Forensic Tools logo
    • Home
    • Forensic Tools
    • Insights
    Sign in or Register

    Forensic Explorer

    • Price
      $1950
    • Website
    • Profile
    • Reviews 0
    • prev
    • next
    • Call now
    • Bookmark
    • Share
    • Send an email
    • Leave a review
    • prev
    • next
    Gallery
    Forensic Explorer Logo
    Description

    About Forensic Explorer:

    Forensic Explorer can recover, analyze, and report data from both physical storage devices and forensic image files. With a wide array of features, investigators can access and scrutinize data at various levels, from file metadata to system structures. It's equipped with advanced functionalities like data carving, keyword searching, and hash verification, making it efficient for uncovering digital evidence.

     

    Forensic Analysis Software:

    Suitable for new or experienced investigators, Forensic Explorer combines a flexible and easy to use GUI with advanced sort, filter, keyword search, data recovery and script technology. Quickly process large volumes of data, automate complex investigation tasks, produce detailed reports and increase productivity. Manage all aspects of the investigation, including:

    File System Analysis, Keyword & Index Search, Live Boot Virtualization, Email, Registry, and report

     

    Key Features:

    Anti-Virus: Integrated with Cisco Clam anti-virus.
    Bookmark: Allows users to bookmark, flag, or categorize potential evidence.
    Case Management: Capability to create, save, and load case files.
    Data Access: Access and analyze all areas of physical or imaged media at various levels, including system files, swap files, boot records, and more.
    Data Carving: Built-in tool to carve over 300 known file types.
    Data Views: Offers multiple views like File List, Disk structure, Gallery, Filesystem Record, and more.
    Email: Supports various formats like PST, OST, EDB, MBOX with keyword and index search capabilities.
    Export: Export files to disk or directly to .L01 forensic evidence files.
    GUI: Customizable workspace with detachable views suitable for multiple monitors.
    Hash: Apply hash sets to identify or exclude files. Supports MD5, SHA1, SHA256, CRC, and more.
    Index: Features built-in DTSearch index capability.
    Keyword Search: Enables cluster, sector, or byte-level keyword searches.
    Language: Unicode compliant, allowing data search and view in native languages.
    Metadata: Extracts and reports file metadata, including EXIF, GPS, and MS Office data.
    Mount (MIP): Mount forensic image files as a Windows drive letter.
    RAID: Supports various RAID configurations, including software and hardware RAID.
    Recovery: Ability to recover deleted folders and partitions.
    Registry: Analyze Windows registry hives with filtering, categorization, and automated analysis.
    Reporting: Custom report builder with predefined templates.
    Scripting: Inbuilt Delphi scripting language with scripts for metadata, registry, and more.
    Network Servelet: Examine remote drives using a deployable network servelet.
    Shadow Copy: Analyze shadow copy files.
    Signature: Verify the signature of every file and identify mismatching file extensions.
    Triage: Automated triage and reporting on common forensic search criteria.
    Virtual Live Boot: Virtualize Windows and MAC forensic images using VirtualBox or VMWare.

    Technical Specifications
    • Supported Platforms
      Windows
    • Supported Sources
      Computer, Server, 3rd Party Device
  • No comments yet.
  • Add a review

    Leave a Reply · Cancel reply

    You must be logged in to post a comment.

    You May Also Be Interested In

    MAGNET AXIOM

    Registry Recon

    MAGNET AUTOMATE Enterprise

    • About Us
    • Privacy Policy
    • Contact Us

    © 2024 – Lexeprint Inc.

    Cart

      • Facebook
      • Twitter
      • WhatsApp
      • Telegram
      • LinkedIn
      • Tumblr
      • VKontakte
      • Mail
      • Copy link
      Manage Consent
      To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
      Functional Always active
      The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
      Preferences
      The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
      Statistics
      The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
      Marketing
      The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
      Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
      View preferences
      {title} {title} {title}

      Subscribe to Our Newsletter!

      * indicates required






      Please select all the ways you would like to hear from :


      You can unsubscribe at any time by clicking the link in the footer of our emails. For information about our privacy practices, please visit our website.

      We use Mailchimp as our marketing platform. By clicking below to subscribe, you acknowledge that your information will be transferred to Mailchimp for processing. Learn more about Mailchimp's privacy practices here.