Best of


9 Ways to Receive SMS Verification Code From Virtual Numbers

A virtual number is an actual phone number without a physical SIM card. It is commonly installed as a desktop application and as a mobile app.

Virtual mobile numbers can be used for sending & receiving SMS text messages and making local & international calls.

Besides using virtual numbers for receiving SMS OTP codes, they can act as a secondary phone number (without a physical SIM) and can be used for other means, e.g., business, travel, online dating, etc.

Virtual numbers are commonly used to register for online services like WhatsApp, Telegram, or other chat apps.

Here’s a quick summary of the most suitable apps based on your needs and preferences.

Best (FREE)Best (PAID)
(Free to try)
(Most affordable)
(Most number of countries to choose from)

Note that free virtual numbers are always used quickly whenever they are listed online for social media sites and email registration purposes.

Always consider getting a paid virtual number if you want a fresh unused one. These temporary numbers are affordable, and you can always extend their validity whenever possible.

How to Get Virtual Phone Numbers for Receiving SMS Verification Codes?

Here are the nine (9) ways to do so.

1. Hushed


Hushed is one of those apps that you can use to buy a prepaid mobile number online.

You can receive SMS verification codes (OTP), make calls, have custom voicemail greetings, call forwarding, and many other features.

You can get a single mobile number for as low as $1.99 for a limited number of days (e.g., 7 days)

  • Install the Hushed app on your mobile phone.
  • Choose the country of the mobile number you want, e.g, from Canada or the U.K.
  • Every purchased mobile number is renewable before the expiry date.
  • Payment methods include in-app purchases through PlayStore and AppStore, Bitcoin, and credit cards through the Hushed app portal.

2. Numero


Numero eSIM acts as a secondary mobile number for users to make cheap calls with the ability to send and receive SMS messages. In addition, you can use it to get SMS verification codes.

Users receive free calls anywhere when using Numero eSIM. This only applies to incoming calls.

You can make local and international calls at almost local rates.

You can choose virtual numbers from over 80+ countries and over 4000+ cities.

  • Make calls and receive SMS messages.
  • International WiFi calling at local rates with Local calling plans.
  • Voicemail and Call forwarding features
  • Privacy Caller-ID (hide your number) for local and international calls

3. Talkroute


Talkroute is a virtual phone system suitable for businesses and individuals who are always on the move.

Users can work using their desktop computers, web browsers, and mobile devices to make & receive calls, manage SMS texts, and respond to voicemail messages.

Talkroute has a detailed history reporting feature that retrieves call data with various options (e.g., sort by a caller or specific mailbox).

  • Local, toll-free, 800, and vanity phone numbers
  • Hosting video meetings with video conferencing with up to 100 participants
  • Unlimited 3 or 4-digit direct dial extensions
  • Custom greetings and call recordings

4. TextMagic


TextMagic is an SMS text messaging marketing campaign software that packs several features, including the ability to send and receive SMS text messages online using its two-way chat features.

You can use that to receive SMS verification OTP codes for web services, such as registering for Gmail and signing up for social media sites.

One helpful feature is enabling users a quick and cost-effective way to send bulk (mass) messages anywhere in the world.

TextMagic has global SMS coverage with access to over 1,000 mobile networks across 190+ countries. With that, you can safely receive SMS messages from any country worldwide.

  • Choose virtual numbers from over 25+ countries for promotional campaigns, customer support, etc.
  • Send & receive SMS messages and MMS attachments.
  • Sub-accounts for team members with reporting and analytics features

5. OnlineSIM


OnlineSIM is an online phone service that provides free virtual mobile numbers for users so they can have private registration on various sites, services, and platforms.

These online numbers are on short and long-term virtual number renting models.

The company has access to virtual numbers from over 90+ countries and more than 1 million numbers.

You can rent a number for as short as ten (10) minutes to an hour. In addition, you can extend the number’s validity or cancel it anytime.

You can use OnlineSIM to receive SMS verification codes by signing up for services such as Gmail, Facebook, Whatsapp, and many others.


Quackr is entirely free to use, with no signups required.

You can use Quackr as a secure temporary phone number instead of using your actual phone number on the Internet.

You can send & receive SMS text messages from the U.S., U.K., and 22 other countries using your virtual phone number.

The site updates and adds new temporary phone numbers every month.

You can use these temporary virtual numbers for setting up accounts on Facebook, WhatsApp, PayPal, Uber, Tencent, cryptocurrency exchanges & many more.


SMSReceiveFree can get SMS text messages from all over the world. In addition, these virtual numbers can be used to verify and register for websites like Twitter and Google.

All messages and phone numbers are thrown away after seven (7) days.

Every month, new virtual phone numbers are added to the list.

Even if the sender is located in a different nation, these virtual mobile numbers can still receive messages from anywhere in the world.


AnonymSMS is a completely free online service that lets you receive SMS messages without entering your mobile or cell phone number.

These temporary numbers are based on a genuine SIM, and new virtual numbers are added daily.

In most cases, communications are received immediately. Hit the refresh button to get to it. After a while, all visible and utilized virtual numbers will become inactive, and you can choose another number to use.

9. TemporaryPhoneNumber

TemporaryPhoneNumber is a free service that allows you to use its virtual temporary phone numbers to receive SMS text messages anonymously online from anywhere in the world, regardless of your location. 

TemporaryPhoneNumber is free to use without needing to pay any fees, and no need for user registration.

Incoming SMS messages are automatically refreshed on the page between 5 seconds to 60 seconds intervals.


7 BEST File Carving Tools [Data Recovery, Digital Forensics]

File Carving is a data recovery technique used to restore and recover full/partial lost, damaged or deleted files in a media drive. It is mainly used in data recovery and digital forensics investigations.

The magic of file carving lies in the software tool’s understanding of file formats and their header, footer and structure to re-construct back to their original state.

Below is a summary table of the different tools mentioned in this article.

S/noFile Craving ToolPlatform
1Stellar Data RecoveryWindows, macOS
2PhotoRecWindows, macOS, Linux
4Easeus Data RecoveryWindows, macOS
7Bulk ExtractorWindows, Linux

In this article, I will list all the best and most reliable file carving tools for Windows, Mac and Linux operating systems.

There will be a mixture of both GUI software and terminal console tools. Some of the best file-craving tools out there are, in fact, console command-line applications.

What are the Best File Craving Tools for Digital Forensics and Data Recovery?

Here are the seven (7) best file carving tools that can be used for data recovery and digital forensics use.

1. Stellar Data Recovery


Stellar Data Recovery is a file carving and data recovery tool for Mac and Windows devices capable of recovering deleted documents, photos, and videos.

