AIMSA (Advanced Image Metadata & Security Analyzer) is a comprehensive Streamlit-based application designed for in-depth image analysis. Perfect for digital forensics professionals, cybersecurity experts, and privacy-conscious users who need to thoroughly examine image files for metadata, security threats, and hidden content.
- File Information: Complete file details including name, size, MIME type, MD5/SHA256 hashes, and magic bytes
- EXIF & Metadata Extraction: Camera information, timestamps, GPS coordinates, and exposure settings
- Header Analysis: File type validation and structural integrity checks
- Metadata Editor: Modify EXIF data in JPEG files
- Metadata Removal: Strip sensitive information for privacy protection
- ICC Profile Analysis: Extract color space and format specifications
- VirusTotal Integration: Real-time malware scanning (API key required)
- Steganography Detection: Identify hidden data, embedded archives, and entropy anomalies
- JFIF Metadata Analysis: Detailed format information extraction
- JSON Reports: Export complete analysis results
- Downloadable Formats: Save cleaned images and reports
| Format | Extensions | Features |
|---|---|---|
| JPEG | .jpg, .jpeg |
Full metadata editing, EXIF extraction |
| PNG | .png |
Metadata analysis, transparency info |
| TIFF | .tiff, .tif |
Multi-page support, compression details |
| BMP | .bmp |
Basic analysis, header validation |
| WebP | .webp |
Modern format support |
| GIF | .gif |
Animation frame analysis |
ImageAnalyzer00/
├── app.py # Main application file
├── requirements.txt # Python dependencies
├── .env # Environment variables (create this)
├── LICENSE # BSD 3-Clause License
├── README.md # This file
├── pages/
│ ├── file.py # Handles file upload and processing logic
│ ├── forensic.py # Image forensic analysis features
│ └── metadata.py # Metadata extraction and processing
└── assets/ # Additional resources
- Python 3.8 or higher
- pip package manager
-
Clone the repository
git clone https://github.com/Radheshyam00/ImageAnalyzer00.git cd ImageAnalyzer00 -
Set up virtual environment
# Create virtual environment python -m venv venv # Activate (Linux/Mac) source venv/bin/activate # Activate (Windows) venv\Scripts\activate
-
Install dependencies
pip install -r requirements.txt
-
Configure environment (Optional)
# Create .env file for additional features echo "MONGO_URI=your_mongodb_uri" > .env echo "VIRUSTOTAL_API_KEY=your_api_key" >> .env
streamlit run app.pyOpen your browser to http://localhost:8501
- Investigate image authenticity and origin
- Extract hidden metadata for evidence
- Analyze file structure for tampering
- Remove GPS coordinates before sharing
- Strip camera information from photos
- Clean metadata for anonymous publishing
- Detect steganographic payloads
- Scan for embedded malware
- Analyze suspicious image files
- Audit photo collections for sensitive data
- Batch process metadata removal
- Validate file integrity
To enable malware scanning:
- Sign up for a VirusTotal API key
- Add your API key to the
.envfile or enter it in the application interface
For enhanced file tracking with File Inspector Pro:
MONGO_URI=mongodb://username:password@host:port/databaseWe welcome contributions! Please feel free to submit a Pull Request. For major changes, please open an issue first to discuss what you would like to change.
- Fork the repository
- Create your feature branch (
git checkout -b feature/AmazingFeature) - Commit your changes (
git commit -m 'Add some AmazingFeature') - Push to the branch (
git push origin feature/AmazingFeature) - Open a Pull Request
This project is licensed under the BSD 3-Clause License - see the LICENSE file for details.
If you encounter any issues or have questions:
- Open an issue on GitHub Issues
- Check existing issues for solutions
- Review the documentation
Made with dedication for the cybersecurity and digital forensics community
Star this repository if you find it helpful!