Alternatives to Cellebrite

Compare Cellebrite alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Cellebrite in 2025. Compare features, ratings, user reviews, pricing, and more from Cellebrite competitors and alternatives in order to make an informed decision for your business.

  • 1
    Magnet AXIOM Cyber

    Magnet AXIOM Cyber

    Magnet Forensics

    Enterprise organizations large and small use Magnet Forensics’ solutions to close cases quickly with powerful analytics that surface intelligence & insights while also being able to leverage automation and the cloud to reduce downtime and enable remote collaboration at scale. Some of the world’s largest corporations use Magnet Forensics to investigate IP theft, fraud, employee misconduct and incident response cases such as ransomware, business email compromise and phishing attacks. The benefits of hosting your applications in the cloud ranges from cost savings to more centralized operations. Deploy AXIOM Cyber in Azure or AWS to leverage the benefits of cloud computing plus the ability to perform off-network remote collections of Mac, Windows and Linux endpoints.
  • 2
    Aid4Mail

    Aid4Mail

    Fookes Software Ltd

    Aid4Mail is a fast, reliable, and highly accurate tool to collect, recover, search, and convert emails. It supports most mailbox file formats (e.g. PST, OST, OLM, mbox), IMAP accounts (e.g. Yahoo! Mail, AOL) and popular mail service providers (e.g. Microsoft 365, Exchange, Gmail). Aid4Mail can recover double-deleted messages and corrupted emails, and extract MIME data from certain types of unknown file formats through file carving. Aid4Mail provides a large array of tools to search and filter out unwanted emails during conversion. Save time by using native pre-acquisition filters to download a subset of your mail from Exchange, Office 365, Gmail and other webmail services. Use Aid4Mail’s integrated search engine to cull-down your email collection. Its search operators are very similar to Gmail and Office 365. Aid4Mail is used by Fortune 500 companies, government agencies and legal professionals around the world. It is made in Switzerland by perfectionists.
  • 3
    SentinelOne Singularity
    One intelligent platform. Unprecedented speed. Infinite scale. Singularity™ enables unfettered visibility, industry-leading detection, and autonomous response. Discover the power of AI-powered, enterprise-wide cybersecurity. The world’s leading enterprises use the Singularity platform to prevent, detect, and respond to cyber attacks at machine-speed, greater scale, and higher accuracy across endpoint, cloud, and identity. SentinelOne delivers cutting-edge security with this platform by offering protection against malware, exploits, and scripts. SentinelOne cloud-based platform has been perfected to be innovative compliant with security industry standards, and high-performance whether the work environment is Windows, Mac or Linux. Thanks to constant updating, threat hunting, and behavior AI, the platform is ready for any threat.
    Starting Price: $45 per user per year
  • 4
    FTK Forensic Toolkit
    Zero in on relevant evidence quickly, conduct faster searches and dramatically increase analysis speed with FTK®, the purpose-built solution that interoperates with mobile device and e-discovery technology. Powerful and proven, FTK processes and indexes data upfront, eliminating wasted time waiting for searches to execute. No matter how many different data sources you’re dealing with or the amount of data you have to cull through, FTK gets you there quicker and better than anything else. FTK uses distributed processing and is the only forensics solution to fully leverage multi-thread/multi-core computers. While other forensics tools waste the potential of modern hardware solutions, FTK uses 100 percent of its hardware resources, helping investigators find relevant evidence faster. Since indexing is done up front, filtering and searching are completed more efficiently than with any other solution.
  • 5
    LLIMAGER

    LLIMAGER

    e-Forensics Inc

    LLIMAGER was designed to address the need for a low-cost, no-frills “live” forensic imaging solution for Mac computers, capable of capturing the entirety of a synthesized disk, including volume unallocated space, as macOS sees the disk with its partitions mounted. The application was developed to be user-friendly and easy enough for entry level digital forensics examiners. The application leverages built-in Mac utilities, providing a versatile solution compatible with a wide range of macOS versions, both past and present. This ensures that the tool remains functional across diverse system configurations and updates. FEATURES INCLUDE: Powerful and Fast "Live" imaging, CLI based Application Supports Intel, Apple Silicon, T2 Chips, and APFS File Systems. Full Acquisition Log SHA-256 or MD5 Hashed DMG Images Choice of Encrypted /Decrypted DMGs for use in commercial forensics tools Unlimited Technical Support
  • 6
    Autopsy

    Autopsy

    Basis Technology

    Autopsy® is the premier end-to-end open source digital forensics platform. Built by Basis Technology with the core features you expect in commercial forensic tools, Autopsy is a fast, thorough, and efficient hard drive investigation solution that evolves with your needs. Tens of thousands of law enforcement and corporate cyber investigators around the world use Autopsy. Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It is used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card. Everyone wants results yesterday. Autopsy runs background tasks in parallel using multiple cores and provides results to you as soon as they are found. It may take hours to fully search the drive, but you will know in minutes if your keywords were found in the user's home folder. See the fast results page for more details.
  • 7
    Belkasoft X

