Unfortunately, our new website relies on browser features that are not available in older versions of Internet Explorer. As Microsoft has officially stopped supporting these browsers, we have chosen to do the same. Instead, we recommend that you upgrade Internet Explorer if you are running Windows 7, 8, or 10, or that you download a newer browser, like Mozilla Firefox or Google Chrome.

We at WetStone Technologies thank you for your interest and your patience.


C-TAK Datasheet
C-TAK Datasheet (Spanish)

  • Extend your EnCase® evidence search
  • Identify Trojans, Steganography, Rootkits and Anti-forensics

Extend your EnCase® evidence search with Cyber-Threat Analytics Knowledgebase (C-TAK). This technology provides examiners with high performance and accurate identification of cyber threats such as Trojans, Steganography, Rootkits and Anti-forensics that may directly impact investigations. Not only can the presence and classification of these programs allow examiners to view suspects from a new perspective but paranoia level, suspect sophistication and covert behaviors can also be derived in searching for applications with a common theme. These behaviors can assist in assessing suspect capability, activities, intent, threat or “consciousness of guilt.”

C-TAK is an EnCase Application developed specifically for EnCase® AppCentral. C-TAK Version 2.0 has been tested with EnCase Forensic 7.1.


C-TAK Free Trial includes the following datasets:

  • Trojans
  • Keyloggers
  • Rootkits

C-TAK Version 2.0 includes the following datasets

  • Anti-Forensics
  • Botnet
  • Fraud Tool
  • Denial of Service
  • Encryption
  • Exploit Scanner
  • Keylogger
  • Password Cracking
  • Peer to Peer
  • Piracy
  • Remote Access
  • Rootkit
  • Scareware
  • Sniffer
  • Spyware
  • Steganorgaphy
  • Toolkit
  • Trojan
  • Web Threat
  • Wireless Tool
  • Randsomware

For free trial please click here..

To purchase C-TAK Version 2.0, please contact sales.