Browser-based digital forensics SaaS for images, videos, PDFs and suspicious links. Extract metadata, calculate SHA-256 hash, detect AI and deepfakes, analyze suspicious links and generate a professional PDF report.
Privacy and compliance: see our Privacy Policy or talk to a specialist.
Delivery and trust
PDF forensic report
Export with evidence, indicators and consolidated findings.
Privacy-focused
Processing occurs in the browser; files are not stored on any server.
Controlled access
Accounts created manually for testing and validation (no public sign-up).
Technical note
Automated results indicate signs/evidence based on technical analysis and may not be 100% conclusive.
Forensic file analysis and suspicious link/screenshot verification to identify scams and digital threats.
Authenticity and integrity: metadata, SHA-256 hash and AI detection in layers, with PDF forensic report.
Privacy preserved
Fully local processing in your browser. Your files are sent to the cloud.never
* Automated results indicate signs/evidence based on technical analysis and may not be 100% conclusive.
Paste a suspicious link or send a screenshot (OCR): detect phishing, homograph/typosquatting and social engineering tactics — .without click risk
Safe mode (recommended)
Recommendation: suspicious links. Copy the address (without clicking) or send a screenshot for analysis.do not open
* Use the analysis as support. In critical situations, confirm by additional means and avoid any interaction with suspicious messages.
See investigations where MetaScope was decisive. Practical examples of how our technology supports forensic reports and detects fraud in real scenarios.
Complete analysis of a WhatsApp scam. The system processes the evidence and delivers a .forensic report ready for use.




Digital vehicle document with signs of editing. Metadata and PDF structure analysis revealed manipulation.


Viral image circulating on global social media. Technical analysis to identify synthetic manipulation.


Message about withheld delivery or pending fee. Technical analysis revealed a fake link mimicking official site.


Photo sent by expert to validate alibi in London. Metadata and original GPS confirmation required.


MetaScope is designed for scenarios where evidence integrity is fundamental and doubt is not an option.
Initial evidence triage, integrity validation and support for technical reports.
Technical foundation for legal proceedings with exportable PDF reports.
Suspicious file analysis and prevention of fraud or data leaks.
Authenticity verification of media (fakes/AI) and source validation.
Transform files and suspicious links into clear technical evidence with our multi-layer forensic analysis engine.
Anti-fraud Protection
Paste a link or send a suspicious screenshot. Identify signs of fake websites, homography and social engineering tactics before clicking.
Forensic Validation
Strengthen the technical foundation of your evidence. Extract hidden metadata and calculate SHA-256 hash for legal validity.
Fake Detector
Assess authenticity. Our AI analyzes invisible patterns and digital noise to indicate probability of synthetic manipulation.
Traceability
Map the exact capture location. Interactive visualization of GPS coordinates when available in file metadata.
Drag your file or paste the suspicious link. No complex installations, directly in the browser.
Our algorithms scan over 50 data points, metadata and visual clues in seconds.
Download a professional, complete PDF report, ready to attach to proceedings or dossiers.
MetaScope was developed for digital forensics applied to real scenarios. The platform combines forensic file analysis, image authenticity verification, EXIF metadata inspection and SHA-256 hash integrity checking. In investigations with fraud risk, it also allows analyzing suspicious links and screenshots with OCR to support technical decisions with greater confidence.
Direct answers to the most common questions about analysis, privacy and result interpretation.
Transparency
Automated analyses are based on technical evidence and may vary depending on the file and available metadata. Use the results as support and complement when necessary.
Interface designed for forensic agility. Browse dashboards, metadata visualization and analysis tools.

1 of 7
Unified main panel: choose between Forensic File Validation or Digital Threat Analysis.
Access is controlled (no public sign-up). Click below to request your evaluation credentials.
Current limits: images/videos up to 100MB • documents up to 25MB.
Questions about security or legal use? Talk to our team.