    Belkasoft X

    Belkasoft

    Belkasoft X Forensic (Belkasoft Evidence Center X) is a flagship tool by Belkasoft for computer, mobile, drone, car, and cloud forensics. It can help you to acquire and analyze a wide range of mobile and computer devices, run various analytical tasks, perform case-wide searches, bookmark artifacts, and create reports. Belkasoft X Forensic acquires, examines, analyzes, and presents digital evidence from major sources—computers, mobile devices, RAM, cars, drones, and cloud services—in a forensically sound manner. If you need to share the case details with your colleagues, use a free-of-charge portable Evidence Reader. Belkasoft X Forensic works out of the box and can be easily integrated into customer workflows. The software interface is so user-friendly that you can start working with your cases right after the Belkasoft X Forensic deployment.
    Starting Price: $1500
  • 8
    Magnet AXIOM

    Magnet AXIOM

    Magnet Forensics

    Recover & analyze your evidence in one case. Examine digital evidence from mobile, cloud, computer, and vehicle sources, alongside third-party extractions all in one case file. Use powerful and intuitive analytical tools to automatically surface case-relevant evidence quickly. Recover, analyze, and report on data from mobile, computer, cloud, and vehicle sources in one case file with Magnet Axiom. Easily recover deleted data and analyze digital evidence from mobile, computer, cloud, and vehicle sources in one case file, with an artifact-first approach. Discover the full history of a file or artifact to build your case and prove intent. Magnet Axiom provides the most up-to-date artifact support for the most recent devices and sources. Acquire and analyze mobile, cloud, and computer evidence together in one case. Process warrant returns from providers such as Google, Facebook, and Instagram.
  • 9
    Axon Auto-Transcribe
    Cut down transcription time for video or audio files to just minutes, then effortlessly find key moments by scanning the transcript or using keyword searches to jump to significant moments. Fast evidence review enables you to quickly scan or search by keyword to a time-synced auto-transcript of important moments in the video evidence. When every word must be exact, Transcription Assistant, a purpose-built editing tool, empowers the users in your agency to review and edit transcripts quickly. Perform evidence reviews and create transcripts on a single platform within the reliable and secure walls of Axon. Utilize auto-transcripts that are ready in minutes, not in the days or weeks required for human transcription. Axon's ecosystem helps protect more lives in more places.
  • 10
    CloudNine

    CloudNine

    CloudNine Discovery

    CloudNine is a cloud-based eDiscovery automation platform that streamlines the litigation discovery, audits, and investigations by allowing users to review, upload, and create documents in a central location. With its comprehensive suite of professional services that include discovery consulting, computer forensics, managed review, online hosting, information, governance, litigation support, and project management, CloudNine dramatically reduces the overall costs of eDiscovery processing. Law firms and corporations can save time and money by consolidating all of their data collection, processing, and review requirements by leveraging CloudNine’s self-service eDiscovery software.
    Starting Price: $35.00/month
  • 11
    Eusing Cleaner

    Eusing Cleaner

    Eusing Software

    Eusing Cleaner is a free system optimization and privacy cleaner tool. It allows you to find and remove the unused files in your system, invalid registry entries, delete your internet history and provides plug-in support to clean the history for over 150 third-party applications. You can select the items that you want to be cleaned and also specify cookies that should not be deleted. With simply one click, Eusing Cleaner can erase the cache, cookies, history, typed URLs, autocomplete memory, index.dat from your browsers, and Window's temp folder, run history, search history, recycle bin, and recent documents, etc. It also includes an option to overwrite deleted data multiple times, so it cannot be easily recovered. Additionally, it contains a fully featured registry cleaner. It will scan your Windows registry for invalid or obsolete information and provide a list of the errors found. After fixing the invalid entries, your system will be more stable and run faster.
  • 12
    ProDiscover

    ProDiscover

    ProDiscover

    ProDiscover forensics suite addresses a wide range of cybercrime scenarios encountered by law enforcement and corporate internal security investigators. ProDiscover is widely used in Computer Forensics and Incident Response. The product suite is also equipped with diagnostic and evidence collection tools for corporate policy compliance investigations and electronic discovery. ProDiscover helps in efficiently uncovering files and data of interest. Wizards, dashboards and timeline views help in speedily discovering vital information. Investigators are provided with a wide range of tools and integrated viewers to explore the evidence disks and extract artifacts relevant to the investigation. ProDiscover combines speed and accuracy, with ease of use and is available at an affordable price. Launched in 2001, ProDiscover has a rich history. It was one of the first products to support remote forensic capabilities.
  • 13
    Falcon Forensics

