![]() ![]() Added the ability to select drives and partitions for live extraction. Added the ability to decrypt passwords, tokens and cookies collected from other user profiles and computer images. Added the ability to set the path to OCB files in the Account owner information window. Added the ability to extract the last view date of Google Drive files. Updated the ability to extract the full file system and keychain via checkm8 from iOS devices with iOS versions 12-14. Updated WhatsApp files extraction via Android Agent. Updated data extraction from Discord via Android Agent. Updated the ability to extract keychain from Apple iOS devices with versions 14.0-14.3 via iOS Agent. Redesigned the extraction method for Spreadtrum-based Android devices. Added selective chat extraction from Discord via Android Agent. Added the interface improvements to the selective extraction of iOS devices using the checkm8, iOS Agent and SSH methods. Added the ability to extract data from iPhone 14, iPhone 14 Plus, iPhone 14 Pro and iPhone 14 Pro Max via iTunes backup procedure. Added the ability to extract encryption keys stored in the Android Keystore of Android devices based on the Qualcomm chipsets: MSM8917, MSM8937, MSM8940, MSM8953. Added the ability to bypass screen lock and decrypt data from MTK-based Android devices having TEE Kinibi and full-disk encryption (FDE). Added the ability to bypass screen lock and decrypt data from Android devices having TEE Trusty, File-Based-Encryption (FBE) and based on the following MTK chipsets: MT6765, MT6580. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |