Thor Forensics
Previously known as Vector Forensics, we specialize in uncovering digital evidence with precision, integrity, and reliability.
In an era where cyber threats, data breaches, and digital fraud are increasingly sophisticated, our expertise in Digital Forensics, Incident Response, and Cybersecurity Investigations empowers businesses, law enforcement, and legal professionals to track, analyze, and present digital evidence effectively.
At Thor Forensics, we are committed to delivering precise, reliable, and court-admissible digital forensic solutions. Our expertise, technology, and approach set us apart in the field of cybercrime investigations and digital evidence analysis.
World Renowned Solutions
The forensic products we distribute have been adopted by law enforcement and intelligence agencies in over 30 countries and regions, including Hong Kong, Macau, Singapore, Malaysia, Indonesia, and Ethiopia.
Latest Technology
We've cultivated a distinguished team of R&D experts, sourced from both domestic and international enterprises. Continually pushing the boundaries of technology, we maintain our leading position within the industry.
KEY PRODUCTS WE DISTRIBUTE:
The combination of functions and integrated hardware gives the device all-round forensic capabilities, including computer forensics (including duplication, imaging, system emulation, and storage medium forensics), and mobile phone forensics (3-way mobile phone forensics can be collected in parallel, and it also has mobile phone unlocking, mirroring, backup, and root capabilities functions), IoT forensics (for routers), car forensics (for car entertainment and navigation systems), video acquisition

Computer forensics
Disk duplication and imaging, system emulation, storage medium forensics. Supports duplication, emulation, analysis, and also supports duplication without disassembling the machine.
Data fixation capability
It can duplicate and fix plug – in hard drives, the fastest speed can reach 56GB/min, and it has the ability of hard drive mirroring and image fixing without disassembly, solving the problem of data fixation for notebook hard drives that cannot be disassembled.
Mobile phone forensics
3-way mobile phone parallel forensics
It supports 3 – channel mobile phones and collects evidence. For the scenario like forgetting password and cannot directly connect to collect evidence, it also provides functions such as mobile phone unlocking, mirroring, backup and root, and supports forensic analysis of more than 500 applications.
Video Acquisition and Surveillance Acquisition
Supports video acquisition of imaging and monitoring hard drives, safe and fast
Supports filtering and searching videos by time, channel selection, etc., and pre – playing
Financial analysis
Supports more than 400 types of financial software, more than 600 versions, and more than 5,000 interfaces for accounting data collection, analysis, display, penetration query, one – click query, and financial doubt analysis.
Intelligent Insight
Through rapid analysis of the inspection materials involved in the case, extract the content involved and provide investigation clues for the case.

This mobile forensics equipment is used in labs and on sites. It supports acquiring data of more than 98% smartphones and supports the analysis and recovery of more than 100 mobile apps, which meets the investigation requirement on phones for law enforcement agencies.

With case management as the core, Orion-300 provides online management for the entire process ranging from clue discovery, case filing, investigation plan, investigation implementation, investigation report, processing execution, to case closure. This system significantly enhanced the efficiency of case handling, office work, and management.

Feature target recognition and tracking system. it can efficiently and accurately help users find targets and movement trajectories in videos, thereby improving the efficiency of video investigation work.


As an all-encompassing data recovery expert, Fornax-2000 seamlessly integrates computer, obile phone, video, database recovery, and data repair technologies.

An intelligent email analysis system for high-speed acquisition and parsing of massive emails, focusing on key emails and analyzing email correspondence. Focus on full-text content search, key emails, flexible filtering condition combinations,the analysis of correlation relationship between email accounts,the whole process of sending and receiving emails in key events.

