·.·. Computer forensics software made in Germany .·.·

X-Ways Forensics Add-Ons

Automate investigative tasks and extend the functionality of X-Ways Forensics with so-called X-Tensions.
The programming interface (API) is fully documented here.


Publicly downloadable and commercially available X-Tensions that we know of are listed below. We list 3rd party X-Tensions here just for your information and convenience, not for endorsement or to assume responsibility. Neither the X-Tensions nor their descriptions here have not been checked by X-Ways in any way. Please be advised that X-Tensions are files that contain executable code that is run with the same rights as the host application. The executable code could do something very useful or unintended or malicious.

by Jamie Sharpe

Source Code

Tested with v21.0

Assists in reducing the number of false positive keyword hits in a Simultaneous Search where bytes are read before and after the keyword, and a percentage is calculated on printable characters [printable meaning > 0x20]. If the percentage is over a user's threshold, then the keyword is marked positive, otherwise it is removed as a hit. The reason this was developed is due to the large amounts of false positives when a keyword term is rather small, less than 5 characters for example.

Exponent LoadReady
by API Forensics Inc.

Part of the Exponent bundle. Creates 'load-ready' productions from selected files within your case file. Packaged evidence, using industry compliant formatting, provides time-saving and accurate ingestion by highly trusted E-discovery platforms. Other platforms are also likely supported, however only Relativity has been tested.

Exponent Faces
by API Forensics Inc.
v19.3 or later required

Part of the Exponent bundle. Exponent Faces implements leading-edge commercial facial recognition technology (in use by military and police organizations), directly within X-Ways Forensics, to detect, match and extract faces from photographs and video files. Quickly and accurately identify victims, missing persons and persons of interest within volumes of collected media, including security surveillance video.

Exponent CloudMail
by API Forensics Inc.
v19.3 or later required

Part of the Exponent bundle. IMAP e-mail collection from 3rd service providers that include, but are not limited to, Microsoft, Google, AOL, Yahoo and Zoho. The collection process is conducted in real-time, right from within an active X-Ways Forensics case file. Aggregate enterprise mail (e.g., Outlook PST files) with web mail and search everything at the same time, with just one tool! Some of the exciting features which help law enforcement, particularly with search warrants, include: • Filter specific messages using any combination of keywords and GREP expressions. • Powerful AND/OR logic makes it possible to further narrow the field of search. • Perform keyword searches of common email fields such as From, To, Subject, CC, BCC, Body, Headers and attachment filenames. • Target any combination of mailbox sub-folders (aka: Labels for Gmail) on the remote server (e.g., Inbox, Sent Items, custom folders). • Narrow the scope of your search using date ranges of when messages were sent. Demonstration video.

Exponent MobileMessaging
by API Forensics Inc.
v19.3 or later required

Part of the Exponent bundle. Imports SMS, MMS and iMessages, including available Instagram Direct Messages (for iOS devices) directly into X-Ways Forensics from Android and iOS devices that have been acquired by 3rd party mobile forensic software tools. In addition, standalone iTunes Backups are also supported for message extraction.  

Exponent MobileMedia
by API Forensics Inc.
v19.3 or later required

Part of the Exponent bundle. Imports pictures and videos into X-Ways Forensics from Android and iOS devices that have been acquired by 3rd party mobile forensic software tools. In addition, standalone iTunes Backups are also supported. Demonstration video.

by Polito Inc.

Github Link
tested on 64-bit versions from 19.3 to 20.5

Allows you to look up hashes of files to determine if the files are malicious, unknown, or benign.

by X-Ways
any version
(but see text file for remarks)

Sends a simple command to either the main window of X-Ways Forensics or the active data window or one of its component windows, for example to close the currently active case or to close all data windows. Could be useful because it can also be run from the command line.

Hash Exporter
by Polito Inc.

Github Link
v19.9 or later required

Helps automate hash extraction. Completely command line based. This is especially useful if we are processing a large number of images or need to perform a CPU intensive processing on faster hardware. X-Ways does not currently have a way to automate the creation of a unique file of hashes.

Yara Scanner
by Chris Mayhew
v19.9 SR-7 or later required

There are many benefits to running YARA within X-Ways, versus running YARA via the command-line interface:

  • No need to mount the target media, the X-Tension will read each file within the case snapshot into memory and be scanned there. No files are written to disk.

  • Allows the user to use the powerful filters within X-Ways to limit the scope of the YARA scan.

