For Law Enforcement

Desktop and mobile forensic tools

Elcomsoft serves governments, military and law enforcement customers by supplying a range of tools for computer and mobile forensics. Our tools are fully accountable and forensically sound, and require no steep learning curve and no special trainings or certifications. Evidence extracted or recovered with Elcomsoft tools is admissible in the court. Expert-level support, concise maintenance and update policies make our products a solid investment.

View Products

For Business

IT security and data extraction solutions

Regain control over locked, encrypted or password-protected data, perform comprehensive security audit and extract information from a wide range of mobile devices. Elcomsoft products deliver cutting-edge technologies, offering the highest possible performance at a highly competitive price point. Regular updates and continuous maintenance will protect your investment. Out tools require no steep learning curve, and are the perfect choice for continuous use and one-off jobs.

View Products

For Home Users

Password recovery tools for computers and mobile devices

Unlock valuable information protected with lost and forgotten passwords. With hundreds of thousands passwords lost every year, protected information becomes unavailable to the rightful owner. Elcomsoft products help regain control over encrypted data, recover lost and forgotten passwords and access locked-out accounts in popular operating systems, applications and services. With cutting-edge hardware acceleration technologies, our tools are the fastest on the market when using consumer-grade gaming video cards for accelerating the recovery.

View Products

Blog updates

iOS Forensic Toolkit 8 Apple Watch S3 checkm8 Extraction Cheat Sheet

«checkm8 is the only extraction method available for the Apple Watch S3 allowing full access to essential evidence stored in the device. In this guide, we will talk about connecting the Apple Watch S3 to the computer, placing the watch into DFU mode, applying the checkm8 exploit and extracting the file system from the device […]»

29 November, 2022Oleg Afonin

Approaching iOS Extractions: Choosing the Right Acquisition Method

«The extraction method or methods available for a particular iOS device depend on the device’s hardware platform and the installed version of iOS. While logical acquisition is available for all iOS and iPadOS devices, more advanced extraction methods are available for older platforms and versions of iOS. But what if more than one way to […]»

24 November, 2022Oleg Afonin

iOS Forensic Toolkit 8 Extraction Agent Cheat Sheet

«iOS Forensic Toolkit 8 brings new powerful user experience based on the command line. While this approach offers experts full control over the extraction process, mastering the right workflow may become a challenge for those unfamiliar with command-line tools. In this quick-start guide we will lay out the steps required to extract the file system […]»

22 November, 2022Oleg Afonin