| | | QuickBooks Forensics - 2017.09.13 | QuickBooks Forensics by Thegrideon Software is a unique tool for QuickBooks company files (.qba, .qbb, .qbw) data access, analysis, review, export and recovery as well as password recovery and replacement. It works with most versions including 2018.
| | | | | | More on Forensics | |  | Anywhere Forensics by Thegrideon Software is a unique data access, analysis, review, export and recovery as well as encryption key and password recovery and passwords replacement tool for SQL Anywhere database files (.db). Anywhere Forensics is designed to provide full access to all Tables / Rows saved in SQL Anywhere database. It works with files directly without any database engines. Data is not changed in any way in contrast to usual database access methods. It is the first tool to offer... | Size: 4.3 MB License: Shareware Price: $99 Keywords: Asa - Data Access - Data Analysis - Data Export - Db - Decryption - Forensics - Internals - Key Recovery - Password Recovery |
|
|
| | | The Forensics Data Identifier (FDI) is a tool which allows for large data files to be easily filtered for common forensically relevant data types.The tool was intended to speed up the ediscovery and analysis processes of the forensics investigation | Size: 6.9 KB License: Freeware |
|
|
| | | A modular computer forensics framework.The project aims to be highly modular, robust,fault tolerant, recursive and scalable in order to be usable in large investigations that spawn numerous terabytes of evidence data and covers hundreds of evidence items | Size: 27.3 MB License: Freeware |
|
|
| | | A Windows File Forensics tool for encryption, hiding, modifying dates, and other stuff of the sort. BSD License | Size: 0 License: Freeware |
|
|
| | | Vinetto project is a forensics tool to examine Thumbs.db files. The project is a command line python script that works on Linux, Mac OS X and Cygwin(win32). Usage: Usage: vinetto [OPTIONS] [-s] [-U] [-o DIR] file options: --version show program's version number and exit -h, --help show this help message and exit -o DIR write thumbnails to DIR -H write html report to DIR -U use utf8 encodings -s create symlink of the image realname... | Size: 20.5 KB License: Freeware Keywords: Examine - Files - Forensics - Project - Thumbs - Tool - Vinetto |
|
|
|
| |  | Access Forensics is advanced tool for MS Access 2000-2016 (.mdb, .mdw, .mde, .accdb, .accde, .accda, ...) analysis, recovery and preview as well as password recovery and protection removal. Access Forensics is designed with 3 main goals: gain access to protected database, analyze database content and recover deleted or hidden information still present in the file. It works with database file directly - independent from any Access libraries or components, so you can edit parameters regardless... | Size: 5.7 MB License: Shareware Price: $99 Keywords: Accdb - Access Database - Access Forensics - Columns Recovery - Database Analysis - Database Forensics - Database Recovery - Mdb - Password Recovery - Table Recovery |
|
|
| |  | Sim card data recovery software is very useful in the direction of analyzing and investigating crimes where mobile phone is important evidence. Cell phone forensic data retrieval utility to recover accidentally deleted sms, inbox outbox and sent items digital messages. Tools undelete missing contact name number, phonebook directory, read unread electronic messages from CDMA cell phones. GSM sim (Subscriber Identity Module) card reader reads and scans sim card information carefully and... | Size: 434.0 KB License: Shareware Price: $69 Keywords: Card - Cell - Contact - Corrupted - Damaged - Data - Deleted - Draft - Forensics - Inbox |
|
|
| |  | Secure Auditor is a unified risk management solution which enables user to perform enumeration, scanning, auditing, penetration testing and forensics on different operational systems from single console with 30 embedded utilities like Cisco Configuration Manager, Oracle Password Auditor, Windows Password Auditor, Oracle Event Log Viewer, Windows Event Log Viewer, Oracle Access Rights Auditor, MSSQL Access Rights Auditor, System and Software Inventory Manager, Trace Route etc. Secure Auditor... | Size: 49.9 MB License: Demo Price: $300 Keywords: Audit - Database - Password - Penetration Testing - Scanner - Security |
|
|
| |  | PDA investigation utility analyzes information of windows mobile for the purpose of generating forensic reports according to user requirement. Mobile forensic tool can extract manufacturer name, IMEI number, sim IMSI number, battery status and signal quality of pocket PC. Software provides easy and interactive graphical interface for working efficiently without requirement of much technical knowledge. PC investigation software supports all major worldwide manufacturers of windows mobile... | Size: 1.1 MB License: Shareware Price: 3417INR Keywords: Analysis - Application - Call History - Detail - Device - Examine - Extract - Forensic - Hardware - Imei Number |
|
|
| | | Litigation support, computer forensics and corporate IT rely on SafeCopy everyday. If you need to securely copy files from clients systems (preserving timestamps) and servers with a verification log and electronic Chain of Custody, you need SafeCopy 2.0. This new improved version of SafeCopy includes options to select multiple data sources, hash files before and after the copy, real-time file verification, easily resume aborted or cancelled jobs. | Size: 4.2 MB License: Demo Price: $99 |
|
|
| |  | eCapture Optimizer cleans up your SQL Databases after running several eDiscovery projects. This utility should be ran every once in a while, when you detect that IPRO eCapture is running slowly. To utilize this utility you must a licensed copy of IPRO eCapture Version 3 - 5. CheetahDocs is litigation support provider specializing in electronic discovery (e-Discovery), computer forensics and Web Document Hosting. | Size: 402.0 KB License: Freeware Keywords: Computer Forensics - E-discovery - Early Case Assessment - Ediscovery - Electronic Discovery - Ipro Ecapture |
|