    Falcon Forensics

    CrowdStrike

    Falcon Forensics offers comprehensive data collection while performing triage analysis during an investigation. Forensic security often entails lengthy searches with numerous tools. Simplify your collection and analysis to one solution to speed triage. Incident responders can respond faster to investigations, conduct compromise assessments along with threat hunting and monitoring with Falcon Forensics. Pre-built dashboards, easy search, and view data capabilities empower analysts to search vast amounts of data, including historical artifacts, quickly. Falcon Forensics automates data collection and provides detailed information around an incident. Responders can tap into full threat context without lengthy queries or full disk image collections. Provides incident responders a single solution to analyze large quantities of data both historically and in real-time to uncover vital information to triage an incident.
  • 14
    X-Ways Forensics
    X-Ways Forensics is an advanced work environment for computer forensic examiners and our flagship product. Runs under Windows XP/2003/Vista/2008/7/8/8.1/2012/10/2016, 32 Bit/64 Bit, standard/PE/FE. (Windows FE is described here, here and here.) Compared to its competitors, X-Ways Forensics is more efficient to use after a while, by far not as resource-hungry, often runs much faster, finds deleted files and search hits that the competitors will miss, offers many features that the others lack, as a German product is potentially more trustworthy, comes at a fraction of the cost, does not have any ridiculous hardware requirements, does not depend on setting up a complex database, etc.! X-Ways Forensics is fully portable and runs off a USB stick on any given Windows system without installation if you want. Downloads and installs within seconds (just a few MB in size, not GB). X-Ways Forensics is based on the WinHex hex and disk editor and part of an efficient workflow model.
    Starting Price: $18,589
  • 15
    Quest IT Security Search
    Seeing the un-seeable can be a challenge for IT. With billions of events to collect and review from a variety of sources, both on premises and in the cloud, it’s difficult to find relevant data and make sense of it. And in the event of a security breach, either internal or external, the ability to locate where the breach originated and what was accessed can make a world of difference. IT Security Search is a Google-like, IT search engine that enables IT administrators and security teams to quickly respond to security incidents and analyze event forensics. The tool’s web-based interface correlates disparate IT data from many Quest security and compliance solutions into a single console and makes it easier than ever to reduce the complexity of searching, analyzing and maintaining critical IT data scattered across information silos. Configure role-based access, enabling auditors, help desk staff, IT managers and other stakeholders to get exactly the reports they need and nothing more.
  • 16
    Liberty Interview Recorder
    The Liberty Player provides audio / video playback facilities for your captured audio files. The Liberty Player is available as a no cost download from the link below. The Player lets you select and listen to individual channels in a recording or a mix of several or all of the channels. The Player runs on any PC with Windows XP or later that has standard audio / video capabilities. For Operating systems prior to Windows 7, you will need to install the applicable video codec to allow for video playback. Windows 7 and later operating systems generally include any required video codecs for video playback. An optional foot pedal for controlling playback is available, please contact High Criteria for details.
  • 17
    OSForensics

    OSForensics

    PassMark Software

    Extract forensic data from computers, quicker and easier than ever. Uncover everything hidden inside a PC. Discover relevant data faster through high performance file searching and indexing. Extract passwords, decrypt files and recover deleted files quickly and automatically from Windows, Mac and Linux file systems. Identify evidence and suspicious activity through our hash matching and drive signature analysis features. Identify and analyze all files and even automatically create a timeline of all user activity. 360° Case Management Solution. Manage your entire digital investigation with OSF’s new reporting features. Build custom reports, add narratives and even attach your other tools’ reports to the OSF report. Volatility Workbench is a graphical user interface (GUI) for the Volatility tool. OSForensics courses offered to suit a diverse range of users and skill sets. Write an image concurrently to multiple USB Flash Drives.
    Starting Price: $799 per user per year
  • 18
    SalvationDATA

    SalvationDATA

    SalvationDATA Technology

    Digital Forensic Lab Solution from SalvationDATA is the most advanced Lab Solution for numerous industries including Law-Enforcement, IT & Finance Enterprises, and other companies that need Intelligent Work Cooperation. Specifically, with the advanced supporting software like Video Forensics, Mobile Forensics, Data Recovery and Database Forensics, and advanced solid hardware equipment like Intelligent Data Center and Intelligent Forensic Workstation, it’s been applied world-wide among Digital Forensics, eDiscovery, DFIR for law enforcement and intelligence organizations. With the assistance of professional and advanced digital forensic lab solutions, your organization’s circumstances get upgraded effectively and efficiently.
  • 19
    Recall

