4/21/2023 0 Comments What is evernote v.5.8.6![]() ![]() Added the ability to extract the history of Vim usage on Linux. Added the ability to extract the history of apt usage on Linux. Added the ability to extract the history of commands entered in the terminal on Linux. Added the ability to extract Dock elements from macOS. Added the ability to collect ARP cache on macOS and Linux during live system extraction. Added the ability to collect the information about running processes on macOS and Linux during live system extraction. Added the ability to collect diagnostic data from Windows. Added the ability to extract Background Intelligent Transfer Service (BITS) data on Windows. Added the extended information about data search progress. Added extended analysis of live RAM that now includes memory pages from pagefiles. Updated extraction of Wi-Fi points from Android Cloud Data. Updated data extraction from Google My Activity. ![]() Updated data extraction from Google Home. ![]() Updated data extraction from Google Chrome. Updated the ability to authorize in MiFit. Updated the ability to authorize in Huawei services. Added the ability to extract data from LastPass via login and password or token. Added the ability to extract Telegram group chats with enabled topics via Android Agent. Added the ability to extract additional information from Firefox browser via Android Agent: collections, saved cards, logins and passwords and addresses. Added the ability to extract the full file system and keychain via checkm8 from Apple iOS devices based on the A7-A10 chipsets and running iOS versions 12.5.7 and 15.7.3. Added the ability to extract the full file system and keychain via checkm8 from Apple iOS devices based on the A10 chipset and running iOS 14 and 15 without disabling the screen lock. Added the ability to extract the full file system and keychain via iOS Agent from iOS devices running iOS versions 15.0 - 15.4.1. Added the ability to extract hardware keys and decrypt data from Huawei devices based on the Qualcomm SDM450 chipset. Added the ability to extract hardware keys and decrypt data from Motorola devices based on the MediaTek MT6765 chipset, having FBE and running Android OS 10-12. Added the ability to extract hardware keys and decrypt data from Huawei devices based on the Mediatek MT6765 chipset and running Android OS 10. Added the ability to extract hardware keys and decrypt data from Samsung devices based on the Mediatek Helio G80 chipset and having TEE TEEGRIS. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |