During the 1980s, most digital forensic investigations consisted of "live analysis", examining digital media directly using non-specialist tools. In the 1990s, several freeware and other proprietary tools (both hardware and software) were created to allow investigations to take place without modifying media. This first set of tools mainly focused on computer forensics, although in recent years similar tools have evolved for the field of mobile device forensics.[1] This list includes notable examples of digital forensic tools.
Name | Platform | License | Version | Description |
---|---|---|---|---|
Autopsy | Windows, macOS, Linux | GPL | 4.20 | A digital forensics platform and GUI to The Sleuth Kit |
Cellebrite Inspector | Windows/macOS | proprietary | 10.4 | Analyze computer data volumes and memory from Windows-based and Mac computers to shed light on user actions and surface leads. |
COFEE | Windows | proprietary | n/a | A suite of tools for Windows developed by Microsoft |
Digital Forensics Framework | Unix-like/Windows | GPL | 1.3 | Framework and user interfaces dedicated to digital forensics |
Elcomsoft Premium Forensic Bundle | Windows, macOS | proprietary | 1435 | Set of tools for encrypted systems & data decryption and password recovery |
E3: Universal Software | Windows | proprietary | 3.1 | E3:Universal by Paraben Corporation is an end-to-end DFIR solution that can work through ALL types of digital data: computers, email, internet data, smartphones, & IoT devices. |
EnCase | Windows | proprietary | 21.1 CE | Digital forensics suite created by Guidance Software |
Forensic Explorer | Windows | proprietary | 5.6.8 | FEX is an advanced digital forensic program to analyze disks, images, phones, and dvrs via an easy user interface. |
FTK | Windows | proprietary | 8.0 | Multi-purpose tool, FTK is a court-cited digital investigations platform built for speed, stability and ease of use. |
IsoBuster | Windows | proprietary | 5.3 | Essential light weight tool to inspect any type data carrier, supporting a wide range of file systems, with advanced export functionality. |
LLIMAGER | macOS | proprietary | 3.7 | macOS forensic imager. |
Magnet AXIOM | Windows | proprietary | 6.X | Magnet AXIOM can recover and analyze digital evidence from the most sources, including Windows and Mac devices, Linux systems, and Chromebooks, all in one case file. |
Netherlands Forensic Institute / Xiraf[4] / HANSKEN[5] | n/a | proprietary | n/a | Computer-forensic online service. |
NTFSTool | Windows | MIT License | 1.7 | Complete forensics tool for NTFS volumes (Imaging, parsing, artefact extraction with support of Bitlocker and Encrypted File System (EFS). |
Open Computer Forensics Architecture | Linux | LGPL/GPL | 2.3.0 | Computer forensics framework for CF-Lab environment |
OSForensics[6][7] | Windows | proprietary | 8 | Multi-purpose forensic tool |
Oxygen Forensic® Detective | Windows, macOs, Linux | proprietary | 14.3 | Oxygen Forensic® Detective can also find and extract a vast range of artifacts, system files as well as credentials from Windows, macOS, and Linux machines. |
PTK Forensics | LAMP | proprietary | 2.0 | GUI for The Sleuth Kit |
SANS Investigative Forensics Toolkit - SIFT | Ubuntu | 2.1 | Multi-purpose forensic operating system | |
SPEKTOR Forensic Intelligence[8] | Unix-like | proprietary | 6.x | Easy to use, comprehensive forensic tool used worldwide by LE/Military/Agencies/Corporates - includes rapid imaging and fully automated analysis. |
The Coroner's Toolkit | Unix-like | IBM Public License | 1.19 | A suite of programs for Unix analysis |
The Sleuth Kit | Unix-like/Windows | IPL, CPL, GPL | 4.12.0 | A library of tools for both Unix and Windows |
Windows To Go | n/a | proprietary | n/a | Bootable operating system |
Memory forensics tools are used to acquire or analyze a computer's volatile memory (RAM). They are often used in incident response situations to preserve evidence in memory that would be lost when a system is shut down, and to quickly detect stealthy malware by directly examining the operating system and other running software in memory.
Name | Vendor or sponsor | Platform | License |
---|---|---|---|
Magnet AXIOM | Magnet Forensics | Windows | proprietary |
Volatility | Volatile Systems | Windows and Linux | free (GPL) |
WindowsSCOPE | BlueRISC | Windows | proprietary |
Mobile forensics tools tend to consist of both a hardware and software component. Mobile phones come with a diverse range of connectors, the hardware devices support a number of different cables and perform the same role as a write blocker in computer devices.
Name | Platform | License | Version | Description |
---|---|---|---|---|
Cellebrite UFED | Windows | proprietary | Hardware/software package, specializes in mobile forensic extraction | |
Magnet AXIOM | Windows | proprietary | 6.X | Magnet AXIOM can recover and analyze digital evidence from the most sources, including iOS and Android devices, all in one case file. |
MicroSystemation XRY/XACT[9] | Windows | proprietary | Hardware/software package, specializes in deleted data | |
Oxygen Forensic® Detective | Windows | proprietary | 14.3 | Oxygen Forensic® Detective is an all-in-one forensic software platform built to extract, decode, and analyze data from multiple digital sources: mobile and IoT devices, device backups, UICC and media cards, drones, and cloud services. |
Software forensics is the science of analyzing software source code or binary code to determine whether intellectual property infringement or theft occurred. It is the centerpiece of lawsuits, trials, and settlements when companies are in dispute over issues involving software patents, copyrights, and trade secrets. Software forensics tools can compare code to determine correlation, a measure that can be used to guide a software forensics expert.
Name | Platform | License | Version | Description |
---|---|---|---|---|
DECAF | Windows | free | n/a | Tool which automatically executes a set of user defined actions on detecting Microsoft's COFEE tool |
Evidence Eliminator | Windows | proprietary | 6.03 | Anti-forensics software, claims to delete files securely |
HashKeeper | Windows | free | n/a | Database application for storing file hash signatures |
MailXaminer | Windows | Perpetual | 4.9.0 | Specialized email forensics tool |
Named after the famous elephant Hansken, because of their tremendous memory
Among the most popular tools are products named MicroSystemation GSM .XRY and .XACT, Cellebrite UFED, Susteen Secure View2, Paraben Device Seizure, Radio Tactics Aceso, Oxygen Phone Manager, and Compelson MobilEdit Forensic