The software tool is compatible with M1, M2, and T2 chip-enabled Macs and often supports the latest macOS version.

For data recovery, it can recover from Fusion drive, Time Machine devices, formatted partitions and retrieves from solid state drives, portable hard drives, and many more.

2. PhotoRec


PhotoRec is a free, open-source image data recovery tool that supports over 480+ file extension formats. It can restore lost images from computers, digital cameras, mobile devices, memory cards or other storage media such as USB flash drives.

PhotoRec provides read-only access to its directory for data recovery to prevent overwriting recovered data onto the same drive or partition. Instead, users will specify another drive or volume for recovered images.

QPhotoRec is the graphical user interface for the file-carving PhotoRec tool that offers simplicity and ease of use.

3. Recuva


Recuva is a Windows-only file carving application that can retrieve any lost file, including emails, documents, music, movies, and images. Additionally, it can restore data from any rewriteable media you may have, including USB sticks, external hard drives, and memory cards.

Recuva has an advanced deep scan mode for hard-to-find files that scans your drive to find all traces of deleted files.

The data recovery tool can recover files from damaged or recently formatted devices. It has free and Pro versions with more data recovery features.

4. Easeus Data Recovery


Easeus Data Recovery is a file-carving software that can recover almost any file, including documents, images, videos, audio, emails and many more.

The data recovery tool can restore deleted files from various media (hard drives, MicroSD cards, etc.) and repair corrupted photos, videos and documents.

The easy-to-use GUI interface offers users a free preview of the restored/recovered file before attempting a full recovery which requires more time.

There is also a feature that allows users to specify precisely which directory location they want the file recovery to take place, which can save up time instead of deep scanning the entire drive.

5. Foremost


Initially developed by the U.S Air Force, Foremost is a lightweight Linux terminal application that does file carving on files based on their headers, footers and data structures.

Foremost is installed on Linux operating systems and can be used on Kali Linux and Ubuntu distros. The data recovery tool also supports digital forensics images, such as dd and E01 evidence file formats.

6. DDRescue


DDRescue is a data recovery tool that copies data from one file or block device (hard drive, CD-ROM, etc.) to another file or block device and tries to salvage the good part if a read error occurs.

The file carving tool manipulates ddrescue map files, displays map file contents, translates map files to and from different formats, compares map files, checks the rescue status, and can remove a map file after the rescue is complete. 

DDRescue does not write zeros to the output and is periodically saved to a disc, which is helpful in the event of a crash.

7. Bulk Extractor

Bulk Extractor works like a file carving tool and a high-performance digital forensics exploitation tool. The data recovery software tool searches for file header and footer patterns of various data and then extracts these ranges as a file.

The tool extracts structured information such as credit card numbers, email addresses, JPEG images, etc., without going through the parsing of file systems.

Bulk Extractor – Features

  • It is multi-threaded, so input data should be processed at high speed. (100 – 300 MBytes/sec)
  • Expand data recursively, such as expanding gzipped files
  • Support memory dumps, disk, volume, and file systems.


7 BEST Web Browsers for macOS Monterey: [Fastest Speed Test]

We installed several popular web browsers on a MacBook, running the latest macOS Monterey, and put them into three (3) different benchmark speed tests to find out which is the fastest and lightest web browser for Mac devices.

The environment for the benchmark speed tests is as follows;

  • Laptop used: Macbook Pro (16-inch, 2021 model), running Apple M1 Max chip with a memory RAM of 64GB.
  • Condition: No other running applications present except the web browser and no other browser tabs except the speed test site

The benchmark sites used for the web browser speed tests are;

S/noBenchmark siteTest Measurements
1JetStream2Measures the browser’s ability to start up quickly, execute code speedily and run smoothly
2SpeedometerMeasures the browser’s Web app responsiveness
3Speed BattleMeasure the speed of Javascript in the browser

Web Browsers Speed Test Results

The table below shows the results for the seven (7) web browsers used in the MacBook.

The higher the score number, the better the results for all the benchmark tests.

S/noWeb BrowserJetStream2SpeedometerSpeed Battle
1Safari267.916375 runs/minute2423.48
2Vivaldi256.582282 runs/minute1448.09
3Brave221.081313 runs/minute1151.98
4Microsoft Edge219.203291 runs/minute1125.83
5Google Chrome214.344286 runs/minute1151.67
6Opera210.087270 runs/minute1124.16
7Firefox156.219222 runs/minute1233.83

Which Web Browser is the Fastest & Lightest for macOS Monterey?

Our speed test results showed that Safari is the fastest and most lightweight web browser when you are using a macOS computer, e.g. a MacBook, iPhone, iPad, etc.

1. Safari

The Fastest and the BEST Web Browser to run on any macOS device.


Safari scored the highest in all three (3) speed tests.

Safari is the fastest to start up quickly based on the JetStream2 results, scoring 267.916.


The web browser clocks a high 375 runs/minute on measuring the web app’s responsiveness using the Speedometer’s speed test.


It also has the fastest speed of running Javascript in its browser, scoring 2423.48 using Speed Battle’s test.

2. Vivaldi

Ranked 2nd in the JetStream2 (fast startup) and Speed Battle (Javascript speed) speed tests


Vivaldi’s newest update supports Apple’s M1 computers, giving itself a significant boost in speed and performance.

The web browser has several efficient features, such as the

  • Built-in calendar, mail client, translator, ad blocker and many more
  • Intelligent resource management for a faster browsing experience
  • Tab management for users to unlimited group tabs into 2-level stacks
  • Privacy browser as it does not track users’ behaviour
  • Syncing across different devices from different operating systems

3. Brave

Ranked 2nd in the Speedometer test, which measures the browser’s web app responsiveness


Started in 2015, the privacy-focused Brave web browser has hit 50 million monthly active users since January 2022.

The web browser, by default, blocks trackers and ads on every website you visit while allowing users to opt-in to earn their cryptocurrency token, called the Basic Attention Token (BAT), by watching privacy-respecting ads.

BAT tokens can be stored in the browser’s built-in Brave wallet, sold in exchanges or used to swap for other crypto tokens.

Some of Brave’s features are;

  • Block cross-site trackers and invasive ads
  • Block cookies
  • Block Fingerprinting
  • Malware and phishing protection
  • Anonymized Network Routing (TOR mode)

4. Microsoft Edge


Starting in 2015, Microsoft Edge is the web browser created to replace the old Internet Explorer.

The web browser works with various operating systems, e.g. Windows, macOS, iOS, Android devices, Windows Servers and even Linux machines.

