Elcomsoft Forensic Disk Decryptor

Accesses the data stored in locked BitLocker, FileVault 2, PGP, and TrueCrypt

3.2 on 11 votes

0/5 stars
License: Shareware $599
Total downloads:5,262 (29 last week)
Operating system:Windows XP/7/8/10
Latest version:2.14
Screenshot collage for Elcomsoft Forensic Disk Decryptor


Analyzes the PC and its data to extract the cryptographic keys from RAM captures, hibernation and page files and uses the plain-text passwords to decrypt files and folders that are stored in crypto containers or encrypted mounted drives. Supports BitLocker, BitLocker To Go, FileVault 2, PGP and TrueCrypt volumes.

Elcomsoft Forensic Disk Decryptor 2.14 is free to download from our software library. The Elcomsoft Forensic Disk Decryptor installer is commonly called EFDD.exe. The current installer available for download occupies 35.2 MB on disk.

Elcomsoft Forensic Disk Decryptor is suitable for 32-bit versions of Windows XP/7/8/10. The most popular versions of the program are 2.1, 2.0 and 1.1. The program is categorized as Security Tools. This tool was originally developed by ElcomSoft Co. Ltd. This download was scanned by our built-in antivirus and was rated as malware free.

From the developer:

Instantly access data stored in encrypted BitLocker, FileVault 2, PGP, TrueCrypt and VeraCrypt containers. The tool extracts cryptographic keys from RAM captures, hibernation and page files or uses plain-text password or escrow keys to decrypt files and folders stored in crypto containers or mount encrypted volumes as new drive letters for instant, real-time access.

You may want to check out more software, such as Elcomsoft Phone Viewer, Elcomsoft Phone Breaker or Elcomsoft eXplorer for WhatsApp, which might be related to Elcomsoft Forensic Disk Decryptor.


Thank you for rating the program!
Please add a comment explaining the reasoning behind your vote.
Your vote:
amina Last year

This software can save open to my BitLocker recovery folder or the damage my data

Reply Was it helpful? yes | no (+1)
Latest update: