An investigative tool designed to show every single byte of an SQLite database or WAL file along with its decoded data.
Key Features
Modern operating systems typically contain many sqlite databases (often in excess of 100), SQLite Recovery can be used to display all of them alongside each other allowing the investigator to gain an overview of the type and content of all of the databases on the suspects computer.
Key Features
SQLite Forensic Explorer is an investigative tool designed to show every single byte of an SQLite database or WAL file along with its decoded data.
Key Features
Forensic Browser for SQLite allows you to do the following — All without having to type a single line of SQL:
Forensic Browser for SQLite contains browser extensions that:
Modern operating systems typically contain many sqlite databases (often in excess of 100), SQLite Recovery can be used to display all of them alongside each other allowing the investigator to gain an overview of the type and content of all of the databases on the suspects computer. These databases can contain anything from SMS messages to lists of passwords and are an invaluable source of evidence.
SQLite Recovery is a forensic tool to aid in the recovery of SQLite databases, tables and records. SQLite Recovery can search a disk, volume, image or file for deleted SQLite databases.
The output of SQLite Recovery is individual sqlite databases that can be investigated with other forensic software such as SkypeAlyzer.
Features
Basic Operation of SQLite Recovery
SQLite Recovery searches multiple carved databases irrespective of the table schemas:
SQLite Forensic Explorer is an investigative tool designed to show every single byte of an SQLite database or WAL file along with its decoded data. This means you can look at any field in the DB/WAL file header and see what it means, or you can look at an index B-Tree page and see each structure within the page decoded.
SQLite Forensic Explorer provides an unparalleled view into the structure and workings of SQLite at a file level and is invaluable to forensic investigators looking for deleted data (or a corrupt database) or to those who simply want to know more about the structure of a database.
In the display below the unused space in this interior table (actually a root B-Tree page) is highligted in the hex view in grey. The highlighted byte at offset 106 is the start of the payload data for this SQLite record, SQLite Forensic Explorer has identified this as from the Skype messages table and has displayed the decoded row in table form, as below: