// artifact family
document & media forensics
53 browser-only forensics tools in this catalog group — browse by artifact family when you know the kind of evidence you are working with, not the investigation pattern.
tools in this family
ordered as in the forensics catalog. every tool runs locally — no upload, no account.
- pdf object explorerdrop a PDF · parse raw object tree · detect embedded JavaScript · /Launch actions · encrypted streams · /EmbeddedFile · suspicious patterns · export report · runs locally
- pdf forensicsdrop a pdf · inspect objects and streams · extract javascript · embedded files · suspicious actions · object tree · malware analysis · runs locally
- pdf steganography checkerdrop a pdf · check whitespace · metadata · object streams · comment fields · hidden layers · invisible text · runs locally
- rtf analyzerdrop an rtf file · extract embedded objects · ole packages · equation editor objects · hex payloads · malware analysis · runs locally
- docx revision trackerdrop a .docx file · extract tracked changes · revision history · author metadata · comments · deleted text · insertion dates · runs locally
- word document revision extractordrop a docx file · extract revision history · tracked changes · added deleted moved · edit timeline · authors · csv export · runs locally
- ela image tampering detectordrop a JPEG · error level analysis · detect localized re-compression · flag tampered regions · visualize ELA map · runs locally
- jpeg recompression estimatordrop a JPEG · analyze quantization tables · estimate original quality · count recompression generations · detect double-compression artifacts · runs locally
- image steganography detectordrop an image · chi-square test · rs analysis · lsb extraction attempt · detect hidden data probability · runs locally
- lsb stego detectordrop a PNG or BMP · chi-square and RS analysis on LSBs · detect hidden data · flag suspicious distributions · runs locally
- audio steganography detectordrop an audio file · lsb analysis · echo hiding detection · phase coding detection · statistical anomalies · runs locally
- metadata consistency checkerdrop a JPEG · PNG · or video · compare EXIF date vs file date vs filename date vs GPS timestamp · flag inconsistencies · dimension mismatches · runs locally
- document metadata inconsistency finderdrop docx xlsx pptx pdf · core app props vs pdf info · temporal author revision heuristics · tracked changes timeline · runs locally
- audio edit detectordrop a WAV file · analyze spectral discontinuities · RMS energy shifts · noise floor changes · DC offset jumps · flag suspected splice points · runs locally
- video frame timestamp analyzerdrop an MP4 or WebM · step through frames · measure actual frame intervals · detect irregular timing · cut/splice indicators · frame drops · export timeline · runs locally
- video frame extractordrop an MP4 · MOV · WebM · extract frames at any timestamp or interval · download as PNG or ZIP · runs locally
- archive manifestdrop a ZIP archive · list all files without decompressing · sizes · paths · detect hidden executables inside archives · export CSV · runs locally
- pdf annotation extractordrop pdf · parse annots subtype contents rect · author modified · bad redaction text under redact · summary table · export csv · runs locally
- lsb stego extractorpng bmp · lsb bit depth 1-4 · channel order · entropy · magic bytes · hex dump · download payload · runs locally
- prnu fingerprinterjpeg png sensor noise · residual fingerprint · pearson correlation · heatmap viz · LIKELY DIFFERENT · CSV · runs locally
- face swap artifact detectordrop an image · jawline color mismatch · compression boundary heuristics · face-region signal table · runs locally
- gan fingerprint detectordrop an image · fft grid periodicity · color histogram anomalies · synthetic likelihood score 0–100 · runs locally
- video deepfake analyzerdrop a short video · sample frames · blink rate · face boundary flicker · temporal inconsistency score · runs locally
- copy-move forgery detectordrop an image · block-matching copy-move scan · suspicious region overlay · heuristic clone map · runs locally
- audio splice detectordrop audio · spectral flux discontinuities · candidate splice timestamps · timeline table · runs locally
- document language and authorship fingerprinterdrop text files · stylometry · dialect · native language hints · authorship similarity matrix · runs locally
- dicom medical imaging metadata forensic analyzerdrop dicom files · parse metadata tags · extract patient equipment data · detect anonymization failures · runs locally
- microsoft access database forensic analyzerdrop mdb or accdb files · parse jet database structure · extract tables · recover deleted records · vba macro scan · runs locally
- video container forensic analyzerdrop mp4 mov mkv avi files · parse container atom box structure · extract all metadata tracks · chapter marks · embedded thumbnails · creation tool information · detect container manipulation · timestamp inconsistencies · runs locally
- audio metadata deep forensic extractordrop mp3 flac wav ogg m4a aiff files · extract all metadata from id3v1 id3v2 apev2 vorbis comments riff info chunks itunes atoms · detect metadata tampering · creation tool fingerprinting · forensic timestamp analysis · runs locally
