Free Tools
Security Tools
Built by forensic examiners with 20 years of investigative experience. No signup required to start.
16 free interactive security and forensic tools from Sherlock Forensics: website security scanner with letter grade, email header analyzer with spoofing detection, email forensic analyzer, penetration testing cost calculator, breach cost ROI calculator, security readiness assessment quiz, vendor comparison decision engine, interactive guided security testing, PST/OST email viewer, MSG/EML email viewer with SMTP transport chain analysis, Android logical acquisition tool, browser forensic viewer, file hash calculator, file hash verifier, metadata viewer and inspector. All tools are free, built by CISSP-certified forensic examiners in Vancouver.
Forensic Desktop Software
PST Viewer
Open PST/OST files without Outlook. Search, export and verify email archives. Forensic reports. Forensic Edition from $67.
Get PST ViewerForensic PDF Viewer + Editor
View, edit and threat-scan PDFs without trusting them. Built-in phishing detection, JS/action scanning and safe-by-default Rust parser. Pro from $29/year.
Get PDF EditorUniversal Events Viewer
Windows event log triage in plain English. 16 one-click buttons including "Have I Been Hacked?" five-phase analysis. Forensic Edition from $97.
Get Events ViewerDisk Imager
Free forensic disk imager. Raw .dd and E01 output. Three-pass SHA-256 verification. Resumable. FTK Imager alternative.
Get Disk ImagerAndroid Acquirer
Android logical acquisition via ADB. Extract SMS, contacts, call logs, media and apps. Court-ready forensic reports. Forensic Edition from $399.
Get Android AcquirerMSG/EML Viewer
Open Outlook .msg and RFC-822 .eml files without Outlook. SMTP transport chain, SPF/DKIM/DMARC, anomaly detection. Forensic Edition from $67.
Get MSG/EML ViewerBrowser Viewer
Extract history, bookmarks, downloads and extensions from Chrome, Edge, Firefox, Brave, Opera, Vivaldi and Tor. Forensic Edition from $29.
Get Browser ViewerOST Viewer
Open Outlook OST files without Exchange or Office 365. View cached emails offline. Forensic reports. Forensic Edition from $67.
Get OST ViewerUSB Write Blocker
Free forensic USB write blocker. One-click registry-level write protection for evidence drives. Essential for forensic imaging.
Get USB BlockerHash Verifier
Drag-and-drop SHA256, SHA512, MD5, SHA1 calculator. Batch processing and hash comparison for forensic integrity.
Get Hash VerifierMetadata Inspector
View, export and strip EXIF, PDF and Office metadata. Privacy and forensic analysis.
Get Metadata InspectorScanners & Analyzers
Hack Your Own Website
Guided security testing tool. Walk through the same passive checks that attackers use. Headers, DNS, SSL, exposed paths and more.
Launch ToolSecurity Scorecard
Enter your domain, get an instant letter grade. Checks SSL, security headers, DNS authentication, cookies and HTTPS enforcement.
Scan My DomainEmail Header Analyzer
Paste email headers. See visual hop trace, SPF/DKIM/DMARC authentication results, sender verification and spoofing detection.
Analyze HeadersPort Scanner
Fast TCP port scanning for security assessments. Service detection and attack surface mapping.
Get Port ScannerFile Hash Calculator
Drag and drop to generate MD5, SHA-1, SHA-256, SHA-512. Compare hashes. No file upload. Runs in your browser.
Hash a FileMetadata Viewer
View hidden EXIF, PDF and Office metadata. GPS locations, author info, dates. Strip before sharing.
View MetadataCalculators
Pentest Cost Calculator
5-step questionnaire. Get a realistic price range for your penetration test based on scope, compliance and timeline.
Get EstimateBreach Cost Calculator
What would a data breach cost your company? Industry-specific estimates. Build the business case for security investment.
Calculate RiskEmail and Privacy
Sherlock Email Analyzer
Forensic email analysis with sender verification, header parsing and authentication validation. Detect spoofed and manipulated messages.
Analyze EmailPrivacy Tools
Privacy assessment and data protection tools for individuals and organizations. Evaluate your digital privacy posture.
View Privacy ToolsAssessments
Security Readiness Quiz
10 questions. 2 minutes. Find out where your organization stands and what gaps to close before your next audit.
Take AssessmentVendor Comparison
Answer 4 questions. Get matched with the right security vendor for your environment. Independent, vendor-neutral guidance.
Compare VendorsForensic Resources
Chain of Custody
Proper evidence custody documentation ensures digital evidence remains admissible in court. Review our methodology and procedures.
View MethodologyForensic Report Generator
Generate structured forensic reports with proper formatting for court submission. Consistent methodology documentation across all case types.
Generate ReportBeyond Free Tools
These tools are the starting point. Not the finish line.
Free tools cover basic security checks. A professional penetration test from Sherlock Forensics covers 200+ attack vectors: business logic flaws, authentication bypass, privilege escalation, API security and manual exploitation. From $1,500 USD.
Questions