For Law Enforcement

Desktop and mobile forensic tools

ElcomSoft serves governments, military and law enforcement customers by supplying a range of tools for computer and mobile forensics. Our tools are fully accountable and forensically sound, and require no steep learning curve and no special trainings or certifications. Evidence extracted or recovered with ElcomSoft tools is admissible in the court. Expert-level support, concise maintenance and update policies make our products a solid investment.

View Products

For Business

IT security and data extraction solutions

Regain control over locked, encrypted or password-protected data, perform comprehensive security audit and extract information from a wide range of mobile devices. ElcomSoft products deliver cutting-edge technologies, offering the highest possible performance at a highly competitive price point. Regular updates and continuous maintenance will protect your investment. Out tools require no steep learning curve, and are the perfect choice for continuous use and one-off jobs.

View Products

For Home Users

Password recovery tools for computers and mobile devices

Unlock valuable information protected with lost and forgotten passwords. With hundreds of thousands passwords lost every year, protected information becomes unavailable to the rightful owner. ElcomSoft products help regain control over encrypted data, recover lost and forgotten passwords and access locked-out accounts in popular operating systems, applications and services. With cutting-edge hardware acceleration technologies, our tools are the fastest on the market when using consumer-grade gaming video cards for accelerating the recovery.

View Products

Blog updates

iOS vs. Android: Physical Data Extraction and Data Protection Compared

«Today’s mobile devices are getting increasingly more resistant to physical imaging, mostly due to the use of full-disk encryption. Full-disk encryption makes useless some low-level acquisition techniques of yesterday, which includes JTAG and chip-off. iOS was using full-disk encryption since the days of iOS 4 released back in 2011, while Android only started […]»

20 October, 2017Oleg Afonin

Obtaining Detailed Information about iOS Installed Apps

«Accessing the list of apps installed on an iOS device can give valuable insight into which apps the user had, which social networks they use, and which messaging tools they communicate with. While manually reviewing the apps by examining the device itself is possible by scrolling a potentially long list, we offer a […]»

3 October, 2017Oleg Afonin

Accessing iOS Saved Wi-Fi Networks and Hotspot Passwords

«In this how-to guide, we’ll cover the steps required to access the list of saved wireless networks along with their passwords. Step 1: Make a password-protected backup In order to extract the list of Wi-Fi networks from an iOS device, you must first create a password-protected local backup of the iOS device (iPhone, […]»

28 September, 2017Oleg Afonin