For Law Enforcement

Desktop and mobile forensic tools

ElcomSoft serves governments, military and law enforcement customers by supplying a range of tools for computer and mobile forensics. Our tools are fully accountable and forensically sound, and require no steep learning curve and no special trainings or certifications. Evidence extracted or recovered with ElcomSoft tools is admissible in the court. Expert-level support, concise maintenance and update policies make our products a solid investment.

View Products

For Business

IT security and data extraction solutions

Regain control over locked, encrypted or password-protected data, perform comprehensive security audit and extract information from a wide range of mobile devices. ElcomSoft products deliver cutting-edge technologies, offering the highest possible performance at a highly competitive price point. Regular updates and continuous maintenance will protect your investment. Out tools require no steep learning curve, and are the perfect choice for continuous use and one-off jobs.

View Products

For Home Users

Password recovery tools for computers and mobile devices

Unlock valuable information protected with lost and forgotten passwords. With hundreds of thousands passwords lost every year, protected information becomes unavailable to the rightful owner. ElcomSoft products help regain control over encrypted data, recover lost and forgotten passwords and access locked-out accounts in popular operating systems, applications and services. With cutting-edge hardware acceleration technologies, our tools are the fastest on the market when using consumer-grade gaming video cards for accelerating the recovery.

View Products

Blog updates

Accessing Google Account Data without a Password

«Cloud acquisition is arguably the future of mobile forensics. Even today, cloud services by Apple and Google often contain more information than any single device – mostly due to the fact that cloud data is collected from multiple sources. The two biggest challenges of cloud extraction have always been the account password and the secondary […]»

17 May, 2018Oleg Afonin

Apple Strikes Back: the iPhone Cracking Challenge

«We live in the era of mobile devices with full-disk encryption, dedicated security co-processors and multiple layers of security designed to prevent device exploitation. The recent generations of Apple mobile devices running iOS 10 and 11 are especially secure, effectively resisting experts’ efforts to extract evidence. Yet, several solutions are known to counter Apple’s security […]»

11 May, 2018Vladimir Katalov

iOS 11.4 to Disable USB Port After 7 Days: What It Means for Mobile Forensics

«A new iOS update is about to roll out in the next few weeks or even days. Reading Apple documentation and researching developer betas, we discovered a major new security feature that is about to be released with iOS 11.4. The update will disable the Lightning port after 7 days since the device has been […]»

8 May, 2018Oleg Afonin