100% Offline // Privacy First

Forensic Power.
Zero Leaks.

The only 100% offline analysis tool for macOS. Deep-scan invisible metadata, detect tampering, and verify integrity without a single byte leaving your machine.

MetadataEXIF • GPS • Hidden Data
HashingMD5 • SHA-256
AnalysisTampering Detection
Forensic Toolkit

Everything you need for
Digital Forensics.

The complete toolkit for security researchers and privacy professionals.

Deep Metadata Extraction

Reveal hidden EXIF, GPS, and filesystem data from images, videos, and documents. See what your files are hiding.

Cryptographic Hashing

Generate MD5 and SHA-256 hashes instantly for forensic evidence verification and file integrity checks.

Pro

Tampering Detection

Advanced algorithms analyze timestamps, software traces, and anomalies to generate an integrity confidence score.

Pro

Interactive Timeline

Visualize file creation, access, and modification events chronologically to reconstruct digital history.

Pro

Project Management

Organize investigations into cases. Group files, add notes, tag evidence, and leverage batch comparison for streamlined reporting.

Pro

Batch Comparison

Compare metadata across multiple files side-by-side with anomaly detection—matching timestamps, author consistency, GPS clustering, and suspicious pattern identification.

Pro

Location Clustering

Visualize GPS coordinates on an interactive map with clustered markers, chronological travel routes, distance calculations, and date range filtering.

Pro

Metadata Stripping

Remove sensitive metadata (GPS, author, software traces) before sharing files. Preview what will be removed to protect your privacy.

Pro

Professional Reporting

Export comprehensive forensic reports in PDF, JSON, or CSV formats for clients and legal documentation.

Who is it for?

Built for Professionals

Empowering those who need truth, privacy, and security.

Digital Forensics

Uncover hidden evidence with forensic-grade metadata extraction and analysis tools tailored for detailed investigations.

Journalists

Protect sources and verify the authenticity of digital assets before publication. Scrub sensitive location data to ensure safety.

Privacy Advocates

Take control of your data. Scrub invisible metadata from your photos and documents before sharing them online.

Legal Professionals

Maintain chain of custody and validate digital evidence integrity with hash generation and tamper detection.

Security Researchers

Analyze files for hidden payloads, suspicious timestamps, and anomalies. Identify potential threats embedded in metadata.

Content Creators

Protect your creative work by understanding embedded metadata. Strip personal info before uploading to platforms.

SYSTEM_CAPABILITIES_SCAN

Supported Artifact Definitions

MetaVeils core parser engine recognizes signatures across hundreds of file types.

ENGINE_ACTIVE
Module Select
ANALYSIS_TARGET: VISUAL EVIDENCE
ID: IMAGES_MOD
JPG
PNG
HEIC
TIFF
WebP
RAW (CR2, NEF)
BMP
GIF
Signature StartFF D8 FF E0
Extractable MetadataEXIF, IPTC, XMP
Parser StatusREADY