Pull EXIF, IPTC and XMP metadata from an image — GPS, device serials, owner, software — with a clear leak summary.
Image EXIF Extractor reads the metadata baked into photos and surfaces what actually matters for OSINT: GPS coordinates, the camera/phone model and its unique serial number, the owner/author name, editing software, timestamps and embedded location names. It parses EXIF, IPTC and XMP (plus PNG text chunks), not just the basics.
Analyze your own uploads, or point it at an image URL on a target — the fetch is server-side and SSRF-guarded — to check what their published images leak. A one-glance leak summary tells you exactly what each image gives away.
Many platforms strip EXIF on upload, and most phones let users disable location tagging. Absence of GPS is common for images sourced from social media.
No — it is processed in a temporary file, analyzed, then discarded. URL fetches are downloaded to a temp file and deleted after parsing.