Forensic Explorer (FEX)

About Forensic Explorer™


Forensic analysis software


Suitable for new or experienced investigators, Forensic Explorer combines a flexible and easy to use GUI with advanced sort, filter, keyword search, data recovery and script technology. Quickly process large volumes of data, automate complex investigation tasks, produce detailed reports and increase productivity. Manage all aspects of the investigation, including:


  • File System Analysis
  • Keyword & Index Search
  • Live Boot Virtualization
  • Email
  • Registry
  • Report

Key Features


PDFforensic-explorer-facts-sheet (English)


  • Forensic Explorer includes a stand-alone licenses of: FEX-Triage, FEX-CLI and Mount Image Pro (MIP)
  • No major version upgrade costs (valid maintenance give access to the latest build).


Software features include:



In built Cisco Clam anti-virus.

Artificial Intelligence

Forensic Explorer uses advanced AI-powered image recognition and delivers high detection accuracy with near-zero false positives. Includes a CSAM detection addon for law enforcement.


Bookmark, flag, or categorize potential evidence.

Case Management:

Create, save and load case files.

Data Access:

Access all areas of physical or imaged media at a file, text, or hex level. View and analyze system files, file and disk slack, swap files, print files, boot records, partitions, file allocation tables, unallocated clusters, etc.

Data Carving:

Inbuilt data carving tool to carve more than 300 known file types.

Data Views:

Powerful data views including: 

  • File List: Sort and multiple sort files by attribute, including, extension, signature, hash, path and created, accessed and modified dates.
  • Disk: Navigate a disk and its structure via a graphical view. Zoom in and out to graphically map disk usage.
  • Gallery: Thumbnail photos and image files.
  • Display: Display more than 300 file types. Zoom, rotate, copy, search. Play video and music.
  • Filesystem Record: Easily access and interpret FAT and NTFS records.
  • Text and Hexadecimal: Access and analyze data at a text or hexadecimal. Automatically decode values with the data inspector.
  • File Extent: Quickly locate the location of files on disk with start and end sector runs.
  • Byte Plot and Character Distribution: Examine individual files using Byte Plot graphs and ASCII character distribution.


Email support for PST, OST, EDB, MBOX formats. Full keyword and index search capabilities for email.


Export files to disk, or direct to .L01 forensic evidence files.


Detach drag and drop views for a customized work-space on multiple monitors. Save and load personal work-space configurations to suit investigative needs.


Apply hash sets to a case to identify or exclude known files. Hash individual files for analysis. 

  • Crypto: MD5, SHA1, SHA256, CRC
  • Similarity: Fuzzy, Differential
  • PhotoDNA, ProjectVic


Built-in DTSearch index capability.

Keyword Search:

Cluster, sector, or byte level keyword search of entire media using text, regex or hex expressions.


Forensic Explorer is Unicode compliant. Investigators can search and view data in native language format such as Dutch or Arabic.

Language GUI:

FEX GUI language can be set to EN, DE, ES, FR, ID, TR, ZH on install (language option set in registry).


Extract and report file metadata, including EXIF, GPS, MS Office and more.

Mount (MIP):

Mount forensic image files as a Windows drive letter (Mount Image Pro). Full access to deleted, system, unallocated, etc. Full CLI capabilities.


Work with physical or forensically imaged RAID media, including software and hardware RAID, JBOD, RAID 0, RAID 5, RAID 6.


Recover deleted folders and partitions.


Open and examine Windows registry hives. Filter, categorize and keyword search registry keys. Automate registry analysis.


Custom report builder with pre-defined reporting templates.


Inbuilt powerful Delphi scripting language. Inbuilt scripts for: 

  • Metadata
  • Registry
  • Skin-tone
  • Timeline

Servlet (Network):

Connect to and examine remote drives using a deploy-able network servlet.

Shadow Copy:

Easily add and analyze shadow copy files. Learn more about Forensic Explorer Shadow Copy Volumes.


Forensic Explorer can automatically verify the signature of every file in a case and identify those mismatching file extensions.


Automatically triage and report on common forensic search criteria.

Virtual Live Boot:

Virtualize Windows and MAC forensic image and physical disks using VirtualBox or VMWare.

Yara Rules

Yara rules enable investigators to quickly and efficiently identify malware and other forms of malicious software within digital evidence. By leveraging Yara Rules, examiners can apply a set of customizable, text-based rules that are designed to match specific data characteristics.