Computer Forensics
Computer Forensics HardwareComputer Forensics SoftwareComputer Forensics TrainingComputer Forensics ServicesPurchase Forensic Computer ProductsTechnical SupportResellersCompany Information
DI Advanced Search


17165 W. Glendale Drive
New Berlin, WI 53151
866-DIGINTEL (866-344-4683)
Outside the US: 262-782-3332

Site Contents Copyright © 2018


Forensic Software

Belkasoft Evidence CenterBelkasoft Evidence Center v8 Review available here.

Belkasoft Evidence Center is an all-in-one forensic solution for acquiring, locating, extracting, and analyzing digital evidence stored inside computers and mobile devices. This toolkit will quickly extract digital evidence from multiple sources by analyzing hard drives, drive images, memory dumps, iOS, Blackberry and Android backups, UFED, JTAG and chip-off dumps. Evidence Center will automatically analyze the data source and lay out the most forensically important artifacts for investigator to review, examine more closely or add to report.

Please Contact Us For Pricing

If you need expedited delivery, please call us for service options.

Click Here For More Information

Belkasoft Evidence Center Features

  • Fully automated acquisition, extraction and analysis of 700+ types of evidence
  • Destroyed and hidden evidence recovery via data carving
  • Live RAM analysis
  • Cloud data downloading and analysis
  • Advanced low level expertise
  • Concise and adjustable reports, accepted by courts

Types of Evidence supported by Evidence Center

  • Office documents 
  • Email clients
  • Pictures and videos
  • Mobile application data
  • Web browser histories, cookies, cache, passwords, etc.
  • Chats and instant messenger histories
  • Social networks and cloud services
  • System files, including jumplists, thumbnails and event logs
  • Encrypted files and volumes
  • Registry files
  • SQLite databases
  • Peer-to-peer software
  • Plist files
  • Geolocation data
  • Payment systems

Types of Analysis Performed by Evidence Center

  • Existing files search and analysis. Low-level investigation using Hex Viewer
  • Data carving and destroyed evidence recovery
  • Live RAM analysis including process extraction and data visualization
  • Cloud data analysis (iCloud, Google Drive, Google Plus)
  • In-depth Volume Shadow Copy support
  • Hibernation file (hiberfil.sys) and page file (pagefile.sys) analysis
  • Native SQLite analysis with freelist and WAL support
  • Discovers deleted SQLite records, e.g. Skype conversations or WhatsApp messages
  • Picture analysis including EXIF and GPS analysis, face/test/pornography/forgery detection
  • Video key frame extraction
  • Analysis of social communications with Social Graph Builder module
  • Encryption detection
  • Special files and folders analysis (e.g. Volume Shadow Copy, $OrphanFiles, $MFT etc.)
  • Hashset analysis
  • Flexible analysis with BelkaScript, free scripting module
  • Advanced search and data filtering, more than 20 types of predefined search (card and telephone numbers, names, suspicions words, etc.)

Evidence Center Works With the Following Data Sources and File Systems

  • Storage devices - Hard drives and removable media
  • Disk images - EnCase (including Ex01), L01/Lx01, FTK, DD, Smart, X-Ways, Atola, DMG
  • Mobile devices - Mobile backups, UFED dumps, chip-off and JTAG dumps
  • Virtual machines - VMWare, Virtual PC, VirtualBox, XenServer.
  • Volatile memory - Life RAM dumps; fragmented memory set analysis with BelkaCarving
  • Memory files - Hibernation file and Page file
  • Unallocated space - Data carving discovers destroyed evidence
  • Network traffic - PCAP files
  • File systems - FAT, exFAT, NTFS, HFS, HFS+, ext2, ext3, ext4, YAFFS , YAFFS2

Evidence Center Helps Investigate the Following Systems

  • Windows (all versions, including Windows 10)
  • Mac OS X
  • Unix-based systems (Linux, FreeBSD, etc.)
  • iOS: iPhone, iPad
  • Android
  • Windows Phone 8/8.1
  • Blackberry