Some of Microsoft Edge’s features are;

  • Kids Mode – For kids with built-in protection and custom designs
  • Personalized gaming homepage with exclusive XBOX content
  • Productivity features like vertical tabs and immersive reading mode
  • Security features like password breach monitor and inPrivate tab for privacy surfing

5. Google Chrome


If you are running on Windows or Linux machines, you should probably get a Google Chrome web browser.

The web browser is engineered for speed and security with automatic updates to keep your surfing safe and secure.

Some of the useful features of Chrome as;

  • Built-in Safety Checks notify users if passwords are compromised and if browser extensions are a security risk
  • Built-in Privacy controls allow users to set their privacy level, e.g. clear browsing history, control website access permissions like webcam, etc
  • Password syncing across devices when users sign in to their Chrome account
  • Plenty of Chrome extensions add-ons

6. Opera


The Opera project started in 1994 and was considered one of the pioneers in web browsing.

The Opera browser supports Windows, macOS, Linux, Chromebook, Android and iOS. Besides the main browser, the company offers Opera GX for gamers and Opera Mini for a light data-saving browser.

Some of Opera’s features include;

  • Built-in Ad Blocker, which is customizable
  • Built-in Integrated Messengers. e.g. Facebook messenger, Whatsapp, Telegram
  • Secure encrypted file-sharing between connected devices
  • Optional VPN feature

7. Firefox


Started in 2004, the Mozilla Firefox web browser was created to achieve a faster and more privacy-focused surfing experience for users.

In fact, users of Firefox stick by their browsers due to the fact that it is highly configurable in its settings. You can set and customize almost any aspect of the web browser.

Some of the features of the Firefox web browser include;

  • Picture-in-picture mode for easy streaming and multitasking
  • DNS over HTTPS (DoH) prevents internet service providers from selling your data
  • Fingerprinting and crypto mining blocking
  • Plenty of browser extensions add-ons
  • Sync across devices


7 BEST Digital Forensics Tools [Mobile, Mac, Cloud, Window]

The field of digital forensics is used by law enforcement agencies when it comes to criminal investigations to extract evidence, as well as in the private sector, where incidents such as data breaches, litigation, inside threats, fraud, etc., require the need for forensics investigations to find out the truth.

The sub-discipline of digital forensics includes mobile forensics, cloud forensics, memory forensics and many more.

Every digital forensics tool has its own strengths when it comes to examining the different types of devices. There are always specific forensic tools that cater for a specific operating system.

Not to be confused with data recovery, the four (4) steps involved in a digital forensics scientific methodology begin with;

1CollectionThe proper seizure procedure of devices to prevent physical damage and/or file contamination
2PreservationThe forensic process of acquiring (imaging) a forensic image of the device
3AnalysisThe examination stage to uncover any inculpatory or exculpatory digital evidence using digital forensic tools
4PresentationExplaining the forensic findings, typically presented in a court of law when used by law enforcement agencies

List of the Best Digital Forensics software

Depending on the type of device and operating system you are acquiring, we can choose the best digital forensics tools for each sub-discipline of digital forensics.

1. EnCase Forensic

Court-proven computer forensic tool used by law enforcement around the world


Starting in the early days of 1998, EnCase is the pioneer in the field of computer forensics when it comes to criminal investigations and analysis.

Used by the majority of law enforcement agencies in the world, the strength of EnCase Forensic software lies in its competency in acquiring forensic images from a wide array of computer systems. It is especially good at analysing Windows operating systems and commonly-used file systems such as NTFS, FAT/FAT32/exFAT/, ext4 and many more.

EnCase Forensic – Key Features

  • Analyze data from multiple platforms—Windows, Linux, AIX, OS X, Solaris, and more
  • Uncover suspicious files, e.g. hiding, cloaking, or deletion
  • Manage large data volume, including deleted files, unallocated space and file slack.
  • Indexing, keyword searching and automated evidence-processing features
  • Create exact forensic duplicates through verifiable hash values and Cyclic Redundancy Check (CRC) values
  • Easy transfer of evidence files to external parties, such as legal representatives

2. Cellebrite UFED


Since entering the mobile forensics industry in 2007, Cellebrite UFED has been the leading market leader in this space for many years.

Cellebrite is an Israeli digital intelligence company focusing mainly on extracting data from mobile devices. The company has several offices across the world, including Washington D.C, Germany and Singapore.

The UFED capability is available on platforms such as desktop computers (UFED4PC) and a standalone handheld console (UFED Touch2).

Cellebrite UFED – Key Features

  • Unlocking of mobile devices via pattern bypass and PIN locks
  • Perform logical, file system and physical extractions
  • Use of bootloaders, automatic EDL capability, smart ADB connection and more
  • Wide range of supported mobile devices across many different brands
  • Extract evidence from mobile phones, SIM cards, drones, SD cards, GPS devices and more

3. SIFT Workstation


Created in 2007 by Rob Lee from SANS Institute, the SIFT Workstation is a free Linux Ubuntu distro that is packed with open-source digital forensics and incident response tools.

SIFT is designed to perform detailed digital forensic examinations and incident response capabilities, typically on computer systems. Most of the forensic tools installed onto SIFT requires some form of command-line knowledge, although there are other tools with GUI interface as well, e.g. Sleuthkit.

SIFT Workstation – Key Features

  • File system support for NTFS, raw, HFS+, FAT/exFAT, swap, RAM data and more
  • Evidence image support for E01, raw, dd, ewf, aff, vmdk, vhd, etc
  • Forensic tools installed, such as Volatility, bulk_extractor, imagemounter, libewf, Sleuthkit, RegRipper, etc

4. Sumuri Recon Lab


Sumuri’s flagship forensic suite is the Recon Lab. The digital forensics software can take in forensic images, mounted volumes, optical disk images, RAM images and its own RECON FS block image.

Recon is to be installed on a macOS machine, and it has several useful features such as skin tone detection, face analysis, RAM memory analysis, indexing and keyword searching.

Sumuri – Key Features

  • Parse and recover thousands of artefacts with Automated Analysis of macOS, Windows, Android, iOS and Google Takeout files.
  • Advanced forensic viewers for macOS plist, SQLite databases, HEX and Window’s Registry
  • Timeline support for placing events in chronological order
  • Advanced-Data Correlation feature
  • Include Paragon’s Mac Toolbox and Linux drivers
  • Integrated Report Editor
  • Support over 270 unique timestamps

5. Oxygen Forensics


Similar to Cellebrite UFED, Oxygen Forensics is a Russian company headquartered in Alexandria, Virginia and provides mobile forensics capabilities to law enforcement, federal agencies and enterprises.

The forensic software is an all-in-one platform that can extract mobile forensic images, decode them and parse them in its interface for investigators to analyse easily. Multiple extractions can be investigated in a single Oxygen Forensic interface to have a complete picture of all the acquired data.