|
| | | mac-robber is a digital forensics and incident response tool that can be used with The Sleuth Kit to create a timeline of file activity for mounted file systems. | Size: 11.4 KB License: Freeware |
|
|
| | | LibCarvpath is a library for computer forensics carving tools.It provides the low level needs of zero-storage carving using virtual paths. These virtual file paths can be used in conjunction with the CarvFS filesystem. | Size: 20.0 KB License: Freeware |
|
|
| | | This is a collector site of tools and scripts for the digital forensics. http://scripts4cf.sf.net | Size: 67.1 KB License: Freeware |
|
|
| |  | This is a computer forensics useful tool written in bash script for Linux systems. It's fast and selective, you can retrieve all the files of the file type you choose with only one tool referenced, deleted and unallocated in very fast way. | Size: 17.2 KB License: Freeware |
|
|
| | | The Sleuth Kit is a C++ library and collection of open source file system forensics tools that allow you to, among other things, view allocated and deleted data from NTFS, FAT, FFS, EXT2, Ext3, HFS+, and ISO9660 images. | Size: 1.9 MB License: Freeware |
|
|
| | | Live Security/Forensics Linux Distribution, built from scratch and packed full of tools useful for vulnerability analysis, penetration tests, and forensic analysis. | Size: 293.8 MB License: Freeware |
|
|
| |  | Pocket PC forensic examiner utility provides facility to extract complete software and hardware information of windows based mobile phone or other similar devices. Pocket PC hardware details investigator tool displays database records, mobile model number, serial number (IMEI), SIM IMSI number, operating system registry records, version, type, manufacturer name, files records, memory status, battery status and processor architecture at the screen of your personal computer system. Mobile phone... | Size: 1.2 MB License: Shareware Price: $79 Keywords: Application - Data - Database - Examiner - Extract - Fetch - Files - Forensics - Hardware - Information |
|
|
| |  | Live View is a Java-based graphical forensics tool that creates a VMware virtual machine out of a raw (dd-style) disk image or physical disk. This allows the forensic examiner to "boot up" the image or disk and gain an interactive, user-level perspective of the environment, all without modifying the underlying image or disk. Because all changes made to the disk are written to a separate file, the examiner can instantly revert all of his or her changes back to the original pristine... | Size: 72.0 KB License: Freeware Keywords: Graphical - Java - Live View - Liveview |
|
|
| |  | The only photo recovery software to use SmartCarving, a forensics technology, used by law enforcement agencies around the world. This means that we guarantee the best photo recovery possible. Powerful Uses award-winning, trusted forensic technology to recover hundreds and thousands of difficult-to-recover photos. Handles camera recovery for RAW formats as well. Easy-To-Use Simple, intuitive user interface allows maximum recovery in just three clicks.... | Size: 7.0 MB License: Shareware Price: $19.99 Keywords: Image - Photo - Recovery |
|
|
| | | The draft code contains information and documentation from various areas such as distributed systems, analysis of algorithms, computer forensics and advanced topics in network GNU General Public License (GPL) | Size: 0 License: Freeware |
|
|
| | | A Java based forensics library to analyze and report on internet browser activity Other License | Size: 0 License: Freeware |
|
|
| | | LibCarvpath is a library for computer forensics carving tools.It provides the low level needs of zero-storage carving using virtual paths. These virtual file paths can be used in conjunction with the CarvFS filesystem. GNU General Public License (GPL); GNU Library or Lesser General Public License (LGPL) | Size: 20.0 KB License: Freeware |
|
|
| | | The file recovery process is not an easy task to run on Linux and Unix based OSes and there`s almost no good user interfaces for end users, so that`s why, El Recuperador, is intended to make a generic Web-based GUI framework based on forensics informatic GNU General Public License (GPL) | Size: 0 License: Freeware |
|
|
|
| |  | With Network Email Examiner, you can forensically examine and convert Exchange (EDB), Lotus Notes (NSF), and GroupWise email. Export email to PST files, msg, EML format, and more. View one or all individual email accounts within the archive. Recover deleted email, search by keyword, filter by date, sender, recveiver, etc., & create comprehensive reports. Network Email Examiner can work through data corruption, sort through, analyze, and categorize all email attachments, and more. Pefect for... | Size: 81.2 MB License: Demo Price: $799 Keywords: Archive - E-mail - Edb - Email - Examine - Exchange - Groupwise - Lotus - Network - Notes |
|
|
| |  | This application contains a professional recording of Open And Shut -- wrapped in a beautiful and elegant player to create an immersive and enjoyable audiobook experience. ------ Whether dueling with new forensics or the local old boys' network, irreverent defense attorney Andy Carpenter always leaves them awed with his biting wit and winning fourth-quarter game plan. But the fun stops the day Andy's dad, Paterson, New Jersey's legendary ex-D.A., drops dead in front of... | Size: 4.4 MB License: Shareware Price: $24.99 |
|
|
| |  | Reverse projection photogrammetry allows one to measure and locate objects in an existing photo. The technique has application in technical fields such as engineering, forensics and law enforcement. In addition, the technique can be used in real-estate, photography, film making, or any time you want to locate the position of an existing photograph (for example, taking before-and-after photos). The Reverse Projection application takes any photograph in your iPhone's photo library as... | Size: 1024.0 KB License: Shareware Price: $2.99 |
|
|
| For searches similar to forensics see "Related Downloads" under the categories listing. | | | |