// artifact family
android location & sensor
10 browser-only forensics tools in this catalog group — browse by artifact family when you know the kind of evidence you are working with, not the investigation pattern.
tools in this family
ordered as in the forensics catalog. every tool runs locally — no upload, no account.
- android gps location history forensic extractordrop Android location databases, GNSS logs, fused location provider artifacts, or app location exports · parse GPS coordinates, timestamps, accuracy, altitude, speed, and provider metadata · reconstruct a chronological movement trail · flag high-confidence GPS fixes and suspicious location gaps · runs locally
- android cell tower location artifact analyzerdrop Android telephony databases, radio logs, dumpsys outputs, or logcat excerpts · parse cell tower identifiers, network operator data, signal strength, and timestamped radio events · reconstruct coarse location history from cellular infrastructure · surface roaming, SIM changes, and tower handoff patterns · runs locally
- android wifi location artifact forensic extractordrop Android WiFi configuration files, scan result logs, network suggestion databases, or connectivity bugreports · parse SSIDs, BSSIDs, signal strength, connection timestamps, and saved network metadata · reconstruct WiFi-based location history and proximity evidence · runs locally
- android google timeline artifact forensic extractordrop Google Timeline JSON, Takeout location history files, semantic location history exports, or Maps activity artifacts · parse places, visits, activity segments, coordinates, confidence values, and edit metadata · reconstruct Google-derived movement history · runs locally
- android geofence artifact forensic extractordrop Android geofencing databases, Google Play Services artifacts, app preference files, or logcat excerpts · parse registered geofences, trigger events, radius, dwell transitions, and app ownership · identify which apps monitored which physical locations · runs locally
- android activity recognition artifact forensic analyzerdrop Android activity recognition logs, Google Play Services artifacts, fitness exports, or app databases · parse inferred user activity states such as walking, running, cycling, driving, still, and tilting · reconstruct activity timelines and correlate movement states with location evidence · runs locally
- android step counter artifact forensic extractordrop Android sensor logs, Google Fit exports, Samsung Health exports, fitness app databases, or step counter CSVs · parse step counts, cadence, timestamps, device source, and daily totals · reconstruct walking activity and detect anomalies in step accumulation · runs locally
- android accelerometer artifact forensic extractordrop Android accelerometer logs, sensor CSVs, app databases, or bugreport sensor output · parse x/y/z acceleration samples, timestamps, sampling frequency, and derived motion events · detect movement bursts, impacts, orientation changes, and sensor gaps · runs locally
- android significant motion artifact forensic extractordrop Android significant motion sensor logs, motion trigger events, activity recognition artifacts, or app databases · parse wake/motion triggers that indicate the device changed from stationary to moving · reconstruct motion-start events and correlate them with location and activity evidence · runs locally
- android google fit forensic artifact extractordrop Google Fit Takeout exports, fitness databases, Health Connect files, or related JSON/CSV artifacts · parse workouts, steps, distance, calories, heart rate, activity segments, and source devices · reconstruct fitness activity timelines and identify device/source inconsistencies · runs locally