- document metadata genealogy tracerdrop related documents · trace ancestor versions through metadata · revision counts · author chains · template references · printer fingerprints · reconstruct document family history · runs locally
- pdf object stream mutation detectordrop a pdf · parse objects at raw binary level · detect post-creation mutations · incremental update abuse · prove tampered objects after signing · runs locally
- office coauthoring session artifact extractordrop docx xlsx pptx · coauthoring session data · user identity guids · session timestamps · edit attribution per section · survives track changes acceptance · runs locally
- spreadsheet formula dependency and data origin mapperdrop xlsx · full formula dependency graph · external sources · hidden sheets · named ranges · trace output cells to source data · runs locally
- document total editing time forensic analyzerdrop office documents · extract total editing time in minutes embedded by office · compare against claimed creation date and context · detect documents that were heavily worked on despite claiming to be quick drafts · surface time anomalies · runs locally
- office document revision history extractordrop docx xlsx pptx or odt file · extract full revision and version history metadata · reconstruct authorship timeline · surface who created modified and saved the document and when · runs locally
- pdf author and revision metadata deep analyzerdrop pdf file · extract all document information dictionary and xmp metadata · parse creation and modification timestamps · surface author software version revision count and producer chain · runs locally
- document geolocation metadata extractordrop docx xlsx pptx pdf or any office file · extract gps coordinates embedded in document images and metadata · reconstruct where the document was created or edited · surface all location-bearing artifacts · runs locally
- tracked changes forensic reconstructordrop docx file · extract all tracked insertions deletions and format changes · reconstruct the full editing history by author · surface deleted content and identify who removed what · runs locally
- ooxml hidden content extractordrop docx xlsx pptx file · extract all hidden text rows columns slides and layers · surface content invisible in normal view · identify data intentionally hidden within the document structure · runs locally
- document template origin tracerdrop docx or dotx file · extract template attachment information · trace document lineage to original template · identify template server paths revealing organizational infrastructure · surface template metadata for attribution · runs locally
- pdf incremental update forensic analyzerdrop pdf file · detect and analyze incremental updates appended to the pdf · reconstruct the document modification history · surface what changed between each update · identify signature bypass attacks via incremental updates · runs locally
- word fast-save artifact extractordrop doc file · extract fast-save residual text blocks · recover deleted text preserved in the binary structure · surface authorship artifacts hidden in the binary word document · runs locally
- embedded ole object extractordrop docx xlsx pptx or doc xls ppt file · extract all embedded ole objects · identify embedded documents executables and packages · compute hashes · surface embedded objects with suspicious types or contents · runs locally
- document language and locale forensic analyzerdrop docx xlsx pptx or pdf file · extract all language and locale settings · identify mismatches between claimed and actual language · surface locale artifacts revealing author's system settings · runs locally
- document comment and annotation extractordrop docx xlsx pptx or pdf file · extract all comments annotations and notes · reconstruct reviewer identities and timestamps · surface deleted comments and resolve comment threads · runs locally
- office macro artifact analyzerdrop docm xlsm pptm or legacy doc xls ppt · extract vba macro code · identify suspicious patterns · surface autorun macros shell commands and obfuscation · runs locally
- document thumbnail forensic extractordrop docx xlsx pptx or doc xls ppt pdf file · extract embedded thumbnail images · recover document preview snapshots · surface thumbnail content that may differ from the current document state · runs locally
- custom xml part artifact parserdrop docx xlsx pptx file · extract all custom xml parts · parse structured data bound to document content · surface hidden organizational metadata server paths schema namespaces and injected data · runs locally
- pdf form field artifact extractordrop pdf file · extract all interactive form fields · recover submitted field values · surface pre-filled hidden and calculation fields · reconstruct form submission state · runs locally
- rtf control word forensic analyzerdrop rtf file · parse rtf control words and groups · extract document metadata · detect suspicious control sequences · surface embedded objects ole content and obfuscated payloads · runs locally
- document recovery artifact extractordrop docx xlsx or doc file · extract auto-recovery and backup metadata · identify document recovery file paths · surface machine names and usernames embedded in recovery artifact information · runs locally
- pdf digital signature chain analyzerdrop pdf file · extract and analyze all digital signatures · validate signature structure · reconstruct certificate chains · surface signer identity timestamps and what content was signed · runs locally