

Recommended for general investigators and border agents, Triage-Responder is available on a USB dongle and can run scans on both live and dead computers.

Collected data can be viewed immediately or stored for later analysis. Using ADF’s ActivitySensor, it scans a suspect drive and divides files into four categories: high value, preferred location, allocated and deleted. It includes many of the same features as Triage-G2, including the ability to scan SD cards and external digital media, and the creation of SearchPaks. Triage-Examiner provides a solution for forensic examiners and trained investigators. It also includes a stealth mode for investigating live computers.
#AMPED FIVE PROFESSIONAL REVIEWS SOFTWARE#
Triage-G2 supports multiple software platforms including Windows, Mac and Linux.

Preconfigured search profiles make it easy for non-technical operators to use. The software is deployed using a small USB drive that can be prepared beforehand or in the field. Triage-G2 is aimed at military and intelligence agents, and can be used to set up customised scans, including the creation of search profiles and SearchPaks.
#AMPED FIVE PROFESSIONAL REVIEWS FULL#
FTK can also analyse flesh tones, shapes and orientation for explicit image detection, and analyse suspect binaries without requiring a full malware team. Its data visualisation options include timeline screenshots formatted for inclusion in case reports, and graphical representations of between-domain communications. Please contact us with any additions or amendments to this list, thank you.įorensic Toolkit (FTK) is a database-driven software which performs a wide variety of functions including forensic imaging, registry analysis, decryption of files and password cracking.
