// artifact family

android location & sensor

10 browser-only forensics tools in this catalog group — browse by artifact family when you know the kind of evidence you are working with, not the investigation pattern.

tools
10
catalog slugs
10
processing
local · in browser

tools in this family

ordered as in the forensics catalog. every tool runs locally — no upload, no account.

  1. android gps location history forensic extractordrop Android location databases, GNSS logs, fused location provider artifacts, or app location exports · parse GPS coordinates, timestamps, accuracy, altitude, speed, and provider metadata · reconstruct a chronological movement trail · flag high-confidence GPS fixes and suspicious location gaps · runs locally
  2. android cell tower location artifact analyzerdrop Android telephony databases, radio logs, dumpsys outputs, or logcat excerpts · parse cell tower identifiers, network operator data, signal strength, and timestamped radio events · reconstruct coarse location history from cellular infrastructure · surface roaming, SIM changes, and tower handoff patterns · runs locally
  3. android wifi location artifact forensic extractordrop Android WiFi configuration files, scan result logs, network suggestion databases, or connectivity bugreports · parse SSIDs, BSSIDs, signal strength, connection timestamps, and saved network metadata · reconstruct WiFi-based location history and proximity evidence · runs locally
  4. android google timeline artifact forensic extractordrop Google Timeline JSON, Takeout location history files, semantic location history exports, or Maps activity artifacts · parse places, visits, activity segments, coordinates, confidence values, and edit metadata · reconstruct Google-derived movement history · runs locally
  5. android geofence artifact forensic extractordrop Android geofencing databases, Google Play Services artifacts, app preference files, or logcat excerpts · parse registered geofences, trigger events, radius, dwell transitions, and app ownership · identify which apps monitored which physical locations · runs locally
  6. android activity recognition artifact forensic analyzerdrop Android activity recognition logs, Google Play Services artifacts, fitness exports, or app databases · parse inferred user activity states such as walking, running, cycling, driving, still, and tilting · reconstruct activity timelines and correlate movement states with location evidence · runs locally
  7. android step counter artifact forensic extractordrop Android sensor logs, Google Fit exports, Samsung Health exports, fitness app databases, or step counter CSVs · parse step counts, cadence, timestamps, device source, and daily totals · reconstruct walking activity and detect anomalies in step accumulation · runs locally
  8. android accelerometer artifact forensic extractordrop Android accelerometer logs, sensor CSVs, app databases, or bugreport sensor output · parse x/y/z acceleration samples, timestamps, sampling frequency, and derived motion events · detect movement bursts, impacts, orientation changes, and sensor gaps · runs locally
  9. android significant motion artifact forensic extractordrop Android significant motion sensor logs, motion trigger events, activity recognition artifacts, or app databases · parse wake/motion triggers that indicate the device changed from stationary to moving · reconstruct motion-start events and correlate them with location and activity evidence · runs locally
  10. android google fit forensic artifact extractordrop Google Fit Takeout exports, fitness databases, Health Connect files, or related JSON/CSV artifacts · parse workouts, steps, distance, calories, heart rate, activity segments, and source devices · reconstruct fitness activity timelines and identify device/source inconsistencies · runs locally
ready