Metadata Interrogator 0.7 freeware

The Metadata Interrogator (MI) is a portable, offline tool for quickly analysing EXIF, XMP, IPTC and other metadata from files. The goal is to try to scrape absolutely any metadata available from any type of file, and provide enhanced functionality for investigators and customer verification agents. Features: Graphical User Interface Timeline and file comparison tools Offline GPS resolving Passport MRZ resolver Flags items of interest ...

Author Metadata Analysis
Released 2019-06-16
Filesize 78.41 MB
Downloads 83
OS Win2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Installation No Install Support
Keywords metadata, analysis, file analysis, investigation, osint, image manipulation, forensics
Users' rating
(11 rating)
Metadata InterrogatorOtherWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Metadata Interrogator - potential Freeware Download Notice

Metadata Interrogator Free Download - we do not host any Metadata Interrogator torrent files or links of Metadata Interrogator on rapidshare.com, depositfiles.com, megaupload.com etc. All Metadata Interrogator download links are direct Metadata Interrogator download from publisher site or their selected mirrors.

Metadata Interrogator freeware - The Latest User Reviews
Metadata Interrogator freeware - The Latest Versions History
0.7 Jun 16, 2019 New Release Passport MRZ resolver.
All fields added/calculated by MI (and not part of the metadata) now start with a *
MI tries harder to find a creation date – still be careful with this.
More metadata from PDF files, and removed some useless values.

Most popular Other freeware downloads

FortiClient

7.4.2.1737 freeware download

... visibility into endpoint activity, enabling swift response to potential security incidents. Moreover, FortiClient supports advanced features like application firewall, vulnerability management, and endpoint quarantine, ...

Sandboxie Plus

1.15.4 Plus freeware download

**Sandboxie Plus: A Robust Solution for Secure Computing** Sandboxie Plus, developed by David Xanatos, represents a significant evolution in the realm of secure computing. This ...

SDL Threat Modeling Tool

2016 freeware download

... structured analysis and proactive mitigation and tracking of potential security issues. The SDL Threat Modeling Tool helps engineers analyze the security of their systems ...

BlackBeltPrivacy

14.2024.08.2 freeware download

... concealed from prying eyes, including ISPs, advertisers, and potential cyber threats. 2. **WASTE Integration:** WASTE is a secure, decentralized peer-to-peer communication protocol. BlackBeltPrivacy leverages ...

EaseFilter File Protector

5.5.1.1 freeware download

... files or directories, thereby preventing unauthorized access and potential data breaches. 3. **File Encryption:** To protect sensitive data from unauthorized access, EaseFilter File Protector ...

Microsoft Security Essentials Definition Updates x32

July 15, 2024 freeware download

... is always equipped with the latest information on potential threats. This proactive approach is crucial for maintaining the integrity and security of your data. ...

PrivaZer

4.0.87 freeware download

... others from tracking your online activity. One potential drawback of PrivaZer is that the scanning and cleaning process can be quite time-consuming, especially if ...

AlienVault OTX Reputation Monitor Alert

1.0 freeware download

... AlienVault Open Threat Exchange (OTX) database, indicating a potential breach. The OTX database is the industry's only ... reputation provides an early warning sign of a potential breach. Rapid response is essential in making sure ...

PrivaZer Portable

4.0.87 freeware download

... to your specific needs and preferences. One potential downside of PrivaZer Portable is that the scanning and cleaning process can be quite time-consuming, especially ...

Afick

3.8.1 freeware download

... unauthorized changes. This functionality is crucial for identifying potential security breaches, unauthorized modifications, or system anomalies that could compromise the integrity of the system. ...