Professional Digital Forensics Platform  Β·  v2.0

Investigate Evidence
Like a Professional

Upload disk images, forensic containers, or logical files. Automatic Sleuth Kit analysis, file recovery, artifact extraction, and AI-powered investigative reports β€” all in one platform.

E01 Β· DD Β· ISO Β· RAW
File Recovery
Browser Artifacts
Timeline
AI Summary

New Investigation

Drop your evidence file below to begin the forensic analysis pipeline

Drop Evidence File Here
or click to browse β€” supports disk images & logical files
E01 DD RAW ISO IMG PDF DOCX JPG/PNG ANY FILE
β€”
β€”
Initializing analysis…
Preparing forensic pipeline
Detect
Hash
Disk
Recover
Artifacts
Timeline
Search
AI
Report
0%
10+
Analysis Modules
E01Β·DDΒ·ISO
Evidence Formats
AI
GPT-Powered Reports
100%
Open Source

Complete Forensic Analysis Suite

Everything an investigator needs β€” powered by industry-standard tools

Disk Image Analysis
Full Sleuth Kit integration with automatic partition detection, filesystem parsing, and inode analysis.
mmlsfsstatflsils
File Recovery
Recover deleted and unallocated files with tsk_recover. Deleted files are highlighted separately in the report.
tsk_recoverdeleted filescarving
Browser Artifacts
Parse Chrome History and Firefox places.sqlite β€” extract visited URLs, titles, and visit timestamps.
ChromeFirefoxEdgeSQLite
EXIF Metadata
Extract GPS coordinates, camera make/model, serial numbers, and timestamps from images via exiftool.
exiftoolGPScameraserial
AI Summarization
GPT-4o-mini evidence summary highlighting key findings, suspicious activity, and recommended investigator actions.
OpenAIGPT-4o-minifallback
Forensic Timeline
Build MAC-time activity timelines using fls + mactime. Events sorted by Modify, Access, and Change times.
mactimeMAC-timebody file
Keyword Search
Deep search across file names, text content, browser history, metadata, and SQLite databases.
.exe@gmail.combitcoinpassword
Interactive Report
Auto-generated HTML report with image viewer, video player, document catalog, live search, and full sidebar navigation.
HTMLlightboxfiltermobile
Evidence Integrity
Compute MD5, SHA-1, and SHA-256 hashes for chain-of-custody verification and evidence integrity checks.
MD5SHA-1SHA-256