Welcome to the Digital Forensics Lab
This comprehensive toolkit provides everything you need for CTF challenges and digital forensics investigations.
Metadata Analysis
Extract and analyze EXIF data, GPS coordinates, camera information, and other metadata from images and media files.
Hex Viewer
Interactive hex viewer with search capabilities, offset navigation, and byte-level analysis. Supports large files.
Strings Extractor
Extract printable strings from binary files with configurable minimum length, ASCII/UTF-16 support, and search functionality.
File Signature
Detect file types by magic bytes with 50+ format support. Identify mismatched extensions and polyglot files.
Color Analysis
Analyze color distributions, view RGB channels, calculate histograms, detect dominant colors, and identify anomalies.
Encoding/Decoding
Comprehensive encoding library with 20+ methods: Base64, Base32, Hex, Binary, URL, ROT13, Caesar, Morse, Baconian, Atbash, Rail Fence, Vigenère, A1Z26, and more.
Cryptographic Analysis
Advanced cipher analysis with frequency analysis, chi-square tests, Kasiski examination, hash identification, and automatic decryption attempts.
Network Analysis
Extract IP addresses, URLs, email addresses, domains, MAC addresses, ports, and network protocols from files.
CTF Helper
Search for flag patterns with custom regex, CTF challenge solver, file carving, and automated flag detection.
Automation
Smart CTF solver with automated workflows, batch processing, and multi-technique analysis. Pre-configured workflows for common scenarios.
Visualization
Generate LSB heatmaps, entropy maps, bit-plane visualizations, histograms, frequency charts, and correlation matrices.
Machine Learning
ML-based anomaly detection, pattern recognition, and statistical classification using neural networks for forensic analysis.
File Carving
Extract embedded files from other files by detecting file signatures. Supports multiple embedded formats and polyglot detection.
Report Generation
Generate comprehensive analysis reports in HTML, JSON, CSV, XML, YAML, Markdown, and plain text formats.
Pattern Matching
Advanced pattern recognition with regex support, repeating pattern detection, encoding pattern identification, and intelligent search.
π‘ CTF Tips & Best Practices
- File Signatures: Always check if file extensions match magic bytes. Mismatches often indicate hidden files or polyglots. Use the File Signature analyzer to detect 50+ formats.
- Metadata: EXIF data can contain GPS coordinates, camera info, or even hidden messages in comment fields. Always check metadata first in image challenges.
- Strings: Many CTF flags are hidden as plaintext strings in binary files. Always extract strings with minimum length 4. Search for common flag patterns.
- File Carving: Files can be appended to the end of other files. Check file sizes and look for multiple file signatures. Use file carving tool to extract embedded files.
- Encoding: Try all encoding methods systematically. Use Auto-Decode feature to automatically detect and decode common encodings. Check Base64, Hex, ROT13, and Caesar ciphers first.
- Crypto Analysis: Use frequency analysis and chi-square tests to identify cipher types. Kasiski examination helps detect Vigenère ciphers. Try common keys and keywords.
- Network Data: Extract IPs, URLs, emails, and domains from any file. Network forensics data is often hidden in unexpected file types.
- Automation: Use Smart CTF Solver for unknown challenges. It automatically tries multiple techniques and reports findings. Workflows save time on repetitive tasks.
- Visualization: Visual analysis helps detect hidden patterns. Check entropy maps for unusual patterns, color analysis, and bit planes for anomalies.
- Pattern Matching: Use custom regex patterns to search for flags. The pattern matcher can find repeating sequences, encoding patterns, and anomalies.
Quick Start Guide
Step 1: Upload Your File
Start by uploading the challenge file to any relevant tool. Most tools support drag-and-drop for convenience.
Step 2: Run Basic Analysis
Use the Automation tab's "Full Analysis" workflow to quickly analyze metadata, signatures, strings, and colors.
Step 3: Extract Strings & Search Flags
Extract strings and use the CTF Helper to search for flag patterns. Try custom regex patterns for unusual formats.
Step 4: Try Advanced Techniques
If basic methods fail, try file carving, encoding/decoding, cryptographic analysis, and advanced visualization techniques.
Step 5: Use Smart Solver
For complex challenges, use the Smart CTF Solver which automatically tries multiple techniques and reports all findings.
Metadata & EXIF Analyzer
Extract and analyze metadata from images and media files. EXIF data often contains valuable information in CTF challenges.
Hex Viewer
View files in hexadecimal format. Useful for analyzing binary data and finding hidden patterns.
Strings Extractor
Extract printable strings from binary files. Many CTF flags are hidden as plaintext strings.
File Signature Analyzer
Detect file types by magic bytes. Mismatched extensions often indicate hidden files or polyglot files in CTF challenges.
π¨ Advanced Image & Color Analysis Studio
Professional-grade color analysis and forensic visualization tools for CTF challenges and digital forensics.
Encoding & Decoding
Comprehensive encoding/decoding library with 20+ methods commonly used in CTF challenges.
Encode/Decode Data
Auto-Decode
Automatically detect and decode common encodings. Tries multiple methods and shows best matches.
Cryptographic Analysis
Advanced cryptographic analysis including cipher identification, frequency analysis, and key recovery attempts.
Cipher Analysis
Hash Identification
Cipher Detection
Network Analysis
Extract network-related information from files including IP addresses, URLs, email addresses, and protocols.
CTF Flag Helper
Search for flag patterns in extracted data. Supports common CTF flag formats.
CTF Challenge Solver
Automatically solve CTF challenges by trying multiple techniques.
Automated Workflows
Run automated analysis workflows to quickly analyze files for CTF challenges.
Smart CTF Solver
Automatically runs multiple analysis techniques to solve CTF challenges.
Workflow Selection
Data Visualization
Visual representations of analysis results, patterns, and data distributions.
Image Visualizations
Chart Generator
Generate charts from analysis data.