Founded in 1990, ElcomSoft www.elcomsoft.com supplies forensic tools to most of the Fortune 500 corporations, multiple branches of the military all over the world, foreign governments, and all major accounting firms. ElcomSoft is a Microsoft Partner (Gold Application Development), Intel Premier Elite Partner and member of NVIDIA’s CUDA/GPU Computing Registered Developer Program.
Our mission is creating a wide range of cutting edge tools aimed at identification, mitigation, and neutralization the root of threats to cyberspace, including cybercrimes, which makes it possible to suppress subsequent incidents with the use of surveys on all of cyberspace, and gathering knowledge and experience to deal with threats to industries, civil institutions, and law enforcement agencies.
The ultimate consumers of our products are the law enforcement agencies of most of the developed and internationally respected states of the modern civilized world, and we value the relationship with your company contributing to the noble cause of the fight against digital crime and international terrorism.
We assure you that ElcomSoft is guided by these fair principles in its work and intends to follow the commitment to them in the future.
If you have any questions, opinions or judgements with regards hereto, please don’t hesitate to send it to me and I shall reply promptly.
Elcomsoft Cloud eXplorer
Extract everything from your Google Account. Download users’ location history, files and documents, Contacts, Hangouts Messages, Google Keep, Chrome browsing history, search history and page transitions, Calendars, images, and a lot more.
- Download the complete set of data from Google Account
- Extract significantly more information than available via Google Takeout
- Authenticate without a password and bypass Two-Factor Authentication
- Search, filter and analyze information with built-in viewer
- Access user passwords, browsing history, contacts, location history, email and much more
- Obtain files and documents from Google Drive
ElcomSoft Distributed Password Recovery
Break complex passwords, recover strong encryption keys and unlock documents in a production environment.
- Break passwords to more than 300 types of data
- Heterogeneous GPU acceleration with multiple different video cards per computer
- Works 20 to 250 times faster with hardware acceleration
- Linear scalability with low bandwidth requirements and zero overhead on up to 10,000 computers
- Remote deployment and console management
Elcomsoft Forensic Disk Decryptor
Instantly access data stored in encrypted BitLocker, FileVault 2, PGP, TrueCrypt and VeraCrypt containers. The tool extracts cryptographic keys from RAM captures, hibernation and page files or uses plain-text password or escrow keys to decrypt files and folders stored in crypto containers or mount encrypted volumes as new drive letters for instant, real-time access.
- Decrypt BitLocker, BitLocker To Go, FileVault 2, PGP, TrueCrypt and VeraCrypt volumes
- Extract cryptographic keys from RAM captures, hibernation and page files, escrow and Recovery keys
- Extract and store all available encryption keys
- Instantly mount encrypted containers as drive letters
- Capture the content of computer's volatile memory with kernel-level tool
- Fast, zero-footprint operation
Elcomsoft Mobile Forensic Bundle
The complete mobile forensic kit in a single pack. Perform physical, logical and over-the-air acquisition of smartphones and tablets, break mobile backup passwords and decrypt encrypted backups, view and analyze information stored in mobile devices
- Tools for logical, physical and over-the-air acquisition of mobile devices
- Over-the-air acquisition of iOS devices, Microsoft and Google accounts
- iCloud acquisition with or without the password
- Breaks passwords to mobile backups with GPU acceleration
- Access to deleted evidence and forensically sound extraction
Elcomsoft Phone Breaker
Perform logical and over-the-air acquisition of iOS devices, break into encrypted backups, obtain and analyze backups, synchronized data and passwords from Apple iCloud.
- Break passwords and decrypt iOS backups with GPU acceleration
- Decrypt iCloud Keychain and Messages with media files and documents from iCloud
- Obtain synchronized data from Apple and Microsoft accounts
- Download iCloud backups and synced data with or without Apple ID password
ElcomSoft Password Recovery Bundle
All password recovery tools in a single value pack. Unlock documents, decrypt archives, break into encrypted containers with an all-in-one password recovery bundle.
- Breaks passwords to several hundred formats
- Works 20 to 200 times faster with hardware acceleration using conventional video cards for GPU acceleration+
- Distributed attacks with excellent scalability on up to 10,000 computers
- Includes all relevant password recovery tools in a single discounted package
Elcomsoft Phone Viewer
Analyze information extracted with ElcomSoft and third-party acquisition tools with a fast, lightweight viewer. Decrypt and view iOS backups and synced data, browse iOS file system images, analyze iCloud Photo Library and access synchronized data with ease.
- Lightweight forensic viewer requiring no learning curve
- Analyze data extracted by ElcomSoft acquisition tools
- Export evidence to continue analysis in third-party tools
- View information unavailable in other forensic tools
Few Customer Testimonials
Our clients like us for our specialized abilities, administration quality and polished methodology. Sharing their great words is a delight for us.
Trusted by Thousand of Brands
Get In Touch With Us
Test the effectiveness of your own security controls before malicious parties do it for you. Our security experts are here to help — schedule a call today.
Xiarch Security is an global security firm that educates clients, identifies security risks, informs intelligent business decisions, and enables you to reduce your attack surface digitally, physically and socially.
Certified Security Experts
Our security experts are exceptionally qualified and confirmed by CEH, ECSA, OSCP, CISA, CISSP, and numerous others.
Communication & Collaboration
After surveying the code our specialists shared the best answers to correct them. Our experts will communicate with you for any further implementations.
We hold industry-leading certifications and dedicate part of every day to research the latest exploit techniques to ensure our clients remain protected from evolving online attacks.
Free Remediation Testing
Once your team addresses remediation recommendations, Xiarch will schedule your retest at no additional charge.