibility to accomplish a wide variety of ...

VendorMares and Company, LLC
Pricing ModelCOMMERCIAL
Modified

Visit the Product Site

The National Software Reference Library (NSRL) is designed to collect software from various sources and incorporate file profiles computed from this software into a Reference Data Set (RDS) of information. The RDS can be used by law enforcement, governmen ...

VendorU.S. Department of Justice's National Institute of Just...
Pricing ModelCOMMERCIAL
Modified

Visit the Product Site

Hunts down information, old and new, on the user's PC. Shows you a slide show of downloaded images. Runs from the floppy drive. Takes up few resources within a network or computer system. Lets you customize the search parameters. Generates custom rep ...

VendorTech Assist, Inc.
Pricing ModelCOMMERCIAL
Modified

Visit the Product Site

NTI's forensic software tools are used in security reviews, internal audits and computer related investigations. Some of the tools are also used to identify and eliminate sensitive data leakage in classified government agencies. They are sold separately a ...

VendorNew Technologies Armor, Inc
Pricing ModelCOMMERCIAL
Modified

Visit the Product Site

The tools included in the PsTools suite, which are downloadable individually or as a package, are: PsExec - execute processes remotely, PsFile - shows files opened remotely, PsGetSid - display the SID of a computer or a user, PsKill - kill processes by na ...

Vendorsysinternals/Mark Russinovich
Pricing ModelFreeware
Modified