Oxygen Forensic® Detective

The universal, all-in-one platform for extracting, decoding, and analyzing data from every digital source—mobiles, computers, cloud services, drones, and IoT. Uncover hidden evidence faster and more comprehensively than ever before.

Oxygen Forensic Detective multi-screen interface

Unmatched Digital Evidence Acquisition Spectrum

From mobile devices to remote computers, OFD covers every modern evidence source with forensically sound extraction methods.

Complete Mobile Coverage

Access data from thousands of devices, including iOS, Android, and feature phones, with advanced extraction methods.

Cloud & IoT Forensics

Extract crucial evidence from over 15 cloud services and various IoT/Drone sources, including backups, file systems, and app data.

Computer Artifacts (KeyScout)

Collect user data, application activity, and system files from Windows, macOS, and Linux endpoints using the integrated KeyScout utility.

Universal Import & Parsing

Import and process raw images, JTAG/Chip-Off dumps, proprietary media card images, and all major third-party backup formats.

Data Correlation Engine

Automatically link data and user activities across all extracted sources (mobiles, computers, and clouds) to build a unified case.

Advanced Decryption

Powerful tools to bypass screen locks, decrypt backups, and recover inaccessible data from encrypted devices and archives.

Deep Dive: Advanced Extraction Technologies

Accessing the deepest levels of data across all major mobile platforms and chipsets.

1. Multi-Level Android Acquisition

OFD supports the full range of data depth for Android:

  • Logical: Quick, user-level data collection via standard protocols.
  • Physical: A complete sector-by-sector data dump for full disk forensic imaging.
  • Full File System (FFS): Access to application sandbox data often hidden from logical dumps.
  • Android Agent: An on-device method for high-privilege, non-intrusive data collection.

2. Specialized iOS and Apple Extraction

OFD offers a multi-tiered approach for Apple devices, ensuring maximum data recovery:

  • Logical Extraction: Standard and encrypted iTunes backups, plus device file browsing.
  • Full File System (FFS): Advanced extractions for both locked and unlocked devices (using checkm8 and other exploits).
  • Decryption: Decrypting encrypted iTunes and iCloud backups.
  • Wearables: Targeted recovery from Apple Watch backups.

3. Comprehensive Android Chipset Support

Acquisition methods are tailored to bypass security measures on devices with difficult chipsets:

  • MediaTek (MTK) and Spreadtrum (SPD): Direct data access and low-level routines.
  • Qualcomm (EDL Mode): Dedicated routines for deep physical recovery.
  • Kirin (Huawei): Targeted methods for complex Huawei chipsets, maximizing data access.
  • Universal Flashing/Bypassing: Automated workflow for placing devices into the correct forensic state.

4. Multi-Format Backup & Image Parsing

Import and process a vast array of proprietary and standard digital evidence formats for comprehensive analysis:

  • Raw Images: Supports physical disk images, JTAG/Chip-Off images, and proprietary media card dumps.
  • Mobile Backups: Imports iTunes, Android backups, and full file system dumps.
  • Data Integrity: Automatic hash verification and chain-of-custody logging.

Core Analytical Power for Rapid Case Resolution

Turn massive volumes of raw data into actionable intelligence with integrated analytical tools.

5. Consolidated Timeline and Key Events

Automatically reconstruct a unified chronological timeline of all user activities, merging events from mobile, cloud, and computer sources into one powerful, filterable view.

  • Filter by date, time, source, and event type (e.g., chats, calls, web history).
  • Identify patterns and anomalies quickly across different devices.

6. Geospatial Mapping and Trajectory Analysis

Visualize collected location data (GPS, Wi-Fi logs, geotagged media) from all sources on integrated maps to track movements, identify visited locations, and analyze travel history.

  • Reconstruct complex travel paths and timelines.
  • Overlay cell tower and Wi-Fi access point locations.

7. Advanced Application Data Parsing

Dedicated and constantly updated modules support decoding data from thousands of proprietary apps, including encrypted messaging, health trackers, and financial tools.

  • Supports recovery of deleted chat history and attachments.
  • Frequent updates for new apps, versions, and operating system changes.

8. Deep Web and Darknet Exploration

Specialized extraction and analysis capabilities for investigating web pages and hidden services accessed via Tor, I2P, and other deep web browsers.

  • Automatic decryption and parsing of darknet artifacts.
  • Recovers data from obscure web caches and specific log files.

Multimedia and Security Analysis Modules

Leverage AI and specialized tools to process complex visual data and detect threats.

9. Facial Recognition and Gallery Analysis

Analyze collected photos and videos using integrated facial recognition technology to automatically identify, group, and tag individuals across multiple devices and image sources.

  • AI-powered grouping reduces manual review time significantly.
  • Detection of specific visual content categories for triage.

10. Malware and Spyware Detection

Identify known malicious apps, spyware, and hacking tools present on the device by performing checks against an integrated malware database and analyzing application permissions.

  • Integrated malware database checks for rapid identification.
  • Detailed reporting on suspicious permissions and app activity.

11. Dedicated Drone Forensics Module

Specialized parsing for popular UAV/Drone log files (DJI, Parrot, Yuneec, etc.) to reconstruct flight paths, operator location, media captured, and telemetry data.

  • Visualization of flight paths and operator location on maps.
  • Essential for investigating accidents and unauthorized surveillance.

12. Court-Ready Reporting and Export

Generate reports in multiple formats (PDF, XLS, XML) with full control over data presentation, including the necessary audit trails and hash verification to ensure evidence integrity and admissibility.

  • Customizable report templates for various legal requirements.
  • Secure, verifiable evidence export with metadata.

Ready to Enhance Your Digital Forensics Capabilities?

Contact our sales team today to learn how Oxygen Forensic Detective can transform your investigations.

Contact Us for a Quote