Oxygen Forensics – Key Features

  • File system-level extraction on most mobile devices
  • Drone forensics possible
  • Bypass screen lock on popular Android devices
  • Cloud extraction – Acquire data from cloud services and storage
  • Support import of call data records

6. Magnet Axiom


Magnet AXIOM is a forensic platform that can take in different types of forensic images (mobile, computer and cloud data), process them and present them in an analytical interface for examiners to find key evidence quickly.

The forensic tool supports the analysis of Android, iOS, Windows, macOS, Linux and extraction dumps of over 50+ cloud services.

Magnet AXIOM – Key Features

  • Analyze vehicle data with support for Berla iVE extractions
  • Dedicated artefacts support for most popular and relevant sources
  • Built-in support for GrayKey (mobile acquisition)
  • Analytics tools, such as visualizing connections between people and devices
  • Reporting and Case Sharing feature

7. FTK® Forensic Toolkit


Similar to EnCase Forensic, FTK is a digital investigation solution frequently used by law enforcement and in civil cases. it is primarily used in computer forensics and is well-regarded in terms of its fast processing speed and intuitive interface. It uses distributed processing and true multi-threaded/multi-core support to ingest large amounts of digital data.

FTK Forensic Toolkit is a full disk image collection, processing and analysis solution that parses data in a forensically-sound manner. This allows investigators to preserve the integrity of the data while utilizing time to analyze files and perform advanced deep dives in areas such as data craving and file decryption.

FTK – Key Features

  • Email Analysis
  • Customizable data views
  • Indexing upfront so searching and filtering are faster subsequently
  • Ability to train FTK for facial and image recognition
  • Ability to create custom Python scripts


Mac Target Disk Mode


Apple has a built-in “Target Disk Mode” feature for all their Mac series of computers. Mac users can boot into this unique startup mode that enables them to perform data transfers from one Mac to another.

The condition here is you must have two (2) Mac computers.

The Mac you initiated in the target disk mode will act as an external hard drive for the other Mac.

To begin target disk mode, do the following steps;

  • Connect the two (2) Macs with the same cable (e.g. USB C or Thunderbolt)
  • Decide on the Mac that you want to act as an external drive
  • If the Mac is Off, start it up and long-press the T key
  • If the Mac is On, click the Apple icon on the top-left > System Preferences > click Startup Disk > Click Target Disk Mode
  • You can start to transfer files by dragging them once you see the disk icon
  • Once done with the file transfer, eject the disk by dragging its icon to the Trash


7 BEST Digital StoryTelling & Storyboarding software tools

An excellent digital storytelling tool is a linear narrative outline for a narrative or story. It can consist of storyboarding, adding scripts, video, sound, etc., and is suitable for educational use or business presentations.

Digital storytelling tools help to visualize your concept in video form, anticipate everything before the actual shooting, and communicate possible issues with your team. Creating animation and comics are also available in some digital storytelling tools.

What are the Best Digital StoryTelling and StoryBoarding Tools?

Here are the seven (7) digital storytelling tools you can use.

1. Animoto


Animoto is a free, cloud-based educational video maker that produces videos from most media files, such as photos, videos, music, etc.

There are several professional-looking templates users can choose from. Some useful categories are Education, Amazon Promo, Real Estate, Workplace and many more.

Suitable for;

  • Small business – Capture the audience’s attention with videos
  • HR and People operations – Increase engagement and company culture
  • Marketing Agencies – For brand promotion and product showcase

2. Boords


Boords is an online professional set of digital storyboarding and storytelling software tools designed for filmmakers and can be used to create storyboards, short lists and animatics.

Useful features include;

  • Automatic frame and version numbering – sync any changes
  • One-click animatics – complete with frame timing, subtitles and sound
  • Secure online sharing and frame specific comments

3. Canva StoryBoard


Canva Storyboard is a free, printable, digital storyboard online tool with plenty of customizable templates for users to choose from.

The drag-and-drop platform has many high-quality images, illustrations, icons, stickers, colour schemes and font combinations.

Canva Storyboard can be used for comic strips, videography presentations, and short or long-form videos.

Once done, users can download the digital storyboard offline or share it easily with others.

4. StoryBoardThat


StoryBoardThat is a free digital storyboarding online creation service that uses the drag-and-drop concept to create outstanding visuals for teaching, learning and communicating.

The storyboarding platform allows for storyboard creation, graphic organizers, comics and visual sets. It includes many layouts, characters and scenes.

Suitable for;

  • Personal use – for Projects, Planning, Graphic Novels, Comics, Books, etc
  • Educational use – Secure (FERPA, CCPA, COPPA, & GDPR Compliant
  • Business use – Over 200 business resources with multi-user account collaboration

5. Plot


Plot is an affordable storyboard creator optimized for mobile devices and computer screens.

It is suitable for professional output in film, documentary, television, animation and many more formats.

Useful features include;

  • Adding Script – scenes and action directly into the storyboard
  • Create simple illustrations with included shapes, clipart and brushes
  • Collaborate among colleagues and clients for reviews and comments
  • Exporting offline storyboard for review

6. Pixon

Pixon is a comic and storyboard builder designed specifically for teachers and suitable as an education tool.

Useful features include unlimited classrooms, easy logins using Google or Microsoft accounts and automatic marking of read status.

The content library holds several different topics and is suitable for creating comics that work for any academic subject, such as mathematics or science.

7. MakeBeliefComix


MakeBeliefComix is possible for anyone to create comics online, even if they are not good at drawing.

Using simple buttons and choosing from the content library, users only need to pick some characters, add a background scene and include speech bubbles with text to narrate their story.

MakeBeliefComix is a platform for students to create their own comics and tell their stories.

Besides creating comics, there are also interactive PDF printables available, as well as creating interactive journaling e-books.


7 BEST Digital Forensic Imager Tools [dd, E01, AFF formats]

A digital forensic imager can be in the form of a software imaging tool or hardware equipment. A good forensic imaging tool can output to several forensics formats and is commonly used by law enforcement agencies, private investigation firms, and security companies nowadays.

Below is a quick summary of the best forensic imagers and their imaging capability.

S/noForensic Imaging ToolDescriptionType
1FTK® ImagerComputer imagingSoftware
2Tableau Forensic Imager (TX1)Computer imagingHardware
3EnCase™ ForensicComputer imagingSoftware
4SIFT WorkstationComputer imagingSoftware
5Magnet RAM CaptureRAM imagingSoftware
6Magnet ACQUIREComputer & Mobile imagingSoftware
7Cellebrite UFEDMobile device imagingSoftware and Hardware

What is a Forensic Image?