  • Because the X-Tension uses the power of X-Ways, YARA will scan all files within the current snapshot. This includes carved files, decompressed archives, files within archives within archives etc.

  • Any confirmed YARA hits will be saved back to X-Ways via the comments and Report Table columns, vs stdout (which can get unruly quickly if scanning a mounted drive).

by Ted Smith
v19.1 or later required

Enables Optical Character Recognition (OCR) of picture file types in X-Ways Forensics.
[Note from X-Ways: Superseded by more internally performed OCR meanwhile.]

by Polito Inc.

Github Link
tested on 64-bit versions up to 19.9

Allows you to check hashes against Opswat Metadefender's 40 plus antivirus databases.

ASL Viewer
by Yuya Hashimoto
v19.9 SR-6 or later required

This is a Viewer X-Tension that parses and previews the selected Apple System Log (asl) file.

Fuzzy Hash
by Yuya Hashimoto
v19.9 SR-1 or later required

Calculates fuzzy hash values for each item in the volume snapshot, utilizing the API of the ssdeep project.

Shannon Entropy
by Yuya Hashimoto
v19.9 SR-1 or later required

Calculates the Shannon Entropy for each item in the volume snapshot.

by Ted Smith
v16.5 or later required

Automate extraction of common file types to a container, with source code.

by Ted Smith
v18.9 or later required

Generates summary information, with source code.

by Ted Smith
v18.9 or later required

X-Ways Forensics to Relativity Injestion, with source code.

Griffeye XML export
by Ruslan Yushaev
32 Bit, 64 Bit
v17.6 or later required

Allows you to export images and videos from X-Ways Forensics in the C4All format. You can then import the XML indexes in Griffeye Analyze.

GetFileReputation & SubmitFile
by Polito Inc. in partnership with ReversingLabs

Github Link

One is an X-Tension for ReversingLabs (RL) hash lookups. This is useful for quickly triaging a file hash or multiple file hashes at once, to help determine whether the hash is known or not and whether the underlying file is malicious or not. Screenshot of the result. The other X-Ways extension is for submitting files to RL, which is handy when the hash is not found in the RL database (e.g., unknown). You will need to be a ReversingLabs customer with valid RL API credentials and keys to use the extensions.

by Bradley Schatz

Not based on the X-Tension API, but the Image I/O API. Listed here anyway on request. Allows to interpret AFF4 images as disks in X-Ways Forensics, just like raw images, .e01, VHD, VHDX, VMDK

Griffeye Export
by Chris Lees

X-Tension that does a special export of data. Currently available to law enforcement users from the X-Ways download server, in the same directory as the PhotoDNA functionality.

by Alexander Kuiper
v18.1 or later required

Viewer X-Tension that allows you to use digital image processing algorithms to enhance pictures from within X-Ways Forensics.

PDF Compatibility
by Ruslan Yushaev
32 Bit, 64 Bit

Fixes a print bug (missing text when printing certain PDF documents) in the Oracle OutsideIn viewer component that was found by Ruslan Yushaev and reported to Oracle by X-Ways on May 21, 2017. The X-Tension is a viewer X-Tension that intervenes in preview and printing and returns the result of the following GhostScript command back to X-Ways Forensics:
gs -sDEVICE=pdfwrite -dNoOutputFonts -dCompatibilityLevel=1.5 -r150 -dQUIET -dSAFER -o <output file> <input file>

The option -dNoOutputFonts is the key in this case.

The X-Tension requires the library gsdll64.dll of the latest GhostScript version:

by Alexander Kuiper
v18.1 or later required, v19.1 or later recommended

Identifies and converts RAW files created by modern digital cameras.


Detection by file header signature: ARW, CR2, CRW, DCR, FFF, MOS, MRW, NEF, NRW, ORF, PEF, RAF, RAW, RW2, RWL, SRW, X3F


KPF a.k.a. C4All
by Steve Frawley

Download Directory
X-Tension Information

C4All Forum
(to download the latest version and for more information)

Youtube videos: 1, 2, 3

For more information please check elsewhere, for example in the C4All Forum. Thanks.

v18.8 or later recommended

"C4All is a program used by law enforcement and others to categorize pictures and videos.

This X-Tension is for Users of C4All. The guides that are included describe how to best use the X-Tension with the Strategy hash sets, but your own hash sets can be used. Also it is based on the file types (video and pictures) that C4All presently uses and searches for.