    Recall

    Microsoft

    Recall, a feature in Windows 11, allows users to retrace their steps and find content they've previously encountered on their PC. By capturing snapshots of the user’s active screen every few seconds, Recall saves a history of the content you’ve seen, including images, links, and text. The platform utilizes AI-powered semantic search, enabling users to find content by describing what they remember, such as a photo or a website. Recall is designed to keep snapshots encrypted and private, ensuring that only the user can access their information. It is available to those using Copilot+ PCs through the Windows Insider Program.
  • 20
    ISEEK

    ISEEK

    XtremeForensics

    Running entirely in memory, ISEEK is the embodiment of a patented process. It is an automated tool that can be deployed to run concurrently across any number of computer systems where it operates invisibly in accordance with an encrypted set of instructions. The results of ISEEK's processing are encrypted and sent to a location specified in the set of instructions which can be a local drive, a network share or cloud storage.​ Stand-alone utilities enable the creation of the encrypted set of instructions and the ability to review and process the contents of encrypted results containers. Once ISEEK has been used to pinpoint the required data and reduce the volume for further review it enables multiple encrypted results containers to have their contents extracted in a number of different formats (with optional XML metadata) for ingesting by a review tool. These formats include generic load files and a Relativity-specific load file.
  • 21
    RegHunter

    RegHunter

    EnigmaSoft

    Scan your Windows Registry to identify and remove invalid registry data and remnants of previously uninstalled programs. Identify and delete undesired stored personal data to protect personal privacy, such as web surfing history, recent document history and other sensitive information. Scan for and remove unnecessary duplicate and temporary files to potentially free up disk space. Get personalized technical support & updates. Our technical support team is ready to provide one-on-one assistance with addressing any issues you may encounter. RegHunter provides a number of features designed to optimize the user's experience, increase personal privacy and free up disk space. RegHunter is tailored to provide the tools capable of handling demanding tasks, yet remain simple enough for a first-time computer user. The RegHunter Registry Scanner can be easily accessed and executed with just a few clicks. RegHunter will perform a scan of your Windows Registry and identify entries.
    Starting Price: $50 per month
  • 22
    Scout

    Scout

    Revir Technologies

    Criminal investigations are difficult work. You collect a vast array of file types, formats, and codecs. Let modern process automation elegantly handle metadata and codecs. Powerful natural-language search, coupled with video synopsis and image analytics, is a force multiplier for LEAs. Drive better outcomes while gaining efficiencies that reduce staff shortages. Law enforcement is a collaborative effort. Jurisdictions have boundaries, but criminals do not. Adding users shouldn’t impact your budget. No per-user pricing. Voice-to-text technology saves countless hours and handles 35+ languages. People don’t always enunciate their words and that’s ok. It handles street slang and highlights what to review. Receive and share information on missing persons, victims, and offenders. Track warrants, status, gang criteria, affiliates, and more all in one place integrated with your evidence & cases.
  • 23
    Axon Investigate
    Improper playback software can alter video evidence and impede investigations. Axon Investigate allows you to review footage from more third-party proprietary video formats than any other solution on the market and provides immediate access to original metadata including date, time, image numbers, etc. More than 80% of investigations involve video evidence. Axon Investigate dramatically improves the video investigation process, saving officers up to 10 hours per week by providing simple, fast and repeatable workflows. Manage and organize hundreds of video sources into one project, track activity, tag relevant events, extract available video and create court-ready deliverables in standard, lossless formats. Axon Investigate is built by a team of certified, forensic video analysts and ensures that investigators view original video evidence and share accurate copies ready for court.
  • 24
    MailArchiva

    MailArchiva

    Stimulus Software

    MailArchiva is a professional enterprise grade email archiving, e-discovery, forensics and compliance solution. Since 2006, MailArchiva has been deployed in some of the most demanding IT environments on the planet. The server designed to make the storage and retrieval of long-term email data as convenient as possible and is ideal for companies needing to satisfy e-Discovery records requests in a timely and accurate manner. MailArchiva offer tight integration (includfing full calendar, contact & folder synchronization) with a wide variety of mail services, including MS Exchange, Office 365 (Microsoft 365) and Google Suite. Among its many benefits, MailArchiva reduces the time needed to find info and satisfy discovery record requests, ensures that emails remain intact over the long term, reduces legal exposure, ensures employees are collaborating effectively, assists in compliance with archiving legislation (e.g. Sarbanes Oxley Act), reduces storage costs by up to 60%.
    Starting Price: $34.56 / user
  • 25
    Letmefix Browser
    Spotlight search for browser - streamlined browser extension for power users Letmefix Browser is an all-in-one browser extension to boost productivity by quick search & switch to tab, managing tabs, search bookmarks, search history, and performing various actions through a spotlight search kind of interface. Key Features: - Quick and easy search with a single click or shortcut. - Indexed URLs for faster searching. - Access your most visited and recently closed pages easily. - Refresh individual or all tabs with one click. - Search, switch, and manage tabs effortlessly. - Duplicate tabs for better multitasking. - Quick calculator - Shortcuts for popular apps like Notion, Linear, Google Workspace, Figma, etc
  • 26
    PD Evidence

