Belkasoft X

The Unifying Digital Forensics, Incident Response, and E-Discovery Platform

Acquire, examine, analyze, and report on evidence faster and more comprehensively than ever before. Belkasoft X provides automated, in-depth artifact decoding across all major source types in one integrated tool.

contact us for a quote →

Unified Forensic Modules: Acquire Everything

Computer Forensics

Full support for Windows, macOS, and Linux systems. Analyze hard drives, disk images (E01, L01, RAW, VHD), virtual machines, and partitions. Recover data from all major file systems.

Mobile Forensics

Acquisition and analysis of iOS and Android devices, including logical, physical, agent-based extraction, checkm8 support, and advanced decryption for MTK devices. Supports over 1,500 mobile apps.

Cloud Forensics

Extract evidence securely from major cloud services: iCloud, Google Drive/Mail, Microsoft 365, Facebook, and messenger backups (WhatsApp, Telegram, etc.). Compliant and safe extraction methods.

RAM & Triage Forensics

Perform live memory acquisition (RAM dumping) and analysis to capture crucial volatile data like encryption keys, passwords, and active sessions. Includes fast field triage capabilities.


Deep Decoding: Revealing Hidden Mobile Evidence

Artifact Recovery for 3000+ Apps

Belkasoft X automatically detects, parses, and reconstructs data from over 3,000 application artifacts across all platforms. This includes complex databases, cache files, configuration records, and deleted data traces.

  • Supports popular and obscure apps, payment platforms, health trackers, and secure messengers.
  • Identifies and parses system files, registry keys, and operating system artifacts (Geolocation, Call History, Contacts).

SQLite and Carving Mastery

Unlocks critical evidence often missed by basic tools. The product features highly optimized SQLite viewers and advanced data carving to recover fragmented, deleted, or unallocated records from mobile databases and disk space.

Advanced iOS and Android Access

Go beyond simple logical backups. Belkasoft X provides keychain extraction on iOS, full file system access, and utilizes multiple acquisition methods to maximize data recovery from the latest encrypted and locked devices.

  • MTK Device Decryption and brute-force passcode cracking support.
  • Supports all major Android rooting methods and ADB acquisitions.

Encrypted and Protected Data Handling

Dedicated tools for decrypting protected containers. Belkasoft X can handle encrypted WhatsApp, Telegram, and Signal databases, as well as complex file system encryption (APFS, BitLocker).

Advanced AI and Specialized Forensics

Car and Drone Forensics

Specialized support for extracting and analyzing data from vehicle infotainment systems (Berla images) and flight logs, images, and telemetry data from various drone models.

Threat Hunting with YARA & Sigma Rules

Empowers Incident Response teams to quickly scan data sources against custom and industry-standard YARA and Sigma rules to identify known malware, threat patterns, and compromised systems.

OCR for Image Searchability

Automatically recognizes text within pictures, screenshots, receipts, and embedded document media (50+ languages supported), making visual content fully keyword searchable.

Remote Acquisition Module (Corporate IR)

Securely perform remote triage and data collection from Windows endpoints across the corporate network, ideal for fast, non-intrusive Incident Response investigations.

Cross-Case Search Functionality

Compare the current case evidence against completed cases to identify links, repeated contacts, or similar digital signatures, enabling powerful pattern-of-life analysis across investigations.

Analysis and Automated Triage

Connection Graph

Visually maps the relationships between users, files, and artifacts across different data sources. Instantly see who communicated with whom, when, and through which application.

Timeline Reconstruction

Reconstructs a comprehensive, chronological sequence of user activities from all loaded sources (mobile, computer, cloud), turning disparate data into a coherent story.

Smart Filtering and Triage

Drastically reduce case review time using dynamic filtering based on time, application type, hash sets, keywords, or data category. The quick triage feature allows instant assessment.

Hash Set Matching (NSRL/Custom)

Quickly identify known good (benign) and known bad (illicit) files using industry-standard hash sets like NSRL and custom hash databases, streamlining your analysis process.

BelkaGPT AI Integration (Optional)

Leverage an offline, secure AI assistant to quickly summarize data, ask context-aware questions about the evidence, and accelerate interpretation of complex artifacts.

Pornographic Content Detection

Automated image and video analysis to detect potential CSAM/illicit material using machine learning and visual categorization, providing critical intelligence quickly for time-sensitive cases.

Finalizing the Case: Reporting and Defensibility

Generate precise, court-ready reports effortlessly.

  • Customizable Reports in PDF, HTML, XML, and Excel formats.
  • Free Evidence Reader for sharing case data with non-technical staff or court members.
  • Forensically sound methodology ensuring data integrity and admissibility.
Inquire About Licensing & Editions