With this X-Tension, you will be able to process with the speed of X-Ways, and be completing most of the C4Prep stage all at once (like skin tone % and video stills).

Benefits of the X-Tension
-speed, fewer steps to follow than original C4All process
-even faster if ran locally and saved locally. upto 30GB min speeds on SSD drives observed.
-crash protection. Use X-Ways ability to resume if there is a crash during preparation of data.
-If X-Tension is interrupted there is the option to resume, start new or if needed just make new XML file
-ability to filter out irrelevant files and false positive carved files before C4All extraction.
-Hash sets are connected to X-Ways and not SQL server. This allows for known irrelevant or good files to be excluded from extraction. Also SQL Express can be used (free) as the only database used would be a local database and would not grow to be to large.
-These hash sets are transferable by simply copying the folder and pointing X-Ways to storage location. No need to wait all day for Database to be created.
-ability to use your own hash sets. upto 65,000+ separate hash sets.
-Better resulting folder structure, especially when run against many evidence objects in one case.
-Results can be extracted from C4All in hashkeeper format to be easily brought back in to X-Ways case. no need to run Encase book marking enscript.
-thumbnails are extracted from files that include thumbnails or are created by X-ways due to original picture size. If thumbnails exist in a file it is not used twice, reducing duplicate files.
-When processing, all functions of X-Ways are available during X-Tension run phase.
-Able to use X-Ways reporting features for court and presentation.
-video stills extracted using free mplayer or forensic framer from within X-Ways"

Binary Large Object X-Tension
by Christopher Lees

This X-Tension is used to extract Binary Large Object (BLOB) data from Sqlite databases.
This is data, such as picture or movie files, which can difficult to carve out of database files due to the way the database file is structured.
The X-tension will create a child folder for each table within the database that contains a BLOB field.
The data will then be extracted into this folder, the name of the file is the SQLite BLOB field name combined with the Primary Key Field (or ROWID if no primary key).
All the extracted data will also be added to a report table so that it can be processed if required. This is a good idea when looking for picture files as they often start a few bytes in.

See text file for more information.

BeyondCompare X-Tension
by Chad Gough

Allows an examiner to select any two files in X-Ways and quickly send them to Beyond Compare for review. Beyond Compare, from Scooter Software, is a 3rd party file comparison tool that has built-in support/viewers for the comparison of binary/hex, tab and comma separated files, graphic/image files, registry data, source code, executables, Microsoft Word/Excel, and Adobe PDF documents. Plug-ins for additional file types can be downloaded from here.

This X-Tension is free for both personal and commercial use and requires Microsoft?s .Net Framework v3.5 and a valid license/installation for Beyond Compare.

Note: Although this X-Tension was specifically designed for use with Beyond Compare, in theory any application that takes two file names as arguments from the command line should work (i.e. program.exe file1 file2).

VirusTotal X-Tension
by Chad Gough
v16.9 and later

Allows an examiner to check the status of a file via the VirusTotal API directly through X-Ways Forensics and get the status in the messages window. Note that this does not submit the file to VirusTotal, it only checks to see if an existing report exists for a given file's hash value and retrieves the results. All checks are performed via SSL. Developed and tested with X-Ways Forensics 17.7, but should work with any version past v16.9. Based on Chad Gough's own C# adaption of the X-Tension API. Requires Microsoft's .Net Framework v3.5 and a valid public (or private) API key from VirusTotal which can be obtained for free from here.

Luhn Credit Card Check
by X-Ways Software Technology AG
32-bit, 64-bit
all versions

Can be used during GREP searches for credit card numbers. Verifies all search hits using the Luhn algorithm and discards false search hits, to reduce the output of irrelevant numbers. Load the X-Tensioon in the dialog window of the simultaneous search. If you believe that our X-Tension does not correctly employ the algorithm and lets too many false hits pass through, convince yourself here that the Luhn algorithm is weak (enter one of the numbers that you get and that looks like not a valid credit card number, and click "Validate Luhn"). Last updated April 13, 2012. Source code included in our C++ API download.

Multiple File Finder
by Werner Rumpeltesz

Can search for filenames and/or path names and add the matching files to a specific report table. Additionally, files can be exported and automatically renamed in different ways. After finishing the search, external applications can be run to take over the further analysis of the exported files.

[Note from X-Ways: Mostly superseded meanwhile by the ability to load multiple .settings files in a single step?]



If you have created an X-Tension, please contact us and provide (in English):

Thank you very much.