// case type
sextortion
extortion via real/fake intimate imagery. evidence is the threat channel + payment demand + (often) deepfake or scraped imagery.
start here · primary tools
ordered. work top-down. the first tool is the suggested entry point for this case type.
- email header analyzerpaste raw email headers · trace hop-by-hop routing · SPF · DKIM · DMARC · detect spoofing · visualize delivery path · runs locally
- ios imessage deletion artifact detectordrop ios sms.db · rowid gaps · join orphans · deleted_messages tombstones · ck_sync_state=2 · two-db guid compare · bulk deletion · runs locally
- iOS WhatsApp artifact forensic extractordrop iOS WhatsApp ChatStorage.sqlite and Contacts.sqlite · parse all chats, messages, groups, and media references · reconstruct conversation timelines with delivery status · surface location shares, contact cards, and deleted message placeholders · runs locally
- android whatsapp database forensic analyzerdrop an Android WhatsApp msgstore.db · parse all messages, chats, groups, and media metadata · reconstruct conversation timelines · surface message delivery status, forwarding metadata, location shares, and contact cards · detect deleted message gaps · runs locally
- ai generated image provenance analyzerpng tEXt chunk inventory · sd metadata · stripped metadata flag · provenance csv · runs locally
- face swap artifact detectordrop an image · jawline color mismatch · compression boundary heuristics · face-region signal table · runs locally
- bitcoin transaction decoderpaste raw transaction hex · decode inputs outputs scripts · fees · locktime · segwit · p2pkh p2sh p2wpkh · runs locally
- crypto tx graphpaste json csv btc hex · directed graph · hub peel fan patterns · ascii viz · stats · csv json export · runs locally
also useful · secondary tools
supporting and follow-up tools. surface as the investigation widens.
- ela image tampering detectordrop a JPEG · error level analysis · detect localized re-compression · flag tampered regions · visualize ELA map · runs locally
- prnu fingerprinterjpeg png sensor noise · residual fingerprint · pearson correlation · heatmap viz · LIKELY DIFFERENT · CSV · runs locally
- url redirect chain tracerpaste shortened URLs · trace full redirect chain via proxy · detect malicious redirects · show final destination · flag suspicious hops · runs locally
- domain reputation analyzerpaste domains or IPs · score by entropy · TLD risk · homoglyph detection · DGA patterns · punycode abuse · age heuristics · no external lookup · runs locally
- case report generatorfill in case number · examiner · dates · findings · drop evidence files for auto hash · generates structured forensic report PDF · runs locally
run as a stack
skip the click-through. these presets are curated forensic pipelines you can save as a stack with one click and run on your evidence locally.
sextortion — image + payment IOC kit
7 stepsdrop threat messages + suspect imagery → provenance + face-swap + stego → extract wallet/url IOCs → triage → report
- 01evidence-manifest-generatorhash messages + images before any analysis
- 02ai-generated-image-provenance-analyzerdetermine if imagery is likely AI-generated vs scraped authentic
- 03face-swap-artifact-detectorface-swap is the most common deepfake vector in sextortion cases
- 04image-stego-detectorcheck for hidden payloads embedded in the imagery itself
- 05ioc-extractorpull crypto wallets, payment URLs, and contact identifiers from message exports
- 06ioc-bulk-validatorscore payment-demand IOCs for escalation priority
- 07case-report-generatordraft a victim-advocate report linking imagery assessment to payment trail
sextortion — threat channel kit
7 stepsdrop threat messages + payment exports → header parse → iMessage deletion artifacts → IOC extract → btc decode → tx graph → report
- 01evidence-manifest-generatorhash threat messages + payment exports before analysis
- 02email-header-analyzerparse email threat headers when the extortion came via email
- 03ios-imessage-deletion-artifact-detectordetect deleted iMessage threads — victims often delete out of panic
- 04ioc-extractorpull crypto wallets, payment URLs, and contact handles from message exports
- 05bitcoin-tx-decoderdecode any raw BTC tx hex the victim captured from the payment demand
- 06crypto-tx-graphbuild a transaction graph from decoded wallet addresses
- 07case-report-generatordraft a victim-advocate report linking the threat channel to payment infrastructure