Thor Forensics

An Expert in
Digital Forensics & Cybersecurity

About Us

Thor Forensics

Previously known as Vector Forensics, we specialize in uncovering digital evidence with precision, integrity, and reliability.

In an era where cyber threats, data breaches, and digital fraud are increasingly sophisticated, our expertise in Digital Forensics, Incident Response, and Cybersecurity Investigations empowers businesses, law enforcement, and legal professionals to track, analyze, and present digital evidence effectively.

At Thor Forensics, we are committed to delivering precise, reliable, and court-admissible digital forensic solutions. Our expertise, technology, and approach set us apart in the field of cybercrime investigations and digital evidence analysis.

World Renowned Solutions

The forensic products we distribute have been adopted by law enforcement and intelligence agencies in over 30 countries and regions, including Hong Kong, Macau, Singapore, Malaysia, Indonesia, and Ethiopia.

Latest Technology

We've cultivated a distinguished team of R&D experts, sourced from both domestic and international enterprises. Continually pushing the boundaries of technology, we maintain our leading position within the industry.

KEY PRODUCTS WE DISTRIBUTE:

Edit Content

The combination of functions and integrated hardware gives the device all-round forensic capabilities, including computer forensics (including duplication, imaging, system emulation, and storage medium forensics), and mobile phone forensics (3-way mobile phone forensics can be collected in parallel, and it also has mobile phone unlocking, mirroring, backup, and root capabilities functions), IoT forensics (for routers), car forensics (for car entertainment and navigation systems), video acquisition

 

Computer forensics

Disk duplication and imaging, system emulation, storage medium forensics. Supports duplication, emulation, analysis, and also supports duplication without disassembling the machine.

Data fixation capability

It can duplicate and fix plug – in hard drives, the fastest speed can reach 56GB/min, and it has the ability of hard drive mirroring and image fixing without disassembly, solving the problem of data fixation for notebook hard drives that cannot be disassembled.

Mobile phone forensics

3-way mobile phone parallel forensics

It supports 3 – channel mobile phones and collects evidence. For the scenario like forgetting password and cannot directly connect to collect evidence, it also provides functions such as mobile phone unlocking, mirroring, backup and root, and supports forensic analysis of more than 500 applications.

Video Acquisition and Surveillance Acquisition

Supports video acquisition of imaging and monitoring hard drives, safe and fast

Supports filtering and searching videos by time, channel selection, etc., and pre – playing

Financial analysis 

Supports more than 400 types of financial software, more than 600 versions, and more than 5,000 interfaces for accounting data collection, analysis, display, penetration query, one – click query, and financial doubt analysis.

Intelligent Insight

Through rapid analysis of the inspection materials involved in the case, extract the content involved and provide investigation clues for the case.

Edit Content
Lyra 600 is a practical and innovative digital forensics tool that enables quick and easy evidence collection from iOS and Android smartphones. It empowers non-technical users to take screenshots, record screens with audio, and selectively retrieve partitions, files, and apps, including photos, audio, video, documents, and other files stored on mobile devices.
 
 
Edit Content

This mobile forensics equipment is used in labs and on sites. It supports acquiring data of more than 98% smartphones and supports the analysis and recovery of more than 100 mobile apps, which meets the investigation requirement on phones for law enforcement agencies. 

 

Edit Content

With case management as the core, Orion-300 provides online management for the entire process ranging from clue discovery, case filing, investigation plan, investigation implementation, investigation report, processing execution, to case closure. This system significantly enhanced the efficiency of case handling, office work, and management.

 

Edit Content

Feature target recognition and tracking system. it can efficiently and accurately help users find targets and movement trajectories in videos, thereby improving the efficiency of video investigation work. 

 

Edit Content
PC Forensics Expert integrates various functions, including automated forensics, data recovery, search, and report generation.
 
It facilitates intelligent forensics work with minimal technical requirements for investigators.
 
This system is indispensable for digital forensics professionals.

 
 
Edit Content

As an all-encompassing data recovery expert, Fornax-2000 seamlessly integrates computer, obile phone, video, database recovery, and data repair technologies.

 
Edit Content

An intelligent email analysis system for high-speed acquisition and parsing of massive emails, focusing on key emails and analyzing email correspondence. Focus on full-text content search, key emails, flexible filtering condition combinations,the analysis of correlation relationship between email accounts,the whole process of sending and receiving emails in key events.

 

Edit Content

The UAV-1200 Drone Forensics Tool is a single End-to-End Drone Forensic software solution to Extract & Analyze data stored in Drone.