    PD Evidence

    PD Evidence

    We are happy to share with you that PDEvidence is now part of the Cellebrite family. Our leading evidence management tools are now integrated with Cellebrite Guardian to bring you one holistic Investigative DEMS platform for your evidence and workflow management needs. We hope you will take a moment to find out how Cellebrite Guardian can help you manage both your digital and physical evidence, and upscale your investigative workflow from intake to review and final report, all in one simple, secure, and scalable solution, wherever you are. Cellebrite Guardian is a simple, secure, and scalable cloud-based solution for evidence management, sharing, and review that enables you to manage your evidence and investigative workflow, wherever you are. Advanced roles and permissions management for unlimited users, giving you the ability to share evidence instantly while maintaining full auditing and monitoring for chain of custody.
    Starting Price: $23 per month
  • 27
    OneKeep

    OneKeep

    OneKeep

    Save bookmarks online, visit them anywhere. Create multilevel folders, and organize bookmarks neatly. Import and export bookmark easily. Search bookmarks and view visit history conveniently. Clean up duplicate or broken URLs. Create multilevel folders unlimitedly, accurate classification for bookmarks. Save additional information in the notes field, keywords, tips, or comments, etc. Import bookmarks from a file or export bookmarks to a file. View your activity history about bookmarks, including most visited, recently added, recently visited, and never visited. Search by keywords, by date, added or date visited, and find out specific bookmarks rapidly. Find out duplicate or broken URL addresses in bookmarks and clean up them. You can save bookmarks in one place, and visit them anywhere on Internet. You can add, remove, edit, search and import/export bookmarks. You can view your bookmark visit history conveniently.
  • 28
    Truxton

    Truxton

    Truxton

    Truxton’s easy-to-use, analyst-driven interface allows you to get up to speed quickly, without mastering specialized code or techniques. With Truxton, simplicity doesn’t mean a lack of sophisticated tools. You’ll get cutting edge features like user-defined queries, entity filters, coordinated reviews, notes, and findings. The investigation dashboard provides a complete picture of the current status of each investigation. It shows the name, case number/type, investigator, and the media included in the investigation. It also provides and a host of other tools that allow you to manage, review, and export the case to other Truxton users. Wouldn’t it be nice if multiple users could work on the same case at the same time? Or if you could send out a file to an off-site Subject Matter Expert for review? Export files to another platform without wrangling a bunch of proprietary code? Truxton’s open architecture allows you to take your data into other tools for verification and reporting.
    Starting Price: $3,495 per user
  • 29
    CDAN Nexus

