For Law Enforcement

Desktop and mobile forensic tools

Elcomsoft serves governments, military and law enforcement customers by supplying a range of tools for computer and mobile forensics. Our tools are fully accountable and forensically sound, and require no steep learning curve and no special trainings or certifications. Evidence extracted or recovered with Elcomsoft tools is admissible in the court. Expert-level support, concise maintenance and update policies make our products a solid investment.

View Products

For Business

IT security and data extraction solutions

Regain control over locked, encrypted or password-protected data, perform comprehensive security audit and extract information from a wide range of mobile devices. Elcomsoft products deliver cutting-edge technologies, offering the highest possible performance at a highly competitive price point. Regular updates and continuous maintenance will protect your investment. Out tools require no steep learning curve, and are the perfect choice for continuous use and one-off jobs.

View Products

For Home Users

Password recovery tools for computers and mobile devices

Unlock valuable information protected with lost and forgotten passwords. With hundreds of thousands passwords lost every year, protected information becomes unavailable to the rightful owner. Elcomsoft products help regain control over encrypted data, recover lost and forgotten passwords and access locked-out accounts in popular operating systems, applications and services. With cutting-edge hardware acceleration technologies, our tools are the fastest on the market when using consumer-grade gaming video cards for accelerating the recovery.

View Products

Blog updates

The Implications of Resetting the Screen Lock Passcode in iOS Forensics

«In the realm of iOS device forensics, the use of the checkm8 exploit for low-level extractions has become a common practice. However, when using this method, you may occasionally need to remove the device’s screen lock passcode, which can lead to several undesirable consequences. In this article, we’ll study these consequences and learn when you […]»

30 April, 2024Oleg Afonin

All You Wanted To Know About iOS Backups

«iOS backup passwords are a frequent topic in our blog. We published numerous articles about these passwords, and we do realize it might be hard for a reader to get a clear picture from these scattered articles. This one publication is to rule them all. We’ll talk about what these passwords are, how they affect […]»

17 April, 2024Oleg Afonin

checkm8: Advancements in iOS 16 Forensic Extraction

«In iOS device forensics, the process of low-level extraction plays a crucial role in accessing essential data for analysis. Bootloader-level extraction through checkm8 has consistently been the best and most forensically sound method for devices with a bootloader vulnerability. But even though we brought the best extraction method to Linux and Windows in recent releases, […]»

15 March, 2024Elcomsoft R&D