Digital investigation for a new era.
Extract forensic data from computers, quicker and easier than ever. Uncover everything hidden inside a PC.
Complete suite for forensic investigation
Complete suite for forensic investigation
Find files faster
OSF provides one of the fastest and most powerful ways to locate files on a Windows computer or Forensic image.
Search within the contents of files with the use of our acclaimed indexing engine providing industry leading relevance ranking, date range searching, exact phrase matching, “Google-like” context results and more.
Extensive file type support
Investigate and search within hundreds of file types including Office and Acrobat documents, image files (with OCR), e-mails (Outlook, Thunderbird, Mozilla and more), attachments, ZIP files, and even binary files and unallocated clusters.
Recover deleted evidence
Search and recover files that a user may have attempted to destroy or have been removed from the Recycle Bin..
Uncover user activity
Scan the computer for evidence of recent activity, including accessed websites, USB drives that have been connected, wireless networks, recent downloads, website logins and website passwords.
OSF provide powerful tools to uncover and crack passwords on a live system or forensic image.
* Web site logins and passwords (used in Chrome, Edge, IE, Firefox and Opera)
* Outlook and Windows Live passwords
* Saved Wifi passwords
* Windows autologon password
* Windows and other Microsoft product keys
* Ports (Serial/Parallel)
* Network adapters
* Physical and optical drives
* Bitlocker detection
OSF also provide tools to crack hashes with the use of rainbow tables, and dictionary attacks.
Reveal hidden areas on a hard disk
OSF can expose the HPA and DCO hidden areas of a hard disk which can be used for malicious intent, including hiding illegal data.
Browse Volume Shadow copies
Use OSF to access Volume Shadow Copies. This allows you to look at how a disk appeared at a point of in time in the past and see what has changed. Discover changes to files and even view deleted files.
Identify suspicious files and activity
Verify and match files
Use OSF to confirm that files have not been corrupted or tampered with by comparing hash values or identify whether an unknown file belongs to a known set of files. Verify and match files with MD5, SHA-1 and SHA-256 hashes. Find misnamed files where the contents don't match their extension.
Create and compare drive signatures to identify differences and changes made on a system. OSF lets you create a forensic signature of a hard disk drive, preserving information about file and directory structures present on the system at the time of signature creation.
OSF features a Timeline Viewer that provides a visual representation of file and system activity over time, helping you to identify date ranges where significant activity has occurred, or build up a pattern of behavior over years, months or days.
File analysis tools
OSF provides a comprehensive suite of tools to analyze files, emails, and system information including:
File viewer, Email viewer, Registry viewer, File system browser, Raw disk viewer, Web browser, ThumbCache viewer, SQLite database browser, ESEDB viewer, Prefetch viewer, Plist viewer, $UsnJrnl viewer
Manage your digital investigation
Organize all the evidence you have discovered into a single, cryptographically secure case file.
Export your case file as an accessible and customizable report showing all evidence associated with the case. Deliver a readable summary of forensic findings to clients or law enforcement agents at any point in your investigation.
Storage device management
Manage your storage devices in a centralized manner for convenient access throughout OSF.
Drive and system imaging
Create and restore disk images of evidence disks, to support forensics analysis without risking the integrity of the original data.
Rebuild a complete RAID image from a set of RAID member disk images.
Make exact copies of the partitions or drives of an active system. Useful for live acquisitions while running OSF from your USB drive.
OSF can automatically maintain a secure audit trail of the exact activities carried out during the course of the investigation.
Take OSF with you
OSForensics can be installed and run from a portable USB drive. Take the investigation straight to the target computer without risking the contamination of valuable forensic information.
Professional and Bootable Editions
The professional and bootable editions of OSForensics have many features not available in the free edition, including;
> Import and export of hash sets
> Customizable system information gathering
> No limits on the amount of cases being managed through OSForensics
> Restoration of multiple deleted files in one operation
> List and search for alternate file streams
> Sort image files by colour
> Disk indexing and searching not restricted to a fixed number of files
> No watermark on web captures
> Multi-core acceleration for file decryption
> Customizable System Information Gathering
> View NTFS directory $I30 entries to identify potential hidden/deleted files
> Memory viewer and dumper – Kernel mode acquisition to bypass anti-dump tools
The bootable edition contains all the professional features plus the ability to be run on systems without a valid operating system. See the full comparison list between the editions.
The following collection of tools are provided as free downloads for use with OSForensics™.
OSFMount allows you to mount local disk image files in Windows as a physical disk or a logical drive letter.
OSFClone enables you to create or clone exact raw disk images quickly and independent of the installed operating system.
Volatility Workbench is a graphical user interface (GUI) for the Volatility tool.
ImageUSB is a free utility which lets you write an image concurrently to multiple USB Flash Drives.