    CDAN Nexus

    Forensic Analytics

    Our strategic, scalable solution establishes links between investigations, individuals, and devices. CDAN Nexus enables law enforcement to bring large volumes of disparate data together, automating processing and reporting and creating a single searchable database. This allows users to search for vital evidence and intelligence links across a range of digital data. CDAN Nexus can automatically process complex communication data records and produce standardized, automated reports in line with FSR codes of practice. The powerful search engine lets users search across the indexed database for a wide range of data types including phone numbers, email addresses, contact information, SMS content, ANPR, and more.
  • 30
    Microsoft Purview Audit
    Determine the scope of compromise, and access audit logs to support investigations. Determine the scope of compromise, and access audit logs to support investigations. Get a dynamic bandwidth quota to access your auditing data. Support investigations by providing visibility to events such as when mail items were accessed, replied to, and forwarded, or when and what a user searched for in Exchange Online and SharePoint Online. Create customized audit log retention policies to retain audit records based on the service where the audited activities occur, specific audited activities, or the user who performs an audited activity. Organizations are initially allocated a baseline of 2,000 requests per minute, where this limit will dynamically increase depending on an organization's seat count and licensing subscription. Retain audit log records for up to 10 years with an add-on license.
    Starting Price: $12 per month
  • 31
    Qintel CrossLink
    When users first open CrossLink they are met with the words “Know More.” This ethos powers CrossLink. How can we help everyone, be it a SOC analyst, an investigator, or an incident responder, tell a better story around their own data? Search results from six synergistic verticals of network and actor-centric data quickly provide key information that can be assembled and shared across an organization with the click of a button. CrossLink was designed to address the deficiencies in the current marketplace by a team of analysts who have decades of hands-on experience investigating a full range of threats. Data verticals include an unparalleled range of actor profiles, communications, historical Internet registration records, IP reputation, digital currency records, and passive DNS telemetry that jump-start investigations into actors and incidents. CrossLink provides users with the ability to create alerts and lightweight management functions via shareable case folders.
  • 32
    Axon Evidence
    Build your case with streamlined workflows. Axon follows stringent regulations to ensure that only authorized parties can gain access to digital evidence. We’ve proven that with external validation through rigorous audits and certifications. Leverage data from your CAD and RMS to automatically tag your evidence. Enhance efficiency and improve accuracy, making it easier to find and organize evidence. Access your evidence and records anytime, anywhere using the Axon app. Axon-sourced evidence uploads automatically. Features like community requests, unlimited third-party storage, and ridiculously fast upload speeds mean you can store everything in one location. Robust audit trails track every action taken by any user that affects evidence from the moment it is uploaded into Axon Evidence. Say goodbye to burning DVDs and misplacing evidence via our secure, online case sharing.
  • 33
    Cognitech VideoActive
    Part of the Tri-Suite64 software package, VideoActive® 64 is the first Real-Time forensic video processing software. The Cognitech® U.S. Patented software is the world’s only software that has a fully automatic Real-Time Universal De-Multiplexing ability, in addition to Real-Time Track & Cover, lidar crime scene reconstruction and analysis. Real-Time Universal DVR Capture, Patented Lossless Video Capture with encoding that doubles video storage and a Video Search (e.g. cars and people). Cognitech VideoActive’s modular design allows the end-user to choose a pre-defined configuration or user-defined signal processing chain. VideoActive® modules can be easily combined to produce a user-defined processing pipeline from live sources or locally stored files, all in real-time. New software code entirely re-written for 64-bit software architecture improving use of larger size files, such as 4K and 8K video to be opened, played, and saved.
  • 34
    Passware Kit
    Passware Kit Forensic is the complete encrypted electronic evidence discovery solution that reports and decrypts all password-protected items on a computer. The software recognizes 340+ file types and works in batch mode recovering passwords. Analyzes live memory images and hibernation files and extracts encryption keys for hard disks and passwords for Windows & Mac accounts. Passware Bootable Memory Imager acquires memory of Windows, Linux, and Mac computers. Resolved navigation issues after stopping the password recovery process. Instant decryption of the latest VeraCrypt versions via memory analysis. Accelerated password recovery with multiple computers, NVIDIA and AMD GPUs, and Rainbow Tables. In addition to all the key features of a Windows version, Passware Kit Forensic for Mac provides access to APFS disks from Mac computers with Apple T2 chip.
    Starting Price: $1,195 one-time payment
  • 35
    E3:Universal

    E3:Universal

    Paraben Corporation

    Don’t get caught up in tools that are unmanageable. The E3 Platform gets you processing all types of digital evidence quickly with an Easy interface, Efficient engines, and Effective workflow. E3:UNIVERSAL version that is designed to do all data types from hard drive data, smartphones, and IoT data. The need to change around your tool based on what type of digital data you have is a thing of the past. The E3 Forensic Platform seamlessly adds a large variety of evidence into a single interface to be able to search, parse, review and report on the digital data from most digital sources. Computer forensics focuses on bits and bytes of the file system that holds a large variety of different valuable pieces of data that can be the key to your investigation. From the FAT files systems of old to modern file systems like Xboxes, the E3 Forensic Platform works with the powerhouse of multi-tasking analysis engines to breakdown the data.
  • 36
    EnCase Forensic
    The Gold Standard in Forensic Investigations – including Mobile Acquisition. Improve investigation efficiency with the release of optical character recognition (OCR) support that seamlessly extracts embedded text from scanned images, documents and PDFs as part of the evidence collection workflow. 21.2 also expands social media artifact support and includes an enhanced workflow with a new summary view that allows users to cross-reference disparate artifact types, significantly improving evidence processing workflows. OpenText Security (formerly Guidance Software) created the category for digital investigation software with EnCase Forensic in 1998. EnCase has maintained its reputation as the gold standard in criminal investigations and was named the Best Computer Forensic Solution for eight consecutive years by SC Magazine. No other solution offers the same level of functionality, flexibility, and has the track record of court-acceptance as EnCase Forensic.
  • 37
    SecureReview

    SecureReview

    SecureReview

    SecureReview provides a high-performance, project-specific virtual PC service to ensure that all informational artifacts — cached documents, search terms, custodian’s names — of the document review process are never downloaded to local computers in the agency, effectively isolating sensitive discovery information and significantly decreasing security risk. SecureReview partners with contract attorney staffing agencies, law firms, corporate legal departments, and e-discovery data service providers to enable consistent, highly secure document review infrastructure. SecureReview limits reviewer access to client websites and services. Dedicated email ensures secure collaboration between law firm and contractor review team. SecureReview supports IP Authentication, Multi-Factor Authentication and SSO with Enterprise accounts. Detailed activity logs enable SecureReview administrators to access reviewer performance metrics.
  • 38
    Quin-C

