XRY 9.4.3 From MSAB

Hold the phone… and the drone, and the GPS device, and the disk! Upon receiving MSAB’s software product XRY v9.4.3 and its compatible viewer, XAMN v6.1, we had full intentions of pulling out and dusting off a few of our … Read more

The Integrated Future Of Mobile Forensics

A mobile device is a goldmine of data; in an era where 98% of investigations involve some form of digital evidence and data volumes continue to grow exponentially, having the most advanced mobile forensic tools at your disposal – from … Read more

XRY V9.3 From MSAB

Digital forensic practitioners have been largely focused on mobile devices since the advent of the smart phone. Through the virtually countless generations of Apple, Android, Blackberry, Windows and legacy phones, the forensic analysis community has learned that the data contained … Read more

MSAB: Top 10 Updates Of 2020

The top 10 most valuable updates of 2020, from MSAB:

  1. 32,931 supported profiles
  2. Including iOS 14, Samsung A & J series, Huawei Mediatech devices and LG Qualcomm devices
  3. Checkm8 exploit is now integrated in XRY
  4. New connected device screen capture
Read more

MSAB New Release: XRY 9.3, XAMN 5.3 And XEC 6.2

Added support to bypass locked Samsung Galaxy Exynos devices in XRY, new conversation view in XAMN, plus major improvements in network support in XEC.

We are happy to announce that the new versions of XRY, XAMN and XEC represent a

Read more

How To Use The Categories Filter In XAMN

Welcome to this quick how-to guide explaining how to work with the Categories filter within XAMN. Categories filter is a powerful tool that is built into the heart of XAMN to help you quickly identify artifacts of a specific type … Read more

Upgraded XRY 9.2.1 And XAMN 5.2.1 Now Available

Greater Checkm8 extraction support for iOS, improved decoding of Warrant returns and much more.

Today’s XRY 9.2.1 and XAMN 5.2.1 releases arrive with across the board improvements.

Release highlights:

The XRY integrated jailbreak tool, based on the checkm8 exploit, now

Read more
Share to...