A forensic image is a court-accepted digital image of a digital device or a digital file, such as a computer, a mobile phone or a system drive. It is considered forensically sound as the forensic image is a bit-by-bit copy of the original device, drive or file.

A forensic image is acquired using specialized digital forensics software or hardware equipment and is examined primarily by digital forensics analysis tools.

What are the Different Formats of Forensic Images?

The most common forensic image formats being used are;

  • EnCase Evidence Files = E01 / Ex01
  • Raw Format = dd
  • Advance Forensics Format = AFF

What are the BEST Forensic Imaging Software Tools?

Here are the seven (7) best digital forensics imaging tools you can use.

1. FTK® Imager


FTK® Imager is a data preview and imaging software tool that allows you to quickly assess electronic evidence to determine if further analysis using forensic tools is needed.

The imaging tool can make forensic copies of physical disks, logical drives, individual files, entire folders, discs, USB flash drives, etc.

FTK Imager – Key Features

  • Create perfect or forensic copies from the original.
  • Generate hash reports before and after the forensic image is created
  • Ability to mount images as read-only

2. Tableau Forensic Imager (TX1)


Measuring 9.5 in (L) x 6.5 in (W) x 2.6 in (H), the Tableau Forensic Imager (TX1) is a physical forensic imager hardware device that is used to create forensic images of a wide range of computer media, including USB flash drives, SATA hard drives, PCIe and 10Gb Ethernet devices.

When TX1 starts imaging, it can output to raw DD formats, .e01 (compressed) or .ex01 (compressed), and supports a wide range of file systems, such as ExFAT, NTFS, EXT4, FAT32, HFS+ and many more.

TX1 – Key Features

  • Support up to two active forensic jobs simultaneously
  • Pause and resume imaging jobs
  • Automatic job queuing allows additional jobs to begin as soon as an active job completes
  • Secure Wiping and Formatting features
  • AES whole disk encryption

3. EnCase™ Forensic


EnCase™ Forensic is a software imaging tool used by the majority of law enforcement agencies in the world. The strength of this forensic imaging software lies in its competency in acquiring forensic images from a wide array of computer systems.

It is especially good at analyzing Windows operating systems and commonly-used file systems such as NTFS, FAT/FAT32/exFAT/, ext4 and many more.

EnCase Forensics – Key Features

  • Analyze data from multiple platforms—Windows, Linux, AIX, OS X, Solaris, and more
  • Uncover suspicious files, e.g. hiding, cloaking, or deletion
  • Manage large data volume, including deleted files, unallocated space and file slack.
  • Indexing, keyword searching and automated evidence-processing features
  • Create exact forensic duplicates through verifiable hash values and Cyclic Redundancy Check (CRC) values
  • Easy transfer of evidence files to external parties, such as legal representatives

4. SIFT Workstation


SIFT Workstation is a software imaging VMware appliance, pre-configured with free, open-source forensics and analysis tools to perform deep digital forensic investigations in various environments.

It can image attached physical devices and system drives using a range of forensic command formats, such as raw dd, E01, AFF, etc.

SIFT Workstation – Key Features

  • Lots of installed forensic applications, e.g. log2timeline
  • Mounting of raw and forensic images
  • Conduct forensic investigation using installed suites like the sleuthkit.
  • Conduct incident response investigations

5. Magnet RAM Capture


Magnet RAM Capture is a software imaging tool that can recover and examine artefacts frequently found only in the memory by taking a snapshot of a suspect’s computer’s physical memory (RAM).

You can use Magnet RAM Capture while minimizing memory overwriting thanks to its minimal memory footprint. Furthermore, you can transfer the memory data into analysis programs like Magnet AXIOM after you have captured it.

6. Magnet ACQUIRE


Magnet ACQUIRE is a software imaging tool capable of mobile device image acquisition and capturing forensic images of common storage drives, including hard drives and USB flash drives.

The forensic acquisition tool can output the image to the E01 and raw dd format.

For mobile devices, depending on the make & model of the device, it can acquire a logical extraction, file system extraction or even a full physical image extraction.

Magnet ACQUIRE – Key Features

  • Use Media Transfer Protocol to acquire media and files, such as photos, videos and documents from mobile devices.
  • Support 3rd-party application user data
  • Support extraction of memory cards, e.g. microSD cards

7. Cellebrite UFED


Cellebrite is an Israeli digital intelligence company focusing mainly on extracting data from mobile devices. The forensic image it outputs is in its proprietary form, the UFDR format.

The UFED capability is available on desktop computers (UFED4PC) as software, as well as a standalone handheld physical console (UFED Touch2).

Cellebrite UFED – Key Features

  • Unlocking of mobile devices via pattern bypass and PIN locks
  • Perform logical, file system and physical extractions
  • Use of bootloaders, automatic EDL capability, smart ADB connection and more
  • Wide range of supported mobile devices across many different brands
  • Extract evidence from mobile phones, SIM cards, drones, SD cards, GPS devices and more


9 BEST Free Virtual Piano Keyboard [PC, Mac, iOS, Android]

Learning to play the piano these days does not necessarily require a physical piano. Virtual piano software is convenient, sounds great and has tons of customization & connectivity features.

Depending on the virtual piano app, it can work on web browsers, different operating systems and different types of devices, such as mobile phones and computers.

What are the Best Virtual Piano Keyboard Software?

Here are the nine (9) virtual piano software apps you can use to learn and play music.

1. Recursive Arts: Virtual Piano Simulator

| Works on Web Browser |


Virtual Piano Simulator is a realistic-looking browser-based piano instrument that is good at mirroring the distribution of white and black keys in a real piano.

When playing piano songs, users will realize that all five octaves are available for them to use. Users can also record and save their own music compositions. Sharing with friends and family is also accessible with invitation links.

Key Features

  • Adjustable sound and tempo using SustainMetronomeTransposition, and Tempo buttons
  • Free Interactive songs to choose from
  • Ability to access additional musical instrument sounds such as OrganHarpsichordHarp or Synthesizer
  • Realistic 3D keyboard
  • Capable of playing up to 64 simultaneous notes


| Works on Web Browser |

Virtual Piano allow users to learn how to play the piano in a quick, easy and enjoyable manner. The software turns your computer or mobile device keyboard into a piano keyboard, containing letters corresponding to the keys from a QWERTY keyboard.

When playing a song, you can press both the black and white keys together at the same time. In addition, there is a scroll bar under the keys to allow users to play all the octaves of a grand piano.

Key Features

  • Do not require users to know how to read music notation
  • Thousands of free music sheets
  • Maps QWERTY keyboard to piano keys
  • Credit, edit and refine customized music sheets
  • Choose from 24 different classical instruments, such as Violin, Saxophone and many more.

