Elcomsoft serves governments, military and law enforcement customers by supplying a range of tools for computer and mobile forensics. Our tools are fully accountable and forensically sound, and require no steep learning curve and no special trainings or certifications. Evidence extracted or recovered with Elcomsoft tools is admissible in the court. Expert-level support, concise maintenance and update policies make our products a solid investment.
View ProductsRegain control over locked, encrypted or password-protected data, perform comprehensive security audit and extract information from a wide range of mobile devices. Elcomsoft products deliver cutting-edge technologies, offering the highest possible performance at a highly competitive price point. Regular updates and continuous maintenance will protect your investment. Out tools require no steep learning curve, and are the perfect choice for continuous use and one-off jobs.
View ProductsUnlock valuable information protected with lost and forgotten passwords. With hundreds of thousands passwords lost every year, protected information becomes unavailable to the rightful owner. Elcomsoft products help regain control over encrypted data, recover lost and forgotten passwords and access locked-out accounts in popular operating systems, applications and services. With cutting-edge hardware acceleration technologies, our tools are the fastest on the market when using consumer-grade gaming video cards for accelerating the recovery.
View Products«During the recent investigation into the October 2025 Louvre Museum heist, it was revealed that parts of the museum’s video surveillance network were protected by the default password “Louvre.” Further reporting indicated that sections of the system operated on Windows Server 2003 and relied on outdated surveillance management software. These findings point to long-term neglect […]»
10 November, 2025Oleg Afonin
«The latest update to iOS Forensic Toolkit brought bootloader-level extraction to a bunch of old iPads, Apple TVs, and even the first-gen HomePod running OS versions 17 and 18. This enabled full file system and keychain extraction on a those older Apple devices that can still run these versions of the OS. Why old devices […]»
6 November, 2025Oleg Afonin
«As we outlined in the previous article (Effective Disk Imaging: Ports, Hubs, and Power), it’s better to connect external USB-C devices (such as adapters and especially write-blockers) to a USB-C port that complies with at least the USB 3.2 Gen2 specs (10 Gbit/s). But what if your computer only has USB-A ports, or only a […]»
17 October, 2025Elcomsoft R&D