Forensic Power.
Zero Leaks.
The only 100% offline analysis tool for macOS. Deep-scan invisible metadata, detect tampering, and verify integrity without a single byte leaving your machine.
Everything you need for
Digital Forensics.
The complete toolkit for security researchers and privacy professionals.
Deep Metadata Extraction
Reveal hidden EXIF, GPS, and filesystem data from images, videos, and documents. See what your files are hiding.
Cryptographic Hashing
Generate MD5 and SHA-256 hashes instantly for forensic evidence verification and file integrity checks.
Tampering Detection
Advanced algorithms analyze timestamps, software traces, and anomalies to generate an integrity confidence score.
Interactive Timeline
Visualize file creation, access, and modification events chronologically to reconstruct digital history.
Project Management
Organize investigations into cases. Group files, add notes, tag evidence, and leverage batch comparison for streamlined reporting.
Batch Comparison
Compare metadata across multiple files side-by-side with anomaly detection—matching timestamps, author consistency, GPS clustering, and suspicious pattern identification.
Location Clustering
Visualize GPS coordinates on an interactive map with clustered markers, chronological travel routes, distance calculations, and date range filtering.
Metadata Stripping
Remove sensitive metadata (GPS, author, software traces) before sharing files. Preview what will be removed to protect your privacy.
Professional Reporting
Export comprehensive forensic reports in PDF, JSON, or CSV formats for clients and legal documentation.
Built for Professionals
Empowering those who need truth, privacy, and security.
Digital Forensics
Uncover hidden evidence with forensic-grade metadata extraction and analysis tools tailored for detailed investigations.
Journalists
Protect sources and verify the authenticity of digital assets before publication. Scrub sensitive location data to ensure safety.
Privacy Advocates
Take control of your data. Scrub invisible metadata from your photos and documents before sharing them online.
Legal Professionals
Maintain chain of custody and validate digital evidence integrity with hash generation and tamper detection.
Security Researchers
Analyze files for hidden payloads, suspicious timestamps, and anomalies. Identify potential threats embedded in metadata.
Content Creators
Protect your creative work by understanding embedded metadata. Strip personal info before uploading to platforms.
Supported Artifact Definitions
MetaVeils core parser engine recognizes signatures across hundreds of file types.