    Quin-C

    AccessData

    AccessData® is reimagining digital forensics and legal review to help you uncover critical evidence faster, make more meaningful connections across data and build stronger cases. With Quin-C™, a pioneering technology from AccessData, you can empower forensic & legal teams at every skill level to conduct and close more accurate, advanced investigations faster than ever before. Quin-C works seamlessly with the AccessData solutions you already know and trust, to give you maximum control over the way you collect, process, review, analyze and report on key pieces of data. Feature-rich and easy to use, Quin-C delivers groundbreaking technology to maximize the output of investigative, forensic, IT and legal teams alike. In combination with AccessData core products, Quin-C is the fastest, most scalable solution on the market today. Quin-C dramatically improves efficiency and throughput with next-generation features that guide current and future investigations.
  • 39
    Chocolatey

    Chocolatey

    Chocolatey

    Chocolatey has the largest online registry of Windows packages. Chocolatey packages encapsulate everything required to manage a particular piece of software into one deployment artifact by wrapping installers, executables, zips, and/or scripts into a compiled package file. Package submissions go through a rigorous moderation review process, including automatic virus scanning. The community repository has a strict policy on malicious and pirated software. Many organizations face the ongoing challenge of deploying and supporting various versions of software. Chocolatey allows organizations to automate and simplify the management of their complex Windows environments. Our customers have experienced a massive reduction in effort, improved speed of deployment, high reliability, and comprehensive reporting. Reduce complexity, save yourself time, and get up to speed on the latest technologies and approaches.
    Starting Price: $96 per year
  • 40
    Artifact
    Artifact uses AI to learn your interests and keep you up-to-date with the information and inspiration that matters most to you. Start discovering the most interesting articles and content shared from our community. Search and follow anyone with a social profile. Profiles feature recent links posted so it’s easy to see what someone is sharing. Links provide tools to help you quickly edit images and help with caption writing, any story that you find on Artifact can be summarized with AI. Artifact goes beyond traditional news categories, allowing you to share and explore links from across the web, from product pages, app reviews, recipes, architecture galleries, and more. Gain quick insights with a single tap as AI generates concise summaries for any article.
  • 41
    eDCaseMAN
    BRITE provides a central way to track, trace, and monitor all running legal cases/matters in real time. Specifically designed to enhance the overview for lawyers. Our dashboards eliminate unnecessary phone calls and email conversations. eDCaseMAN provides real-time chain-of-custody reporting within or across custodians or matters safely from behind the firewall. Customers can track everything that happens with the data after it is transferred beyond the firewall to third party providers and law firms, then tagged and turned over or withheld from productions, and repurpose prior tagged and tracked data in subsequent matters, ensuring consistent document judgment calls and significantly reducing the cost of re-reviewing prior-tagged files.
  • 42
    Listary

    Listary

    Listary

    With Listary you’ll never have to go through the tedious process of browsing through folders, looking for the right file names and hunting through Windows’ limited menus ever again. Listary puts smart search technology at your fingertips so you can keep working without dealing with cumbersome native Windows navigation. With a lightweight interface that doesn’t bog your system down and strain system resources, Listary puts Windows Explorer on steroids. Copy or move files to any folder from any folder with easy context menu commands. Quickly browse your recent app and file history to continue working where you left off. Create a favorites list of commonly used files and apps for fast access. Instantly find & launch programs with a quick keyboard command.
    Starting Price: $19.95 one-time payment
  • 43
    Condor Investigate
    Capture and manage every phase of an investigation: planning, evidence and information collection, brief production and outcomes management. Built for the highly complex and non-linear nature of investigations, Condor Investigate is a flexible solution designed to support information collection, sharing and tracking. improving accountability and communication within teams. Reduce bottlenecks and save time by streamlining your processes: with all important information in one system, and with the ability for different users to track and assess investigations simultaneously. Condor Investigate increases efficiency and decreases error rates. Within a single hub, Condor enables more reliable processes, and faster, smarter decision-making. Maximize your resources by categorizing and planning investigations within your own structure and management processes. Efficient. Effective. Accountable.
  • 44
    OpenText Insight
    The demands of today's litigation, investigations and compliance matters require advanced tools to minimize costs and risks and maximize success. The OpenText™ Insight eDiscovery document review and analysis platform is built for accelerating document review projects of all sizes. Insight is packed with features to automate the review process, saving costs and finding the important data sooner. eDiscovery document review and analysis platforms help legal teams find, analyze, review, classify and produce electronically stored information (ESI) for litigation, investigations, regulatory compliance and other legal matters. Advanced machine learning and eDiscovery data analytics reduce review costs, minimize data volumes, enhance efficiency and speed access to relevant information. Speeds review with maximum search power, even for complex field and text searches against tens or hundreds of millions of documents. Complex searches run at sub-second speeds.
  • 45
    CivicDocs