3. Online Pianist: Virtual Piano

| Works on Web Browser | iOS | Android |


Online Pianist simulates a real piano keyboard with 7 1/4 octaves of 88 keys, a Metronome, a sustain pedal and many others. Unfortunately, for mobile devices, only five octaves are available.

Key Features

  • Real keys mode – corresponding computer keys for the middle octaves & piano keys of a real piano
  • Simulate a piano’s sustain pedal
  • Adjust the Metronome based on BPM (beats per minute) or time signature
  • Using the letter notes feature to display ABC or DoReMi letter notes on the piano keyboard keys

4. Virtual Drumming: Virtual Piano

| Works on Web Browser |


Virtual Piano from Virtual Drumming enables users to learn chords and scales when they do not have a real piano.

Users can quickly learn music theory or try out random melodies that come to mind with this online tool.

Key Features

  • Record your song track up to a maximum of one minute
  • Automatically play the major and minor triads for every single note on the piano keyboard
  • Playing scales, such as Major, Natural Minor, Harmonic Minor, Melodic Minor, etc
  • Piano pedal simulator that allows users to play short notes by releasing the keys
  • Metronome feature for learning to play the piano keyboard, keeping time

5. Apronus: Virtual Piano

| Works on Web Browser |


Apronus Virtual Piano enable users to use their keyboard to play on their virtual online piano simulator. Each key on the piano keyboard from C3 to C5 can be played by pressing an associated key on the computer keyboard.

The keys from the keyboard A, S, D rows and the Z, X, C rows are programmed to play white key chords for rich melodies.

This is an offline version of the virtual piano as well.

Key Features

  • Create a custom-made chord button
  • Configure buttons to be associated with a computer keyboard key
  • Ability to record and playback
  • Savings recordings to a local drive
  • Bookmarking chords by generating a link that encodes all the chords from your buttons

6. Revontulet: Perfect Piano

| Android |


Perfect Piano is an intelligent piano simulator developed for Android phones and tablets. With built-in authentic piano sounds, the app can teach users how to play the piano and be entertaining at the same time.

After installation, users can have a widget on their home screen to quickly play the piano without opening the app itself.

The app supports Timbre plugins such as bass, electric guitar, saxophone, etc. and has an 88-key piano keyboard.

Key Features

  • Support USB MIDI Keyboard
  • MIDI and ACC audio recording
  • Multiplayer Connection & Competition (real-time chat and challenge)
  • Three play modes: autoplay, semi-auto play, note pause
  • Left & right-hand setup
  • A->B loop

7. FunAIs: Piano+

| Android |


With more than 50 million downloads, Piano+ is one of Android’s most popular virtual piano apps.

The virtual piano app has an impressive sound to mimic that of a grand piano while allowing users to compose their own music after playing and learning using the 88-key piano app.

Key Features

  • MIDI keyboard recording, allowing the creation of own MIDI files to share with the community
  • Huge music library with lots of classical piano songs, kids’ songs, pop and many more
  • Daily challenges to unlock themes and customization

8. Peaksel Games: Virtual Piano

| For iOS | For Android |


Virtual Piano is a simple, easy-to-use mobile app that supports iOS and Android devices.

It has over one million+ downloads on the Play Store and App Store with plenty of positive reviews.

Key Features

  • Pedal for changing the instrument’s sound
  • Three instrument sounds: piano, banjo, toy piano
  • Pitch correction
  • Zoom buttons for zooming in and out for piano keys
  • Adjustable octaves

9. T.V CO: Piano

| For Mac and iOS |


Piano for Mac and iOS is a classic piano app that allows users to learn and play thousands of songs on a virtual piano.

Users can import their popular songs and music sheets into the app and learn with the 88-key virtual piano.

The piano app also offers a Metronome, pedal, dual scrollable keyboard and supports a USB MIDI keyboard and Bluetooth MIDI keyboard.

Key Features

  • Connect to a MIDI-Keyboard via USB / Lightning cable or Bluetooth MIDI Connect
  • Use the keyboard as an output device to play the MIDI-Files 
  • Show notes and sheet as song timeline
  • View sustain-pedal events and sustained notes
  • Customize colours, effects, instruments and much more


7 Best Database Forensics Software Tools [Recover Deleted]

Many of our data records are stored in database management systems (DBMS) and in the event of a mishap or data breach or theft incident, there is both a legal and technical requirement need to adopt a database forensics investigation process using specialized tools to carefully uncover what had happened.

Most of the common DBMS are;

  • MySQL
  • Oracle
  • PostgresSQL
  • Microsoft SQL Server
  • MongoDB

Before we look at Database Forensics, we have to understand what is Digital forensics. it is a scientific application of analysing digital evidence, mainly used in a court of law and has several sub-disciplines such as cloud forensics, mobile phone forensics, etc.

Digital forensics is not to be confused with the concept of data recovery, although both are similar in many ways. Forensics, as a whole, is used for investigation purposes.

What is Database Forensics?

Database forensics is a sub-field of the digital forensics discipline that deals with the preservation, extraction, analysis and presentation of digital evidence and findings.

With scientific forensics in mind, it is often used in litigation, criminal investigation and organisational inquiry purposes. However, it can also be used as a specialized database extraction skill to query the database and find out what happened.

Examiners using database forensics tools can expect to be looking more in-depth, such as analysing file metadata, record timestamps, database artefacts and system artefacts.

Which are the Best Database Forensics Software?

Here are the seven (7) BEST Database Forensics software tools that you can use to analyse and recover deleted database entries.

1. DB Browser for SQLite


Popular among users and developers who want to create, search and edit databases compatible with SQLite, DB Browser for SQLite is a free, lightweight open-source tool with a clean interface.

The database software supports Windows, macOS and Linux operating systems. One prominent feature of this tool is the ability to export multiple tables to CSV, all in a single group, to analyse together.

Suitable for database forensics, the program comes with a Windows portable app version that does not require installation. You can run this program from an external USB flash drive when examining computer systems.

Some of the useful features are;

  • Create and compact database files
  • Create, define, modify and delete tables
  • Import and export tables from/to CSV files
  • Import and export databases from/to SQL dump files
  • Examine a log of all SQL commands issued by the application
  • Plot simple graphs based on table or query data

2. Database Forensic Analysis System


Database Forensic Analysis System is a commercial software that supports multiple relational and non-relational databases such as Oracle, SQLite, MySQL, mongoDB, redis and Cassandra.

The database forensic software assist in resolving the problems about the deleted /corrupted/fragmented database files, false file system, restriction of application system accessibility, etc.

