List of digital forensics tools
During the 1980s, most digital forensic investigations consisted of "live analysis", examining digital media directly using non-specialist tools. In the 1990s, several freeware and other proprietary tools (both hardware and software) were created to allow investigations to take place without modifying media. This first set of tools mainly focused on computer forensics, although in recent years similar tools have evolved for the field of mobile device forensics.
|ZiuZ VizX2||Windows||Proprietary||22.214.171.124||Multi-purpose forensic tool|
|EnCase||Windows||proprietary||7.10||Multi-purpose forensic tool|
|Wireshark||cross-platform||GPL||n/a||Open-source packet capture/analyzer, backend library used is [win]pcap.|
|SANS Investigative Forensics Toolkit - SIFT||Ubuntu||2.1||Multi-purpose forensic operating system|
|Internet Evidence Finder (IEF)||Windows||proprietary||6.6.3.0736||Targeted forensics tool that recovers Internet related communications and activity from hard drives and RAM captures|
|Registry Recon||Windows||proprietary||2.0.0.0530||Forensics tool that rebuilds Windows registries from anywhere on a hard drive and parses them for deep analysis.|
|EPRB||Windows||proprietary||1435||Set of tools for encrypted systems & data decryption and password recovery|
|Digital Forensics Framework||Unix-like/Windows||GPL||1.3||Framework and user interfaces dedicated to Digital Forensics|
|FTK||Windows||proprietary||5.6.3||Multi-purpose tool, FTK is a court-cited digital investigations platform built for speed, stability and ease of use.|
|PTK Forensics||LAMP||proprietary||2.0||GUI for The Sleuth Kit|
|The Coroner's Toolkit||Unix-like||IBM Public License||1.19||A suite of programs for Unix analysis|
|CAINE Linux||Linux||free/open source||6.0||Gnu/Linux computer forensics live distro.|
|COFEE||Windows||proprietary||n/a||A suite of tools for Windows developed by Microsoft|
|MailXaminer||Windows||proprietary||n/a||Complete suite of email forensic tools for Windows developed by SysTools|
|The Sleuth Kit||Unix-like/Windows||IPL, CPL, GPL||4.1.2||A library of tools for both Unix and Windows|
|Categoriser 4 Pictures||Windows||freeware||4.0.2||Image categorisation tool develop, available to law enforcement|
|Open Computer Forensics Architecture||Linux||LGPL/GPL||2.3.0||Computer forensics framework for CF-Lab environment|
|SafeBack||N/a||proprietary||3.0||Digital media (evidence) acquisition and backup|
|Windows To Go||n/a||proprietary||n/a||Bootable operating system|
|Shell Control Box||Windows, Mac OS X, Linux, mobile||proprietary||4.0||SCB inspects remote access protocols such as SSH, RDP, Telnet, or Vnc protocols. It can act as a transparent device, and also in different non-transparent ways.|
|Netherlands Forensic Institute / Xiraf||n/a||proprietary||n/a||Computer-forensic online service.|
|X-Ways Forensics||Windows||proprietary||18.1||Multi-purpose forensic tool|
|ForensiCopy||Windows||freeware||1.3||Forensic file copy tool. Copies files in a forensically sound manner preserving MAC Times and generating a log file.|
|BlackLight||Windows and Mac||proprietary||2014R2.2||Multi-platform forensic analysis tool. Analyze forensic images and data from Mac, Windows, iOS and Android.|
|M3 Bitlocker Recovery||Windows||freeware||4.5||Forensic tool to decrypt data from damaged, corrupted, failed, inaccessible or crashed Bitlocker encrypted drive.|
|OSForensics||Windows||proprietary||3.1||Identify suspicious files and activity with hash matching, drive signature comparisons, e-mails, memory and binary data. Extract forensic evidence from computers quickly with advanced file searching and indexing and enables this data to be managed effectively. Live or bootable from CD/DVD/USB.|
|GetData Forensic Explorer||Windows||proprietary||3.1.2||Live Boot virtualization, Shadow Copy, Meta extraction, Carving, Hash Sets, Index and Keyword search, Bookmarking and more...|
|DEFT Linux||Linux||freeware||8.2||Bootable Linux distro with live Windows tools.|
|Kali Linux||Linux||freeware||1.1.0||Powerful bootable Linux distro with forensic, pen testing, and security functionality.|
|Sumuri Paladin||Linux||freeware||6.01||Cutting edge bootable Linux suite focused on quick, efficient acquisition of data.|
|ADF Triage Examiner||Windows||proprietary||3.8||Triage-Examiner from ADF Solutions is deployed on a Triage Key and does not require expensive computers or hardware components. Using predefined search profiles, the setup process can be done in two easy steps. The tool is completely automated and runs directly on the suspect computer with minimal user interaction. Triage-Examiner can also utilize the suspect computer to view the results in real-time.|
|DriveSpy||DOS||proprietary||1.70||DRIVESPY uses familiar DOS commands (CD, DIR, etc) to navigate the system under investigation. DRIVESPY extends the capabilities of the native DOS commands and adds new commands. DRIVESPY provides a familiar DOS-like prompt during system navigation. (DRIVESPY does not use drive letters in the prompt, but rather a Drive/Part combination (i.e "D0P1:\WINDOWS\SYSTEM") to eliminate confusion in the event where the resident operating system has not assigned a drive letter to the drive being processed (i.e examining a FAT32 partition under DOS 6Whenever appropriate, DRIVESPY will use familiar DOS commands (CD, DIR, etc) to navigate the system under investigation. When beneficial, DRIVESPY will extend the capabilities of the associated DOS commands, or add new commands as necessary. DRIVESPY provides a familiar DOS-like prompt during system navigation. (DRIVESPY does not use drive letters in the prompt, but rather a Drive/Part combination (i.e "D0P1:\WINDOWS\SYSTEM") to eliminate confusion in the event where the resident operating system has not assigned a drive letter to the drive being processed (i.e examining a FAT32 partition under DOS 6.22)).|
|Amped FIVE||Windows||Proprietary||6947||Amped develops software for the analysis, authentication, and enhancement of images and video for forensic, security and investigative applications.
