Built by an investigator who presents evidence in court
LexHound wasn't built by a software company trying to learn forensics. It was built by a forensic examiner and former global law firm CISO who got tired of explaining to litigation partners why forensic exports weren't in a format anyone could actually review.
Every design decision — from keyword search with KWIC context to Relativity-compatible export — comes from real court-facing engagements, not product roadmap speculation.
30+
Years Experience
KWM
Former CISO
20+
Parsers
NSW
Licensed
WHAT LEXHOUND IS NOT
Not a physical extraction tool.
Not a raw data dump tool.
LexHound does not perform physical extraction, bypass lock screens, or image-locked devices. If you require advanced acquisition from a locked, damaged, or unsupported device, tools such as Cellebrite, GrayKey, or Elcomsoft may still be required.
LexHound focuses on logical acquisition and structured analysis. It can create an encrypted iTunes/Finder backup from a connected device, enabling recovery of a broader range of artefacts than standard unencrypted backups.
WHAT LEXHOUND IS
A workflow bridge between forensic acquisition and litigation review.
LexHound converts iPhone backup data, including encrypted backups created directly from a connected device, into structured, searchable and exportable evidence. Enabling faster and more efficient evidence review from acquisition to analysis.
With features such as timeline views, keyword search with context (KWIC), tagging and export options tailored for litigation, LexHound streamlines the review of mobile evidence. This eliminates the need for investigators and legal teams to manage raw databases and plist files.
LexHound is built in native Swift for macOS, with no cloud dependencies. No data leaves your machine.
What matters most in mobile forensics for litigation
💬
Messages & Chat Apps
SMS, iMessage, WhatsApp, and Viber conversations with full thread reconstruction, timestamps, and deleted message recovery where artefacts remain.
📍
Location Timeline
GPS data from photos, app-level location logs, and corroborating sources (Weather app cities, significant locations) mapped to a unified timeline.
🔐
Encrypted Backup Decryption
Native Swift implementation of two-round PBKDF2 decryption. No external dependencies. Works with iTunes and Finder backups.
🔍
Keyword Search
Full-text search across all artefacts with KWIC context.
Relativity compatible.
📊
Unified Timeline
Canvas-based rendering of all parsed artefacts on a single timeline. Filter by type, date range, or keyword hit.
🏷️
Tagging & Case Scoping
Case-scoped tagging with SHA256 evidence hashing. Tag across parsers with consistent artefact IDs.
📋
Litigation-Ready Export
CSV, HTML, PDF, and Relativity-compatible export. Chain of custody documentation generated automatically.
From backup file to courtroom
LexHound fits into existing forensic workflows — it doesn't replace your extraction tools, it makes their output useful for lawyers.
Acquire
Acquire an iPhone backup using Cellebrite, GrayKey, iTunes, or Finder. Encrypted or unencrypted.
Analyse
LexHound parses, decrypts, and structures the backup. Keyword search. Timeline reconstruction.
Review
Tag relevant artefacts. Scope to case. Filter by date, participant, keyword, or artefact type.
Export
Generate litigation-ready output. CSV, HTML, PDF, or load into Relativity for broader document review.
Where we're headed
LexHound is under active development. Early access users provide feedback that helps shape upcoming capabilities.
Current
iOS Backup Analysis
Full iPhone backup parsing, encrypted backup decryption, keyword search, timeline view, and litigation-ready export.
Next
Enhanced Reporting
Automated report generation, relationship mapping across communication channels, and expanded export templates.
Planned
Android Support
Extending forensic analysis to Android device backups with the same structured analysis and export workflow.
Get early access to LexHound
We're accepting a limited number of early access users from forensic practices, law firms, and litigation support teams. Early access includes priority onboarding and the opportunity to help shape upcoming capabilities.
Frequently Asked Questions
The Legal Cyber Brief — monthly cyber intelligence for law firm leaders.