Some of the main features include;

  • Unrestricted Accessibility to the database files – no need for password or account info from the application system
  • Extraction and Recovery for the normal/deleted/damaged database files – e.g. tables, views, triggers
  • Multiple Analysis Functions – e.g. .keyword searching, SQL statement query, visual connection analysis
  • Patent File Craving Technology – extract, analyze and reorganize the fragmented database files

3. Forensic Toolkit for SQLite


This commercial forensic software suite is a must-have for any forensic investigators to make the tasks of recovering SQLite records from disk, image and database simpler.

The Forensic Toolkit for SQLite is a suite of three (3) comprehensive software tools namely;

  • The Forensic Browser for SQLite
  • Forensic Recovery for SQLite
  • SQLite Forensic Explorer

It is an investigative tool designed to show every single byte of an SQLite database, journal or WAL file along with its decoded data. It is also an forensic tool to aid in the recovery of databases, tables and records.

Some of the features include;

  • examining unused spaces in tables and indexes,
  • viewing how each record in encoded and stored in a table or index,
  • exploring the free list and every page within it
  • Overview of the type and content of the database, which can be SMS, passwords or any other valuable evidence

4. Log Analyzer for SQL


This commercial forensic tool was designed specifically for database administrators to analyze log files transactions of MySQL Server databases and recover deleted transaction logs.

Log Analyzer for SQL scans the forensic details of Redo, General, and Binary logs to identify abnormalities in the MySQL database.

The forensic tool helps you preview the type of transaction (insert, delete, and update), the time of the transaction, the name of the transaction, and the table name involved in the query.

Some of the features include;

  • Saving of logs in multiple formats, such as MySQL, CSV, HTML, and XLS format.
  • Date filters on log transactions and log transaction data to analyze the data for a particular time period
  • Option to save log report of the MySQL log file analysis process

5. SQLite Forensics Explorer


SQLite forensics explorer is designed for investigators and administrators to restore lost and deleted databases and exporting these entries in different formats.

The forensic tool reveals the intention of the user who deletes the database records by not only recovering the deleted data but also highlights the data which is deleted or secure deleted.

Some of the main features are;

  • Sort data with colour schema – different colours for normal data, deleted data, unallocated data, etc
  • Manage multiple custodians
  • Recover associated journal files
  • Indexing of SQLite databases for further investigation or judicial proceeding
  • Mutiple options for export, e.g. csv/pdf

6. SQLite Viewer


Foxton forensics has a free tool called SQLite Viewer that is used for inspecting the contents of SQLite databases.

The forensic software has a database searcher that automatically load all SQLite databases from folder and subfolders. Images are stored in the database are also automatically extracted and viewable by examiners in the built-in gallery interface.

SQLite Viewer has a hex viewer to examine BLOBs and export them to a file for further analysis.

7. dbResponder


dbResponder is a free, SQL Server forensics tool that is capable of automated preservation and advanced analysis of database artefacts.

The forensic tool is useful for data breaches preparation & response and is developed by Kevvie Fowler who is a partner and National Cyber Response leader for KPMG.

The software can acquire database artefacts from a single or multiple SQL servers. All artefacts collected are forensically preserved with timestamps, metadata and hashes.


5 BEST Cloud Forensics & Social Media Extraction Tools

Data in the cloud (e.g. Google Drive, iTunes, webpages, social media sites) are constantly prone to changes or deletion. Therefore, cloud forensics is often referred to as taking a snapshot of the data at that moment in time.

Therefore it is important to use proper cloud forensic software to collect and preserve this digital evidence.

Cloud forensics tools are especially important if you use them for law enforcement cases (criminal offences) or corporate crime investigations, e.g. checks into employee misconduct, data leaks, etc.

Cloud data can be very useful where evidence no longer resides on local storage, e.g. computers & mobile phones, due to deletion or overwriting.

Sub-disciplines of digital forensics include mobile forensics, memory forensics and many more.

What do I need to perform cloud forensics and social media extraction?

You will still need the following;

  • The correct login credentials and authentication token for the software to gain access to the account and begin cloud extraction.
  • A clean computer, preferably with a wired connection (stable connection) and enough storage space (for the extracted cloud data)

What are the Best Cloud Forensics and Social Media Extraction Tools?

These are the five (5) cloud forensics and social media extraction that collect cloud data in a forensically-sound manner and can be used in a court of law as digital evidence.

1. Oxygen Forensic® Cloud Extractor


Founded in 2000, Oxygen Forensics is a Russian company headquartered in Alexandria, Virginia and provides mobile forensics capabilities to law enforcement, federal agencies and enterprises.

The digital forensic tool has had a built-in feature called Cloud Extractor since 2014, which acquires data from popular cloud storage and cloud email providers. Gmail, Google Drive, OneDrive, iTunes, Facebook, Instagram, Twitter and many more are some of them.

With the extracted cloud data, Cloud Extractor provides additional analytic features, e.g. Timeline (data in a chronological manner), Social Links (frequently communicated parties) and Image Categorization (sorting of images using built-in AI).

Cloud Support & Features

  • Supports over 100+ cloud services
  • Acquisition from Google, iCloud, Microsoft cloud services, popular SaaS offerings like Dropbox & Box and social media sites like Facebook, Instagram, etc
  • Cloud access via various authorization methods, support 2FA and data decryption
  • Allow users to configure proxy settings for each cloud service

2. X1 Social Discovery


XI Social Discovery is a case-centric workflow platform that enables users to correctly capture web content while maintaining data preservation and retaining metadata values.

The social media extraction tool collects and searches data from social networks and online web pages.

Unlike the traditional method of manual webpage exporting and taking screenshots, XI Social Discovery collects the web data, allows users to search & analyse them and aggregates all these data into a single user interface.

Cloud Support & Features

  • Support data types from Facebook, Instagram, Twitter, Youtube, Tumblr, LinkedIn, Webpages, Gmail and many more
  • Reporting feature based on filter and data extraction
  • Data is forensically-sound in the process of cloud extraction
  • Patented web page authentication

3. Magnet AXIOM: Cloud Forensics

Magnet AXIOM offers a comprehensive solution for lawfully recovering and analyzing cloud-based evidence in various ways from suspects, victims, witnesses, and publicly available cloud sources, e.g. social media and webpages.

The social media and cloud extraction tool allow users to extract, recover, analyze and report on their cloud evidence and open-source intelligence (OSINT) data in one single case interface.

