Digital forensics SaaS & threat analysis

Digital forensics SaaS for images, videos, documents and suspicious links.

Browser-based digital forensics SaaS for images, videos, PDFs and suspicious links. Extract metadata, calculate SHA-256 hash, detect AI and deepfakes, analyze suspicious links and generate a professional PDF report.

Current limits: images and videos up to 100MB • documents up to 25MB • upload via drag/drop or link.

Privacy and compliance: see our Privacy Policy or talk to a specialist.

Delivery and trust

PDF forensic report

Export with evidence, indicators and consolidated findings.

Privacy-focused

Processing occurs in the browser; files are not stored on any server.

Controlled access

Accounts created manually for testing and validation (no public sign-up).

Technical note

Automated results indicate signs/evidence based on technical analysis and may not be 100% conclusive.

Choose a tool

Forensic file analysis and suspicious link/screenshot verification to identify scams and digital threats.

🔎

Forensic File Analysis

Authenticity and integrity: metadata, SHA-256 hash and AI detection in layers, with PDF forensic report.

Privacy preserved

Fully local processing in your browser. Your files are sent to the cloud.never

  • Images (JPG, PNG, WEBP) and videos (MP4, MOV, AVI) — up to 100MB
  • Documents (PDF, DOCX, XLSX) — up to 25MB
  • EXIF/timestamps + SHA-256 hash (integrity)
  • Layered detection + PDF report export

* Automated results indicate signs/evidence based on technical analysis and may not be 100% conclusive.

🛡️

Digital Threat Analysis

Paste a suspicious link or send a screenshot (OCR): detect phishing, homograph/typosquatting and social engineering tactics — .without click risk

Safe mode (recommended)

Recommendation: suspicious links. Copy the address (without clicking) or send a screenshot for analysis.do not open

  • Domain verification: homograph (IDN) and typosquatting
  • Link analysis: risk signals and recommendations ("do not interact")
  • Screenshot upload with OCR to extract content and links
  • Corroboration from external sources (e.g. VirusTotal) when available

* Use the analysis as support. In critical situations, confirm by additional means and avoid any interaction with suspicious messages.

Investigated Cases

Real cases, proven results

See investigations where MetaScope was decisive. Practical examples of how our technology supports forensic reports and detects fraud in real scenarios.

Full FlowScam Detected

From receipt to technical report

Complete analysis of a WhatsApp scam. The system processes the evidence and delivers a .forensic report ready for use.

1. EVIDENCE
Evidence
2. DOCUMENT
Document
3. ANALYSIS
Analysis
4. REPORT
Report
Complete forensic cycle in minutes.
Tampered Document

ATPV-e Fraud

Digital vehicle document with signs of editing. Metadata and PDF structure analysis revealed manipulation.

EVIDENCE
ATPV-e
ANALYSIS
Result
Verdict: Digital editing confirmed post-signature.
AI Detected

Viral: Real or Fake?

Viral image circulating on global social media. Technical analysis to identify synthetic manipulation.

EVIDENCE
Viral
ANALYSIS
Result
Verdict: Strong signs of AI generation.
Phishing / Smishing

Fake Tracking Scam

Message about withheld delivery or pending fee. Technical analysis revealed a fake link mimicking official site.

EVIDENCE
Phishing
ANALYSIS
Result
Verdict: Malicious link and urgency tactic.
Authentic

Location Validation

Photo sent by expert to validate alibi in London. Metadata and original GPS confirmation required.

EVIDENCE
London
ANALYSIS
Result
Verdict: Authentic. GPS and metadata confirmed.

Who it's for

MetaScope is designed for scenarios where evidence integrity is fundamental and doubt is not an option.

Technical Forensics

Initial evidence triage, integrity validation and support for technical reports.

Legal

Technical foundation for legal proceedings with exportable PDF reports.

Corporate Security

Suspicious file analysis and prevention of fraud or data leaks.

Journalism & Fact-checking

Authenticity verification of media (fakes/AI) and source validation.

Cutting-edge technology to reveal the invisible

Transform files and suspicious links into clear technical evidence with our multi-layer forensic analysis engine.

Anti-fraud Protection

Risk & Phishing Analysis

Paste a link or send a suspicious screenshot. Identify signs of fake websites, homography and social engineering tactics before clicking.

Forensic Validation

Proof of Integrity

Strengthen the technical foundation of your evidence. Extract hidden metadata and calculate SHA-256 hash for legal validity.

Fake Detector

Deepfake & AI Detector

Assess authenticity. Our AI analyzes invisible patterns and digital noise to indicate probability of synthetic manipulation.

Traceability

Origin Tracing (GPS)

Map the exact capture location. Interactive visualization of GPS coordinates when available in file metadata.

How it works

1

Upload or Paste

Drag your file or paste the suspicious link. No complex installations, directly in the browser.

2

Automatic X-Ray

Our algorithms scan over 50 data points, metadata and visual clues in seconds.

3

Report Ready

Download a professional, complete PDF report, ready to attach to proceedings or dossiers.

How MetaScope helps in digital forensics

MetaScope was developed for digital forensics applied to real scenarios. The platform combines forensic file analysis, image authenticity verification, EXIF metadata inspection and SHA-256 hash integrity checking. In investigations with fraud risk, it also allows analyzing suspicious links and screenshots with OCR to support technical decisions with greater confidence.

FAQ

Direct answers to the most common questions about analysis, privacy and result interpretation.

No. It is a technical support tool for triage, validation and documentation. In critical cases, complementary specialized analysis is recommended.
Use "safe mode": copy the link address without opening it (right-click → "Copy link address") and paste for analysis. Alternatively, send a screenshot of the message for OCR evaluation. This reduces the risk of opening malicious content.
It points out technical signs and provides a score with justifications. Like any automated detection, it is not 100% conclusive.
No. Processing occurs in the browser and there is no server-side storage.
No. Geolocation is only displayed when the file contains EXIF GPS data. Many platforms remove metadata when reprocessing images.
It is a "fingerprint" of the file. It serves to verify integrity and support the traceability of the analyzed material.
It looks for signs of phishing and fraud (e.g. homography/IDN, typosquatting, artificial urgency and social engineering manipulation). When available, it can cross-reference information with external reputation sources for corroboration.
Access is controlled (no public sign-up at the moment). You request a test and receive credentials for evaluation.

Transparency

Automated analyses are based on technical evidence and may vary depending on the file and available metadata. Use the results as support and complement when necessary.

Inside the platform

Interface designed for forensic agility. Browse dashboards, metadata visualization and analysis tools.

MetaScope - Upload Screen

1 of 7

Unified main panel: choose between Forensic File Validation or Digital Threat Analysis.

Want to test with your own material?

Access is controlled (no public sign-up). Click below to request your evaluation credentials.

Current limits: images/videos up to 100MB • documents up to 25MB.

Questions about security or legal use? Talk to our team.

MetaScope Forensic – Digital Forensics & Deepfake Detection for Images, Videos, PDFs and Links