Digital forensics for files, screenshots, and suspicious links

Digital forensics software for file authenticity and fraud analysis.

Analyze images, videos, PDFs, screenshots, and suspicious links with metadata extraction, SHA-256 checks, manipulation signals, and forensic PDF reports.

Current limits: images and videos up to 100MB • documents up to 25MB • upload via drag/drop or link.

Privacy and compliance: see our Privacy Policy or talk to a specialist.

Delivery and trust

PDF forensic report

Export with evidence, indicators and consolidated findings.

Privacy-focused

Processing occurs in the browser; files are not stored on any server.

Controlled access

Accounts created manually for testing and validation (no public sign-up).

Technical note

Automated results indicate signs/evidence based on technical analysis and may not be 100% conclusive.

Choose your forensic workflow

Validate file authenticity and integrity or analyze suspicious links and screenshots to detect phishing and digital fraud.

🔎

File, image, and PDF forensic analysis

Check authenticity and integrity with metadata, SHA-256 hashing, manipulation signals, and a forensic PDF report.

Privacy preserved

Fully local processing in your browser. Your files are never sent to the cloud.

  • Images (JPG, PNG, WEBP) and videos (MP4, MOV, AVI) — up to 100MB
  • Documents (PDF, DOCX, XLSX) — up to 25MB
  • EXIF/timestamps + SHA-256 hash (integrity)
  • Layered detection + PDF report export

* Automated results indicate signs/evidence based on technical analysis and may not be 100% conclusive.

🛡️

Suspicious link and screenshot analysis

Paste a suspicious link or send a screenshot (OCR): detect phishing, homograph/typosquatting and social engineering tactics — without click risk.

Safe mode (recommended)

Recommendation: do not open suspicious links. Copy the address (without clicking) or send a screenshot for analysis.

  • Domain verification: homograph (IDN) and typosquatting
  • Link analysis: risk signals and recommendations ("do not interact")
  • Screenshot upload with OCR to extract content and links
  • Corroboration from external sources (e.g. VirusTotal) when available

* Use the analysis as support. In critical situations, confirm by additional means and avoid any interaction with suspicious messages.

Investigated Cases

Real fraud cases analyzed with MetaScope

See investigations where MetaScope helped validate authenticity, detect manipulation, and identify digital fraud with technical evidence.

Full FlowScam Detected

From receipt to technical report

Complete analysis of a WhatsApp scam. The system processes the evidence and delivers a forensic report ready for use.

1. EVIDENCE
Evidence
2. DOCUMENT
Document
3. ANALYSIS
Analysis
4. REPORT
Report
Complete forensic cycle in minutes.
Tampered Document

ATPV-e Fraud

Digital vehicle document with signs of editing. Metadata and PDF structure analysis revealed manipulation.

EVIDENCE
ATPV-e
ANALYSIS
Result
Verdict: Digital editing confirmed post-signature.
AI Detected

Viral: Real or Fake?

Viral image circulating on global social media. Technical analysis to identify synthetic manipulation.

EVIDENCE
Viral
ANALYSIS
Result
Verdict: Strong signs of AI generation.
Phishing / Smishing

Fake Tracking Scam

Message about withheld delivery or pending fee. Technical analysis revealed a fake link mimicking official site.

EVIDENCE
Phishing
ANALYSIS
Result
Verdict: Malicious link and urgency tactic.
Authentic

Location Validation

Photo sent by expert to validate alibi in London. Metadata and original GPS confirmation required.

EVIDENCE
London
ANALYSIS
Result
Verdict: Authentic. GPS and metadata confirmed.

Who it's for

MetaScope is designed for scenarios where evidence integrity is fundamental and doubt is not an option.

Technical Forensics

Initial evidence triage, integrity validation and support for technical reports.

Legal

Technical foundation for legal proceedings with exportable PDF reports.

Corporate Security

Suspicious file analysis and prevention of fraud or data leaks.

Journalism & Fact-checking

Authenticity verification of media (fakes/AI) and source validation.

Digital forensics features for files, links, and deepfakes

Turn files, screenshots, and suspicious links into technical evidence with a multi-layer forensic analysis engine.

Anti-fraud Protection

Risk & Phishing Analysis

Paste a link or send a suspicious screenshot. Identify signs of fake websites, homography and social engineering tactics before clicking.

Forensic Validation

Proof of Integrity

Strengthen the technical foundation of your evidence. Extract hidden metadata and calculate SHA-256 hash for legal validity.

Fake Detector

Deepfake & AI Detector

Assess authenticity. Our AI analyzes invisible patterns and digital noise to indicate probability of synthetic manipulation.

Traceability

Origin Tracing (GPS)

Map the exact capture location. Interactive visualization of GPS coordinates when available in file metadata.

How it works

1

Upload or Paste

Drag your file or paste the suspicious link. No complex installations, directly in the browser.

2

Automatic X-Ray

Our algorithms scan over 50 data points, metadata and visual clues in seconds.

3

Report Ready

Download a professional, complete PDF report, ready to attach to proceedings or dossiers.

Digital forensics software for files, images, and suspicious links

MetaScope was built for real-world digital forensics. The platform combines forensic file analysis, image authenticity checks, EXIF metadata inspection, SHA-256 integrity verification, and suspicious link and screenshot analysis with OCR to support technical decisions with more confidence.

FAQ about digital forensics and suspicious files

Clear answers about authenticity checks, metadata, suspicious links, privacy, and how to interpret the analysis.

No. MetaScope is a technical support tool for triage, validation, and documentation. In critical cases, it should be complemented by a formal forensic examination.
Use safe mode: copy the link address without opening the page and paste it for analysis. You can also upload a screenshot for OCR-based review. This reduces the risk of opening malicious content.
MetaScope looks for technical signs of synthetic generation and manipulation, including inconsistent patterns, metadata clues, and layered evidence. The output is decision support, not an absolute conclusion.
No. Processing happens in the browser, and the files are not stored on the server.
The system extracts technical metadata, including EXIF and timestamps. GPS data is only available when the original file still contains EXIF location data, since many platforms strip it during upload or reposting.
A SHA-256 hash works like a fingerprint for the file. It helps verify integrity and strengthens the traceability of the analyzed material.
MetaScope identifies phishing and fraud signals such as homograph domains, typosquatting, artificial urgency, social engineering tactics, and OCR-extracted clues from screenshots. When available, it can also use external reputation sources to strengthen the assessment.
Access is controlled and granted upon request. Submit an evaluation request and, once approved, you will receive credentials to test the platform.

Transparency

Automated analyses are based on technical evidence and may vary depending on the file and available metadata. Use the results as support and complement when necessary.

Inside the platform

Interface designed for forensic agility. Browse dashboards, metadata visualization and analysis tools.

MetaScope - Upload Screen

1 of 7

Unified main panel: choose between Forensic File Validation or Digital Threat Analysis.

Want to test a real file, screenshot, or suspicious link?

Access is controlled and intended for evaluation. Request your credentials to test MetaScope with real cases from your workflow.

Current limits: images/videos up to 100MB • documents up to 25MB.

Questions about security or legal use? Talk to our team.

MetaScope Forensic | Digital Forensics Software for Files, Images, and Links