Proper drone forensics methodology

ACQUISITION: Collect target digital evidence, including media files, data, and EXIF information, and create forensic images

ANALYSIS: Utilize advanced data decoding techniques to systematically reconstruct flight operations and activity trajectories, generating actionable intelligence and forensic evidence

REPORTING: Automatically generate reports, freeing investigators to uncover the truth

Extensive drone data support

Supports drone data formats, including SD card contents, images, and folder structures

Analyzes activity data (GPS coordinates, altitude, speed, etc. from flight logs of DJI, FreeFlight,  XRIO

Examines images and information captured by drone sensors during flights, providing insights into flight zones and targets

Flight path reconstruction

Visually reconstructs drone trajectories using flight logs and sensor data to pinpoint activities at specific times and locations

Services

Our Practice Areas

Computer Forensics

What we refer to as Digital Forensics. We have a full lab facility including best of breed software such as Magnet Axiom to ensure that we deliver time after time with the most presentable, user friendly results to our lab processes.

Cellular Phone Analysis

The knowledge that critical evidence exists and rests within a handset is a cause of frustration if one cannot access it in a forensically sound manner.

Cellular Phone Debugging

In most spyware or malware cases, you will not notice your device is infected because it will be operating silently in the background, is barely noticeable and can disguise itself as an authentic application.

Certified Fraud Examiner Services

Looking for a CFE in South Africa to conduct digital fraud investigations? We offer digital forensics services that can strengthen and protect your organisation.

Cyber Investigations

Business hubs such as Cape Town, Pretoria and Johannesburg are awash with crime syndicates who have perfected the art of identity theft and online fraud. All Cyber Crime Investigations including Business Email Compromise, extortion, Invoice scams and fraud are welcome.

Cyber Penetration Testing

Within the realm of network and online security it is often necessary to conduct penetration tests in a controlled manner to highlight network vulnerabilities.

Device Acquisition

When there is suspicion of fraud or malfeasance, it is often prudent to acquire a forensically sound image of a drive as a matter of urgency.

Due Diligence Investigations

With rising levels of fraud, tender rigging, fronting and other commercial crimes in South Africa, it is imperative that a due diligence is conducted.

Hacking Recovery

Hacking is a reality of online connectivity. In a marketplace where businesses are heavily dependent on online access to data as well as services to conduct business.

FAQ

Frequently Asked Questions

There’s much more to Forensic Investigation than just the title. While we often see conventional “PI’s” using the title, this is incorrectly done.

A Forensic Investigator applies scientific principles and methodology to the investigative task. In most Forensic Investigators you will find an underlying scientific discipline. This could be data-science, medical science etc. however there will be a scientific basis upon which their investigative efforts rest.

In South Africa a Forensic Investigator will typically have an underlying qualification in perhaps law, auditing, computer sciences or similar. In addition to these, they will hold an investigative certification which could be as a Certified Fraud Examiner (CFE) or Forensic Practitioner (FP)SA for example.

It more than matters – it’s vital. Membership of the appropriate bodies means that the Forensic Investigator that you’re dealing with has been vetted as competent in their area of expertise – and most importantly that they are bound by a code of conduct and ethics.

You should ideally look for Forensic Investigators with the CFE or (FP)SA certifications who are able to show that their certifications are current and up to date (yes, they do expire if not regularly maintained).

You should ideally look for Forensic Investigators with the CFE or (FP)SA certifications who are able to show that their certifications are current and up to date (yes, they do expire if not regularly maintained).

Much depends on the length and complexity of the engagement as well as the level of experience of the investigator. Rates can vary from R 950/ hour to R 3000/hour depending on experience and their underlying skills and qualifications.

This is what separates Forensic Investigators from general investigators. The key is in the methodical approach, clear and direct findings as well as intricate cross reference to timelines and source/ evidentiary documentation. When drafting the report, your Forensic Investigator knows full well that the report will probably end up in court and he will need to substantiate each finding within it. These are meticulously drafted documents and each investigators formatting, and construction of his report will vary from the next. This is where the experience of the investigator shines through.

Testimonials

What Our Clients Say About Us

Vector Forensics provided us with a detailed forensic analysis that was crucial for our case. Their expertise and professionalism exceeded our expectations. Highly recommended!

Michael R

The team at Vector Forensics handled our cybersecurity breach with precision and efficiency. Their in-depth investigation helped us identify vulnerabilities and strengthen our security.

Sarah L

We needed a fast turnaround on a forensic investigation, and Vector Forensics delivered. Their insights were invaluable, and their report was thorough and easy to understand.

James T

We've partnered with Vector Forensics multiple times, and they never disappoint. Their forensic reports are well-documented and stand up in court, making them a trusted resource for legal cases.

Emily W

From recovering lost data to analyzing cyber threats, Vector Forensics has been an essential partner for our company. Their attention to detail and professionalism set them apart.

David M

Contact Us

Contact Us:

Location

Cape Town, South Africa.

Message Here

Scroll to Top