// case type
document forgery / disputed authenticity
is this PDF / docx genuine? revision history, metadata genealogy, ghost text, embedded objects, signature chains.
start here · primary tools
ordered. work top-down. the first tool is the suggested entry point for this case type.
- pdf object explorerdrop a PDF · parse raw object tree · detect embedded JavaScript · /Launch actions · encrypted streams · /EmbeddedFile · suspicious patterns · export report · runs locally
- pdf forensicsdrop a pdf · inspect objects and streams · extract javascript · embedded files · suspicious actions · object tree · malware analysis · runs locally
- pdf incremental update forensic analyzerdrop pdf file · detect and analyze incremental updates appended to the pdf · reconstruct the document modification history · surface what changed between each update · identify signature bypass attacks via incremental updates · runs locally
- pdf author and revision metadata deep analyzerdrop pdf file · extract all document information dictionary and xmp metadata · parse creation and modification timestamps · surface author software version revision count and producer chain · runs locally
- pdf digital signature chain analyzerdrop pdf file · extract and analyze all digital signatures · validate signature structure · reconstruct certificate chains · surface signer identity timestamps and what content was signed · runs locally
- office document version ghost content extractordrop doc xls ppt ole2 office files · scan free sectors · padding slack · recover ghost text from previous saves · runs locally
- document metadata genealogy tracerdrop related documents · trace ancestor versions through metadata · revision counts · author chains · template references · printer fingerprints · reconstruct document family history · runs locally
- tracked changes forensic reconstructordrop docx file · extract all tracked insertions deletions and format changes · reconstruct the full editing history by author · surface deleted content and identify who removed what · runs locally
also useful · secondary tools
supporting and follow-up tools. surface as the investigation widens.
- ooxml hidden content extractordrop docx xlsx pptx file · extract all hidden text rows columns slides and layers · surface content invisible in normal view · identify data intentionally hidden within the document structure · runs locally
- office coauthoring session artifact extractordrop docx xlsx pptx · coauthoring session data · user identity guids · session timestamps · edit attribution per section · survives track changes acceptance · runs locally
- office document revision history extractordrop docx xlsx pptx or odt file · extract full revision and version history metadata · reconstruct authorship timeline · surface who created modified and saved the document and when · runs locally
- embedded ole object extractordrop docx xlsx pptx or doc xls ppt file · extract all embedded ole objects · identify embedded documents executables and packages · compute hashes · surface embedded objects with suspicious types or contents · runs locally
- document template origin tracerdrop docx or dotx file · extract template attachment information · trace document lineage to original template · identify template server paths revealing organizational infrastructure · surface template metadata for attribution · runs locally
- document metadata inconsistency finderdrop docx xlsx pptx pdf · core app props vs pdf info · temporal author revision heuristics · tracked changes timeline · runs locally
- case report generatorfill in case number · examiner · dates · findings · drop evidence files for auto hash · generates structured forensic report PDF · runs locally
run as a stack
skip the click-through. these presets are curated forensic pipelines you can save as a stack with one click and run on your evidence locally.
document forgery — authenticity kit
8 stepsdrop disputed PDFs → object forensics → incremental updates → author metadata → stego surface scan → signature chain → genealogy → report
- 01evidence-manifest-generatorhash every PDF before any parsing — baseline for chain-of-custody
- 02pdf-forensicsobject tree, streams, embedded files, javascript actions
- 03pdf-incremental-update-analyzerdetect post-creation edits saved as incremental updates
- 04pdf-author-revision-metadata-analyzerauthor / producer / creation-modification timestamp conflicts
- 05pdf-stego-checkerwhitespace ratios, invisible text operators, stream trailer anomalies
- 06pdf-digital-signature-chain-analyzervalidate signature chains and certificate coverage
- 07document-metadata-genealogy-tracertrace metadata lineage across related documents in the input set
- 08case-report-generatordraft a report summarizing edit history + authenticity red flags
stego — image extract + sweep
5 stepsdrop PNG/BMP → LSB extract with options → brute-force common stego paths → report
- 01evidence-manifest-generatorhash images before extraction attempts
- 02lsb-stego-extractorconfigurable LSB bit extraction — magic header detection
- 03stego-brute-forcersweep OpenStego / SilentEye / LSB combo paths + optional wordlist file
- 04image-stego-detectorchi-square / RS statistical stego detection on decoded pixels
- 05case-report-generatordraft a report on extracted payloads and statistical stego signals