WetStone Technologies

Unfortunately, our new website relies on browser features that are not available in older versions of Internet Explorer. As Microsoft has officially stopped supporting these browsers, we have chosen to do the same. Instead, we recommend that you upgrade Internet Explorer if you are running Windows 7, 8, or 10, or that you download a newer browser, like Mozilla Firefox or Google Chrome.

We at WetStone Technologies thank you for your interest and your patience.

WetStone Technologies,
a Division of SiviSoft

WetStone Technologies: A division of Allen Corporation
WetStone Technologies: A division of Allen Corporation

Cyber Threat Analytics for EnCase®

C-TAK Datasheet
C-TAK Datasheet (Spanish)

This product is for demonstration purposes only. The full functionality and capabilities of C-TAK can be found in Gargoyle Investigator MP, our advanced malware discovery tool.

Extend your EnCase® evidence search with Cyber-Threat Analytics Knowledgebase (C-TAK). This technology provides examiners with high performance and accurate identification of cyber threats such as Trojans, Rootkits and Anti-forensics that may directly impact investigations. Not only can the presence and classification of these programs allow examiners to view suspects from a new perspective but paranoia level, suspect sophistication and covert behaviors can also be derived in searching for applications with a common theme. These behaviors can assist in assessing suspect capability, activities, intent, threat or “consciousness of guilt.”

C-TAK is an EnCase Application developed specifically for EnCase® AppCentral. C-TAK has been tested with EnCase Forensic 7.1.


C-TAK: includes the following datasets

  • Anti-Forensics
  • Botnet
  • Fraud Tool
  • Denial of Service
  • Encryption
  • Exploit Scanner
  • Keylogger
  • Password Cracking
  • Peer to Peer
  • Piracy
  • Remote Access
  • Rootkit
  • Scareware
  • Sniffer
  • Spyware
  • Toolkit
  • Trojan
  • Web Threat
  • Wireless Tool
  • Ransomware