    CivicDocs

    CivicEye

    A versatile cloud-based digital evidence and document management solution that generates detailed audit logs to track and preserve the chain of custody while improving the overall efficiency between the arresting law enforcement agency and the prosecutor’s office. Digitally share evidence files between neighboring law enforcement agencies and prosecutors. CivicDocs provides users with instant access to vital information. Gone are the days of relying on physical file transfers, which are often time-consuming and prone to delays. With CivicDocs, investigators and prosecutors can access critical evidence with just a few clicks, expediting the flow of information and reducing unnecessary waiting periods. CivicDocs stores evidence through a rigorous process that documents the chain of custody via proper storage and handling procedures. By following protocols for legal and ethical guidelines, prosecution teams can preserve the accuracy and reliability of digital evidence.
  • 46
    XRY

    XRY

    MSAB

    XRY by MSAB is a mobile-device forensics extraction solution that enables investigators to securely and efficiently access, extract, and preserve digital evidence from smartphones, tablets, and other mobile devices. It supports a wide and growing range of devices, unlock and bypass features (including passcode bypass and chip-level support for difficult devices), full decoding of app data (such as WhatsApp, Facebook, Instagram, Viber), browser history (Safari, Chrome, Opera), and location/timeline correlation across sources. It is built with full chain-of-custody and evidential integrity in mind, including a secure XRY forensic file format with encryption and auditing, while offering access both at the frontline (scene) and in the lab. XRY includes variants such as Logical (fast, live data), Physical (raw memory dumps, deleted data recovery), Cloud (cloud-/app-based data), and Pro (deepest device and exploit access).
  • 47
    JusticeText

    JusticeText

    JusticeText

    We are strengthening the ability of attorneys to analyze this crucial data with our evidence management software. Our automated transcripts synchronize with media files so you can jump to relevant sections of the video with a single click. Our accuracy heat map helps you easily identify sections of video with poor audio quality so you can perfect the automated transcript in our interactive editor. Make notes right alongside your transcript to highlight important sections of the video for future reference. Some of our fan-favorite features are specifically designed to expedite the pre-trial preparation process. Our video editing suite allows you to create clips on the fly, and the presentation mode allows for a smoother in-trial experience. Our platform supports transcriptions in 10 languages. Export the transcript as a well-formatted Word document and download the video clips in MP4 format to share with colleagues and clients.
  • 48
    AD Enterprise

    AD Enterprise

    AccessData

    Today’s digital forensics teams face many challenges in a world filled with an overwhelming amount of data. From multiple office locations, to massive employee pools and remote workers, AD Enterprise provides deep visibility into live data directly at the endpoint, helping you conduct faster, more targeted enterprise-wide post-breach, HR and compliance investigations in a single, robust solution. With AD Enterprise, you can respond quickly, remotely and covertly while maintaining chain of custody, and facilitate focused forensic investigations and post-breach analysis, without interruption to business operations. Preview live data at the endpoint, then filter on any attributes and choose to retrieve only the data that matters to your investigation, saving time and cost. Perform collections from endpoints in multiple locations by deploying our remote Enterprise Agent to a broad range of operating systems, including Windows, Mac, Linux and more.
  • 49
    KLD Analytics

    KLD Analytics

    KLDiscovery

    Ediscovery has come a long way in its short history, with KLDiscovery on the forefront of providing clients the best solutions and tools in the industry to reduce costs and focus on relevant data faster. KLDiscovery offers a full range of eDiscovery analytics tools combined with a deep bench of human expertise to help you get the most out of your solution. If you’re not using eDiscovery analytics, you’re at risk of increasing legal costs and missing critical documents. Developed through collaboration of our data scientists, software engineers and legal professionals, KLD Analytics is the most advanced toolkit on the market. Rank and categorize documents with remarkable accuracy via machine learning. Automate the routing and distribution of documents to streamline review. Determine the relationship between messages and identify the most inclusive messages. Identify and group similar records, highlighting the subtle differences for faster review.
  • 50
    Belkasoft Triage
    Belkasoft Triage is a new digital forensic and incident response tool developed specifically for a quick analysis of a live computer and making a partial image of important data. Belkasoft T is designed to assist in situations when an investigator or a first responder is at the scene of incident and needs to quickly identify and obtain specific digital evidence stored on a Windows machine. The product is irreplaceable in situations of time pressure, when there is a need to quickly detect presence of specific data and obtain investigative leads instead of conducting an in-depth analysis of all the digital evidence.