High-intent landing pages for every JAD Security tool — metadata scrubbing, PII redaction, AES-256 encryption, hash fingerprints, hex / entropy / steganography forensics. Every page runs the same browser-native engine.
Strip GPS coordinates and EXIF location data from photos in your browser. No upload, no account.
Remove PDF author, title, producer, dates, and edit history before sharing. Browser-only.
Remove author, comments, and custom properties from .docx, .xlsx, .pptx files in-browser. No upload.
Remove every ID3v1 / ID3v2 tag and embedded artwork from MP3 files in-browser. Full anonymization.
Strip Adobe / DJI / iPhone / camera identifiers and GPS from MP4 / MOV containers. Browser-based.
Find and extract embedded thumbnails inside JPEG APP1, MP4 udta, and PSD layer previews. Forensic tool.
Auto-detect and pixelate faces across batches of photos and videos. GDPR-friendly, browser-based.
Detect and redact email addresses, phone numbers, and mailing fields from CSV / JSON / TXT in-browser.
Manually mark and permanently burn out signatures or handwriting from documents. Pixel-level redaction.
Auto-detect emails, phone numbers, and SSNs in PDFs and apply true redaction (text removed, not just covered).
Encrypt files with AES-256-GCM and PBKDF2 key derivation. 100% local — your password never leaves your device.
Generate SHA-1, SHA-256, SHA-512, and MD5 hashes of any file in your browser. Streaming, chunked, no upload.
Generate PGP keys, sign messages, and verify signatures locally with OpenPGP.js. Private keys never leave your device.
Measure password strength using zxcvbn — the same library Dropbox uses. Offline, never transmitted.
Compute hashes of two files in parallel and report whether they are byte-identical. Plus first-difference offset.
Detect files where the extension lies about the content. Identifies double-extension malware risks instantly.
Read the file's first bytes and detect whether the extension matches the actual content. Catches double-extension malware.
ReadCompare magic-byte content-type detection against file-extension matching. Learn when each fails, and why browser tools rely on byte signatures, not names.
ReadLearn how SOC analysts, malware researchers, and incident responders use magic byte inspection to triage suspicious files before sandbox detonation.
ReadDeep dive into file signature databases, offset-based detection, MIME sniffing algorithms, and how to implement magic-byte validation in your upload pipeline.
ReadAnswers to the most common questions about magic-byte file validation: which formats are supported, how detection works, what false positives mean, and privacy guarantees.
ReadInspect the first 256B (Free), 1KB (Pro), or 8KB (Developer) of any file as hex with offset and ASCII sidebar.
View the first 256B (Free), 1KB (Pro), or 8KB (Developer) of any file as hex with offset column and ASCII sidebar.
ReadCompare full hex editors (HxD, 010 Editor) against read-only hex inspectors for file header analysis. Learn when write access is unnecessary and inspection is enough.
ReadLearn how incident responders and malware analysts use hex header inspection to identify executable types, packed headers, and obfuscation before sandbox analysis.
ReadDetailed technical guide to binary file header structures across PE, ELF, Mach-O, ZIP, PNG, JPEG, MP4, and PDF — with hex offsets and field meanings.
ReadAnswers to common questions about the browser-native Hex Header Inspector: byte limits, format support, privacy guarantees, and how to read hex output.
ReadCompute Shannon entropy per 256-byte chunk to detect encrypted regions, packed binaries, or hidden data.
Compute Shannon entropy per 256-byte chunk to detect encrypted regions, packed binaries, and hidden data sections.
ReadCompare Shannon entropy analysis against signature-based antivirus detection. Learn why high-entropy files evade AV and how entropy serves as an early-warning layer.
ReadLearn how CTF players and reverse engineers use Shannon entropy to locate encrypted payloads, embedded files, steganographic content, and compressed data within binaries.
ReadTechnical guide to Shannon entropy calculation over file bytes — formula, chunk-based computation, visualization techniques, and entropy profiles for common file types.
ReadQuick answers about the browser entropy analyzer: what the score means, how to interpret the chart, which file types show high entropy naturally, and privacy guarantees.
ReadSee where a photo was taken by reading EXIF GPS data and plotting it on an OpenStreetMap. Local-only.
See where a photo was taken by reading EXIF GPS data and plotting it on OpenStreetMap. Local-only — no upload.
ReadCompare browser-native EXIF GPS map preview against Google Photos location features. Learn what metadata each platform reads, stores, and potentially shares.
ReadHow investigative journalists and OSINT researchers use EXIF GPS data to verify photo locations, corroborate sources, and geolocate events — all browser-locally.
ReadTechnical explanation of the EXIF GPS IFD: DMS rational format, GPSLatitudeRef, altitude encoding, timestamp fields, and how to extract decimal degrees in JavaScript.
ReadAnswers to common questions about the browser-native EXIF map: which formats carry GPS, what OSM knows, why some photos show no location, and privacy guarantees.
ReadDetect and extract LSB-encoded messages from PNG and BMP carriers. Browser-only forensic tool.
Detect and extract LSB-encoded messages from PNG and BMP images. Forensic-grade browser tool. Developer tier.
ReadCompare LSB steganography and encryption as data-hiding techniques. Learn when each is appropriate, why combining both is best practice, and how each is detected.
ReadHow digital forensics examiners use browser-native LSB decoding to extract covert payloads from PNG/BMP carrier images recovered from devices and network captures.
ReadDeep technical guide to least-significant-bit steganography in PNG and BMP images — pixel iteration, capacity calculations, null-termination, and Canvas2D implementation.
ReadAnswers to common questions about the browser LSB steganography decoder: supported formats, what extracted output means, capacity limits, and why JPEG doesn't work.
ReadHide a text payload inside a PNG or BMP carrier image using LSB steganography. Browser-only.
Replace name, email, address, and phone fields in CSV / JSON with @faker-js fakes. Preserves shape and types.