Metadata Extractor pulls hidden information from files for OSINT investigations. Extract EXIF data from images including GPS coordinates with Google Maps links, camera make/model, and timestamps. Analyze PDF metadata (author, creator, dates, XMP). Parse Office documents (DOCX, XLSX, PPTX) for author, company, revision count, and edit time. Read audio/video tags. All files get MD5/SHA-1/SHA-256 hashes and VirusTotal lookup links.
exifgpspdf-metadatadocxaudio-tagsfile-hash
Last updated:
Features
Image EXIF extraction (JPG, PNG, TIFF, WebP)
GPS coordinate extraction with Google Maps link
Camera make, model, and settings
PDF metadata (author, creator, dates, encryption)
PDF XMP metadata parsing
Office metadata (DOCX, XLSX, PPTX)
Author, company, revision, edit time
Audio/video tags (MP3, FLAC, MP4)
Duration, bitrate, sample rate, album art info
MD5, SHA-1, SHA-256 file hashing
VirusTotal file lookup link
Built-in file browser dialog
HTML report export
Quick Start
# 1. Extract the zip and enter the folder cd 20-Metadata-Extractor
What Sensitive Information Is Hidden in File Metadata?
File metadata frequently exposes unintended information. This tool extracts EXIF/GPS data from images, PDF properties, Office document metadata, audio/video tags, and file hashes. According to a 2023 Digital Investigation journal study, over 60% of documents on government websites contain metadata revealing employee names, software versions, and directory structures.
Image EXIF and GPS Intelligence
EXIF metadata (standardized by JEITA/CIPA) in photographs can contain GPS coordinates accurate to within 3 meters, camera models, lens specs, timestamps, and device serial numbers. ExifTool by Phil Harvey supports over 400 file formats. This tool uses similar extraction via Pillow and PyMuPDF.
Document Forensics
Office documents store author names, company names, revision counts, and editing time. PDF metadata per the XMP standard records producer software and creation tools. The SANS DFIR curriculum covers metadata analysis as standard evidence examination. This tool helps audit what metadata persists before publication.
🔬 Metadata Extractor — Frequently Asked Questions
What metadata can be extracted from files?
The tool extracts EXIF data from images (camera model, GPS coordinates, timestamps), document properties from PDFs and Office files (author, creation date, software used), and embedded metadata from various file formats.
Does the metadata extraction tool require installation?
No. The tool runs entirely in your browser using client-side Python via Pyodide. No installation, API keys, or server-side processing required. Your queries are executed locally for maximum privacy.
What can I do with the metadata extraction tool?
You can extract EXIF, XMP, and IPTC metadata from images, PDFs, and documents. The tool provides a clean interface with exportable results and cross-links to related Max Intel tools for deeper investigation.