Cloud Support & Features

  • Support cloud extraction from over 50+ cloud services
  • Ability to import Warrant Returns formats from Internet Service Providers (ISPs)
  • Support ingestion of user-generated archive files from Facebook and Google (e.g. Google Takeout)
  • Gain access to cloud account via login credentials and 3rd party tokens and keychains

4. Cellebrite UFED Cloud


Since entering the mobile forensics industry in 2007, Cellebrite UFED has been the major player in this field for many years.

Cellebrite is an Israeli digital intelligence company focusing mainly on extracting data from mobile devices. The company has several offices across the world, including Washington D.C, Germany and Singapore.

One of Cellebrite’s product, the UFED Cloud, allow users to collect, preserve and analyze popular cloud services, social media data, instant messaging apps, web pages and many more.

Cloud Support & Features

  • Support over 50+ popular cloud services and social media sites
  • Lawful access to time-sensitive online evidence using cloud forensics methodology
  • Ability to import extracted cloud data into the UFED Digital Intelligence platform for further review and analysis
  • Ability to visualise data in a unified format, e.g. timeline format and maps format

5. MSAB XRY Cloud


MSAB is a Swedish company that specialises in using forensic technology for mobile device examination and analysis. The company’s main product is the XRY, their flagship mobile forensics software for extracting mobile data.

The company has a separate component product called the XRY Cloud, which is used to perform cloud forensics. XRY cloud can be used as a standalone tool or as part of the complete MSAB ecosystem suite of tools.

XRY Cloud offers two (2) modes of cloud extraction. First is the automatic mode, which requires the device to have online access to extract the app token, e.g. Facebook token. The second mode uses the usual login credentials (ID/password) and does not require the device’s presence.

Cloud Support & Features

  • Support over 50+ cloud services
  • Cloud extraction from Whatsapp, Snapchat, iCloud, Facebook, Google services, etc
  • Use of Cloud Tokens to gain access if login credentials cannot be obtained


5 BEST Mobile Phone Forensics Tools [Evidence Extraction]

Digital Forensics is an application of science to collecting, preserving, analysing, and presenting digital data. Mobile Forensics is a sub-branch under the scope of digital forensics, and it specializes solely in the forensic extraction of mobile devices (smartphones).

There are other sub-disciplines as well, such as cloud forensics, memory forensics and many more.

To examine a mobile device, one needs to overcome and understand the various types of chipsets used (e.g. MTK, Exynos, Snapdragon), the operating system (Android, iOS), the connectivity ports (e.g. USB Type-C), software security version, encryption used, etc.

Commercial tools largely dominate most of the mobile forensics software used in this industry. However, these companies invested heavily into the research & development (R&D) of gaining access to modern-day phones, developing support for thousands of mobile apps and parsing them nicely in an intuitive interface for their users.

What are the Best Mobile Forensics Tools?

Here are the five (5) best mobile forensics software tools used by law enforcement and private organisations worldwide.

1. Cellebrite UFED


Since entering the mobile forensics industry in 2007, Cellebrite UFED has been the market leader in this space for many years.

Cellebrite is an Israeli digital intelligence company focusing mainly on extracting data from mobile devices. The company has several offices across the world, including Washington D.C, Germany and Singapore.

The UFED capability is available on desktop computers (UFED4PC) and a standalone handheld console (UFED Touch2).

Cellebrite UFED – Key Features

  • Unlocking of mobile devices via pattern bypass and PIN locks
  • Perform logical, file system and physical extractions
  • Use of bootloaders, automatic EDL capability, smart ADB connection and more
  • Wide range of supported mobile devices across many different brands
  • Extract evidence from mobile phones, SIM cards, drones, SD cards, GPS devices and more

2. Oxygen Forensics


Like Cellebrite UFED, Oxygen Forensics is a Russian company headquartered in Alexandria, Virginia and provides mobile forensics capabilities to law enforcement, federal agencies and enterprises.

The forensic software is an all-in-one platform that can extract mobile forensic images, decode them and parse them in its interface for investigators to analyse quickly. Furthermore, multiple extractions can be investigated in a single Oxygen Forensic interface to have a complete picture of all the acquired data.

Oxygen Forensics – Key Features

  • File system level extraction on most mobile devices
  • Drone forensics possible
  • Bypass screen lock on popular Android devices
  • Cloud extraction – Acquire data from cloud services and storage
  • Support import of call data records



MSAB is a Swedish company that specialises in using forensic technology for mobile device examination and analysis. It offers frontline extraction support (i.e. rugged forensic kit model) and forensic lab solution (i.e. software, kiosk or tablet form).

The company’s product is designed to recover and analyze the contents of a digital device in a forensically secure manner and offers three (3) different products, namely;

MSAB ProductFunction
XRYThe extraction of the mobile device and the decoding & indexing of the mobile data
XAMNThe analysis, reporting and filtering of the extracted data
XECThe digital forensics management solution for seamless data distribution between users, locations, departments and other agencies.

MSAB XRY – Key Features

  • Logical and Physical examinations of over 40,000+ mobile devices and app profiles
  • GPS & Memory card examination
  • File Signature Analysis
  • Support for Chinese chipsets

4. Hancom MD-NEXT


Hancom has been a Korean company specialising in forensic mobile device extraction since 2005. It offers an integrated digital and mobile forensic solution that supports over 15,000+ mobile phones, particularly Korean-made brands such as Samsung and LG.

The company offers three (3) mobile forensics software, namely;

MD-NEXTThe data extraction software for mobile devices, wearables, drones, IoT devices, etc
MD-REDThe analysis software for data recovery, examination and reporting of the extracted data
MD-LIVEThe first responder software for live data extraction and analysis from mobile devices

Hancom MD-NEXT – Key Features

  • Supports data acquisition for various global smartphone manufacturers (Samsung/Apple/LG/HTC/ZTE etc.) model
  • ADB Pro extraction: Supports data acquisition using vulnerability attacks from Android-based devices
  • Supports Android Live, MTP, iOS full filesystem Backup, Vendor backup protocol, Local backup, USIM
  • Supports Bootloader, Fastboot, MTK, QEDL, etc

5. MOBILedit Forensic


MOBILedit is an all-in-one solution for data extraction from mobile devices, smartwatches and cloud services. It has built-in security bypassing feature that allows users to acquire supported phone models without needing a pattern or pattern unlock.

Another valuable and unique feature is their open database of supported mobile apps. Users can quickly check against this database to see if MOBILedit current supports a particular app. If it doesn’t, there is a request button to ask the company to research that new app.

MOBILedit – Key Features

  • Physical and Logical data acquisition
  • Automated deleted data recovery
  • Cloud forensics acquisition, e.g. Google Drive, OneDrive, Instagram and many others
  • Integrates with camera ballistics technology to scientifically analyze photo origins
  • Concurrent extractions with the new 64-bit engine