For Law Enforcement

Desktop and mobile forensic tools

Elcomsoft serves governments, military and law enforcement customers by supplying a range of tools for computer and mobile forensics. Our tools are fully accountable and forensically sound, and require no steep learning curve and no special trainings or certifications. Evidence extracted or recovered with Elcomsoft tools is admissible in the court. Expert-level support, concise maintenance and update policies make our products a solid investment.

View Products

For Business

IT security and data extraction solutions

Regain control over locked, encrypted or password-protected data, perform comprehensive security audit and extract information from a wide range of mobile devices. Elcomsoft products deliver cutting-edge technologies, offering the highest possible performance at a highly competitive price point. Regular updates and continuous maintenance will protect your investment. Out tools require no steep learning curve, and are the perfect choice for continuous use and one-off jobs.

View Products

For Home Users

Password recovery tools for computers and mobile devices

Unlock valuable information protected with lost and forgotten passwords. With hundreds of thousands passwords lost every year, protected information becomes unavailable to the rightful owner. Elcomsoft products help regain control over encrypted data, recover lost and forgotten passwords and access locked-out accounts in popular operating systems, applications and services. With cutting-edge hardware acceleration technologies, our tools are the fastest on the market when using consumer-grade gaming video cards for accelerating the recovery.

View Products

Blog updates

Intelligent Load Balancing: Optimizing Password Recovery Across Heterogeneous Units

«In the latest update of Elcomsoft Distributed Password Recovery (EDPR), we’ve introduced a revamped load-balancing feature. The new feature aims to enhance resource utilization on local workstations across diverse hardware configurations. This update has drastically reduced the time required to break passwords in certain hardware configurations, thanks to a refined load distribution algorithm. In this […]»

14 November, 2024Oleg Afonin

When Speed Matters: Imaging Fast NVMe Drives

«Modern NVMe SSDs require specialized approaches for forensic analysis. Each year, the speed and capacity of these devices grow, presenting significant challenges related to both the speed and reliability of transferring large volumes of data when capturing disk images. In this article, we will test the imaging of a high-speed Samsung 980Pro NVMe drive with […]»

21 October, 2024Vladimir Katalov

Outlook Forensic Toolbox Helps Access Deleted Messages

«What can a forensic expert find in an Outlook data file? Can they recover deleted emails, contacts and appointments from Microsoft Outlook? Can users erase unwanted correspondence from Outlook? In this article, we’ll demonstrate how experts can recover valuable information from Outlook data files (PST/OST), including deleted emails, contacts, attachments, and appointments. Even when users […]»

15 October, 2024Vladimir Katalov