Available Forensic Tools
Wireshark
Network protocol analyzer for capturing and interactively browsing network traffic.
Autopsy
Graphical interface to The Sleuth Kit for digital forensics investigations.
The Sleuth Kit
Library and collection of command-line digital forensics tools.
Volatility
Memory forensics framework for incident response and malware analysis.
Cellebrite
Mobile forensics solution for extracting, analyzing, and reporting data.
Encrypted Disk Detector
Tool to detect encrypted disks on a live system.
Upload Forensic Evidence
Drag & Drop Files Here
Or click to browse your files
Analysis Results
Upload Memory Dump
Supports .dmp, .raw, .mem formats
Memory Analysis
Upload Disk Image
Supports .dd, .e01, .aff, .img formats
Disk Analysis
Upload Network Capture
Supports .pcap, .pcapng formats
Network Analysis
Tool Interface
Digital Forensics Toolkit
Phishing URL Detection
Check if a URL is potentially phishing or malicious
Results will appear here...
Image Geolocation
Extract potential location data from image metadata
Drag & drop an image here or click to browse
Image metadata and location data will appear here...
Email Header Analysis
Trace an email by analyzing its headers
Email tracing results will appear here...
Source Code Tracing
Analyze website source code for tracking and origin information
Source analysis results will appear here...
Forensic File Analysis
Upload files for comprehensive forensic analysis
Drag & drop forensic files here or click to browse
Forensic analysis results will appear here...
Digital Forensics Toolkit
Comprehensive suite of tools for digital investigation and cybersecurity analysis
Analyze suspicious URLs to detect potential phishing attempts. Our tool checks multiple indicators including domain age, SSL certificates, and known phishing databases.
Analysis Results
Extract geolocation data from images by analyzing EXIF metadata and other embedded information to determine where a photo was taken.
Drag & drop an image here or click to browse
Supports JPG, PNG, HEIC, and other common image formats
Geolocation Results
Image Information
EXIF Metadata
Map will appear here when location data is available
Trace the origin of an email by analyzing its headers. This tool parses email metadata to reveal the sending path, IP addresses, and potential red flags.
Analysis Results
Sender Information
Routing Path
Technical Details
Security Indicators
Geographical Path
Map will display the email's routing path when available
Analyze uploaded media files to extract metadata, verify authenticity, and detect signs of manipulation or tampering.
Drag & drop a file here or click to browse
Supports images, videos, documents, and other common file types
Analysis Results
File Information
Hash Values
Metadata
Security Analysis
Advanced Analysis
Digital Forensic Toolkit
Phishing URL Detection
Check if a URL is potentially malicious or part of a phishing campaign.
Analyzing URL...
IP Location from Images
Extract and locate IP addresses from image metadata or delivery information.
Extracting and analyzing image data...
Email Header Analyzer
Trace the origin of an email by analyzing its headers.
Analyzing email headers...
Media Source Tracing
Analyze media files to trace their origin and metadata.
Extracting media metadata...
Forensic File Analysis
Upload files for comprehensive forensic analysis including hash generation, string extraction, and more.
Performing forensic analysis...
Digital Forensic Toolkit © 2023 | For educational and research purposes only