Experts’ choice for investigating email fraud, business email compromise (BEC), malware delivery, and CAN-SPAM Act violations.
Tools
- Free
- LE-only
Maintain privacy and build trust with the public while capturing crucial but fleeting digital evidence from consenting victims and witnesses.
Tools
Whether you’re triaging computers and external hard drives in the field or working through a backlog of evidence back in the lab, examiners need to find the information that is key for their case work as quickly as possible.
Tools
Magnet IGNITE is a Cloud-Based Early Case Assessment Triage Tool
Tools
Accelerate digital evidence review by enabling secure agency-wide collaboration from anywhere, anytime.
Tools
Growing digital data volumes across multiple sources in your agency complicate your ability to securely store, track, and manage your cases while also hindering collaboration. You need a modern approach to empower your entire agency to collaborate on, analyze, and manage all aspects of your digital investigations, while upholding the chain of custody.
Tools
The Magnet Digital Investigation Suite helps you increase efficiency and collaborate agency-wide, while operating securely & transparently to reduce risk.
Tools
Increasing data volumes, evidence complexity, resource constraints and the fast-changing technology landscape is forcing you to get more done with what you have and oftentimes results in significant delays to evidence, increasing risk to the public and agency. With Magnet AUTOMATE, enable an enhanced approach to digital investigations that scales up your existing resources and processes to complete investigations quickly.
Tools
Recover digital evidence from the most sources and use powerful and intuitive Analytics tools to easily analyze data in one case file.
Tools
AXIOM Cyber is a robust digital forensics and incident response solution for businesses that need to perform remote acquisitions and collect & analyze evidence from computers, the cloud, and mobile devices.
Tools
Belkasoft Live RAM Capturer is a tiny free forensic tool that allows to reliably extract the entire contents of computer’s volatile memory—even if protected by an active anti-debugging or anti-dumping system. Separate 32-bit and 64-bit builds are available in order to minimize the tool’s footprint as much as possible. Memory dumps captured with Belkasoft Live RAM Capturer can be analyzed with Live RAM Analysis in Belkasoft Evidence Center. Belkasoft Live RAM Capturer is compatible with all versions and editions of Windows including XP, Vista, Windows 7, 8 and 10, 2003 and 2008 Server.
Tools
Belkasoft R is a digital forensic and incident response tool developed specifically for remote extraction.
Gather evidence from geographically distributed endpoints in the blink of an eye. Acquire remotely the following devices and artifacts: hard and removable drives, RAM, connected mobile devices, and specific artifacts with Belkasoft Remote Acquisition.
Tools
Belkasoft Incident Investigations (Belkasoft N) is a tool for digital incident investigations, developed specifically for businesses and aimed to investigate hacking attempts of Windows-based computers.
By analyzing numerous sources, Belkasoft N can find traces, which are typical for various tricks used by hackers to penetrate company's infrastructure.
Tools
Belkasoft Triage is a digital forensic and incident response tool developed specifically for a quick analysis of a live computer and making a partial image of important data.
Detect 1500+ artifact types and profiles and select only those artifacts which are needed to proceed with your investigation.
Tools
Accelerate your digital forensic and incident response investigations with Belkasoft Evidence Center X, an all-in-one product for mobile, computer memory, and cloud forensic examinations.
Belkasoft X works out of the box and can be easily integrated into customer workflows. The software interface is so user-friendly that you can start working with your cases right after the Belkasoft X deployment
Tools
Expertly preserve email evidence without breaking a sweat. Get plug & play output for digital forensic investigations and eDiscovery.
Tools
Tools
Find duplicate records in output of Hash
Tools
Hashcmp can be used to compare the contents, line by line, of two files with similar records. When it finds records in one file that do not have a match in the other file, the program displays the mismatch on the screen. It is designed to display the differences in output files produced by the Maresware Hash program.
Tools
HK_Hash is a smaller version of Hash which is specially designed to calculate the 128 bit MD5 hash of a file(s) and create a comma delimeted output that is compatable with the hashkeeper requirements for a file which it to be loaded/imported into the hashkeeper data base.
-
{{#owner}}
-
{{#url}}
{{#avatarSrc}}
{{/avatarSrc}} {{^avatarSrc}} {{& avatar}} {{/avatarSrc}} {{name}} {{/url}} {{^url}} {{#avatar}} {{& avatar}} {{/avatar}} {{name}} {{/url}}
- {{/owner}} {{#created}}
- {{created}} {{/created}}