The UAV-1200 Drone Forensics Tool is a single End-to-End Drone Forensic software solution to Extract & Analyze data stored in Drone.
Proper drone forensics methodology
ACQUISITION: Collect target digital evidence, including media files, data, and EXIF information, and create forensic images
ANALYSIS: Utilize advanced data decoding techniques to systematically reconstruct flight operations and activity trajectories, generating actionable intelligence and forensic evidence
REPORTING: Automatically generate reports, freeing investigators to uncover the truth
Extensive drone data support
Supports drone data formats, including SD card contents, images, and folder structures
Analyzes activity data (GPS coordinates, altitude, speed, etc. from flight logs of DJI, FreeFlight, XRIO
Examines images and information captured by drone sensors during flights, providing insights into flight zones and targets
Flight path reconstruction
Visually reconstructs drone trajectories using flight logs and sensor data to pinpoint activities at specific times and locations

Services
Our Practice Areas
Computer Forensics
What we refer to as Digital Forensics. We have a full lab facility including best of breed software such as Magnet Axiom to ensure that we deliver time after time with the most presentable, user friendly results to our lab processes.

Cellular Phone Analysis
The knowledge that critical evidence exists and rests within a handset is a cause of frustration if one cannot access it in a forensically sound manner.

Cellular Phone Debugging
In most spyware or malware cases, you will not notice your device is infected because it will be operating silently in the background, is barely noticeable and can disguise itself as an authentic application.

Certified Fraud Examiner Services
Looking for a CFE in South Africa to conduct digital fraud investigations? We offer digital forensics services that can strengthen and protect your organisation.

Cyber Investigations
Business hubs such as Cape Town, Pretoria and Johannesburg are awash with crime syndicates who have perfected the art of identity theft and online fraud. All Cyber Crime Investigations including Business Email Compromise, extortion, Invoice scams and fraud are welcome.

Cyber Penetration Testing
Within the realm of network and online security it is often necessary to conduct penetration tests in a controlled manner to highlight network vulnerabilities.

Device Acquisition
When there is suspicion of fraud or malfeasance, it is often prudent to acquire a forensically sound image of a drive as a matter of urgency.

Due Diligence Investigations
With rising levels of fraud, tender rigging, fronting and other commercial crimes in South Africa, it is imperative that a due diligence is conducted.

Hacking Recovery
Hacking is a reality of online connectivity. In a marketplace where businesses are heavily dependent on online access to data as well as services to conduct business.

FAQ
Frequently Asked Questions
There’s much more to Forensic Investigation than just the title. While we often see conventional “PI’s” using the title, this is incorrectly done.
A Forensic Investigator applies scientific principles and methodology to the investigative task. In most Forensic Investigators you will find an underlying scientific discipline. This could be data-science, medical science etc. however there will be a scientific basis upon which their investigative efforts rest.
In South Africa a Forensic Investigator will typically have an underlying qualification in perhaps law, auditing, computer sciences or similar. In addition to these, they will hold an investigative certification which could be as a Certified Fraud Examiner (CFE) or Forensic Practitioner (FP)SA for example.
It more than matters – it’s vital. Membership of the appropriate bodies means that the Forensic Investigator that you’re dealing with has been vetted as competent in their area of expertise – and most importantly that they are bound by a code of conduct and ethics.
You should ideally look for Forensic Investigators with the CFE or (FP)SA certifications who are able to show that their certifications are current and up to date (yes, they do expire if not regularly maintained).
You should ideally look for Forensic Investigators with the CFE or (FP)SA certifications who are able to show that their certifications are current and up to date (yes, they do expire if not regularly maintained).
Much depends on the length and complexity of the engagement as well as the level of experience of the investigator. Rates can vary from R 950/ hour to R 3000/hour depending on experience and their underlying skills and qualifications.
This is what separates Forensic Investigators from general investigators. The key is in the methodical approach, clear and direct findings as well as intricate cross reference to timelines and source/ evidentiary documentation. When drafting the report, your Forensic Investigator knows full well that the report will probably end up in court and he will need to substantiate each finding within it. These are meticulously drafted documents and each investigators formatting, and construction of his report will vary from the next. This is where the experience of the investigator shines through.
Testimonials
What Our Clients Say About Us
Vector Forensics provided us with a detailed forensic analysis that was crucial for our case. Their expertise and professionalism exceeded our expectations. Highly recommended!