Amped FIVE is the leading forensic image and video processing software and is acclaimed for its simplicity, ease-of-use, and completeness. Amped FIVE is a software solution, specifically designed for investigative, forensic, military and security applications. It provides more than 80 filters to analyze, restore, and enhance a digital image and video evidence in a simple, fast and precise way. This revolutionary solution also generates a technical scientific report that validates the integrity of the digital evidence in order to be admissible in court. Amped FIVE works with any type of image and video data, from CCTV recordings to latent fingerprints, and supports any image and video format. Since the software is compatible with standard computers, Amped FIVE is the right tool for any organization, to use image and video evidence to build the best possible cases and investigations.
Amped FIVE is used by the world’s top forensic labs, law enforcement, government, military, and security organizations. Municipalities, court experts and private companies working in the surveillance and forensic fields also benefit from this revolutionary solution.
|Amped Authenticate||Windows||Proprietary||6996||Amped develops software for the analysis, authentication, and enhancement of images and video for forensic, security and investigative applications.
Amped Authenticate is a software package that forensically tests images for authenticity and tampering. Amped Authenticate provides a suite of powerful tools and filters to determine whether an image is an unaltered original, an original generated by a specific device, or the result of tampering with photo editing software that may not be accepted as evidence.
Memory forensics tools are used to acquire and/or analyze a computer's volatile memory (RAM). They are often used in incident response situations to preserve evidence in memory that would be lost when a system is shutdown, and to quickly detect stealthy malware by directly examining the operating system and other running software in memory.
|Volatililty||Volatile Systems||Windows & Linux||Free (GPL)|
|RAM Capture||Magnet Forensics||Windows||Free|
|Live RAM Capturer||Belkasoft||Windows||Free|
Mobile device forensics
Mobile forensics tools tend to consist of both a hardware and software component. Mobile phones come with a diverse range of connectors, the hardware devices support a number of different cables and perform the same role as a write blocker in computer devices.
|Cellebrite Mobile Forensics||Windows||proprietary||Universal Forensics Extraction Device - Hardware and Software|
|Secure View Mobile Forenscis Software||Windows||proprietary||Hardware/Software package|
|Internet Evidence Finder (IEF)||Windows||proprietary||6.6.3.0736||Targeted forensics tool that recovers 3rd party app data and native app data from smartphones and tablets|
|Radio Tactics Aceso||Windows||proprietary||"All-in-one" unit with a touch screen|
|Paraben Device Seizure||Windows||proprietary||7.0||Hardware/Software package|
|MicroSystemation XRY/XACT||Windows||proprietary||Hardware/Software package, specializes in deleted data|
|Oxygen Forensic Suite (former Oxygen Phone Manager)||Windows||proprietary||Smart forensics for smartphones|
|MOBILedit! Forensic||Windows||proprietary||Hardware-Connection kit/Software package|
|NowSecure Forensics||Santoku Linux (bare metal or in a VM on Mac OSX VMWare Fusion or Windows VMWare Player)||proprietary||3.0||Automated physical, filesystem, backup, and logical acquisitions of SMS, apps, contacts and more. Works on both Android and iOS.|
|MPE+Mobile Phone Examiner Plus||Windows||proprietary||5.5.6||Universal Cell phone and Smart phone Forensics Extraction and Analysis Tool - Hardware and Software|
|Last SIM Details (LSD)||Windows||freeware||Recovery of SIM card details from mobile device reads|
|HashKeeper||Windows||free||n/a||Database application for storing file hash signatures|
|Evidence Eliminator||Windows||proprietary||6.03||Anti-forensics software, claims to delete files securely|
|DECAF||Windows||free||n/a||Tool which automatically executes a set of user defined actions on detecting Microsoft's COFEE tool|
- Casey, Eoghan (2004). Digital Evidence and Computer Crime, Second Edition. Elsevier. ISBN 0-12-163104-4.
- Sanderson, P (December 2006). "Mass image classification". Digital Investigations 3 (4): 190–195. doi:10.1016/j.diin.2006.10.010.
- Mohay, George M. (2003). Computer and intrusion forensics. Artechhouse. p. 395. ISBN 1-58053-369-8.
- Bhoedjang, R et al. (February 2012). "Engineering an online computer forensic service". Digital Investigations 9 (2): 96–108. doi:10.1016/j.diin.2012.10.001.
- Mislan, Richard (2010). "Creating laboratories for undergraduate courses in mobile phone forensics". Proceedings of the 2010 ACM conference on Information technology education (ACM): 111–116. Retrieved 29 November 2010.
Among the most popular tools are products named MicroSystemation GSM .XRY and .XACT, Cellebrite UFED, Susteen Secure View2, Paraben Device Seizure, Radio Tactics Aceso, Oxygen Phone Manager, and Compelson MobilEdit Forensic