PDF & Office Forensics · 44+8 Engines · Free · No Account

Open Any PDF Safely— Even Malicious Ones

Forensic scanning across 44 independent engines, sandbox execution, and one-click sanitization. No uploads stored. Zero trust by default.

📄 Office Document Forensics Scanner Word · Excel · PowerPoint · RTF · Outlook · OneNote · Visio · Access
23 Engines
Why use it
  • VBA & XLM macro extraction
  • Sandbox detonation via strace
  • ClamAV + YARA + threat intel
  • IOC extraction & MITRE mapping
  • AI forensic report (Qwen 2.5)
When to use it
  • Email attachment you didn’t request
  • Doc from an unknown sender
  • File with macros you didn’t expect
  • Before opening on a work device
  • Security audit of internal docs
How it works
  1. Drop any Office file
  2. 23 engines run in parallel
  3. Risk verdict + full report
  4. One-click sanitize if needed
  5. File deleted immediately
New — 🔬 Universal File Forensics Scanner Images · Audio · Video · Archives · Executables · Scripts · Fonts · Certs · PCAP · All file types
19 Engines
Why use it
  • PE & ELF binary analysis
  • Steganography detection (LSB chi-sq)
  • ClamAV + YARA + threat intel
  • IOC extraction & MITRE mapping
  • AI forensic report (Qwen 2.5)
When to use it
  • Suspicious executable or script
  • Image with hidden data suspected
  • Archive with unusual compression
  • File with unexpected format or MIME
  • Unknown attachment, any file type
How it works
  1. Drop any file (50 MB max)
  2. 19 engines run in parallel
  3. Risk verdict + full report
  4. AI synthesis of all findings
  5. File deleted immediately
🔍 File Fingerprint Comparator PDF · Word · Excel · PowerPoint · Any document pair · Cross-format
25+ Features
Why use it
  • Cross-format structural diff
  • Detect malware variant changes
  • Verify document integrity
  • Similarity score + verdict
  • Side-by-side forensic report
When to use it
  • Suspect a file was tampered
  • Compare original vs received copy
  • Malware variant attribution
  • Before signing or approving a doc
  • Compliance audit verification
How it works
  1. Upload two files
  2. Parallel forensic scans
  3. 25+ features diffed
  4. Similarity score + verdict
  5. Files deleted immediately

What Happens When You Upload a PDF

Your file doesn’t just open — it’s interrogated.

Structure Analysis

Every object, cross-reference, and stream parsed against the PDF specification. Malformed structures, trailer chain anomalies, and embedded object nesting are flagged.

JavaScript Deobfuscation

Embedded JavaScript is extracted and emulated behaviorally. XFA FormCalc, action chains, and URI/Launch triggers are individually parsed and examined.

Multi-Engine Detection

44 independent forensic engines run in parallel — YARA rules, ClamAV signatures, byte-pattern analysis, six-parser differential, and ML anomaly detection with SHAP explanations.

Sandbox Execution

Dynamic analysis in a network-isolated sandbox. No internet access, no file system writes outside the sandbox. Captures runtime behavior without risk to your system.

Threat Intelligence Matching

6.4 million offline threat indicators — hashes, domains, IPs, and known malware signatures — matched locally with no external API calls.

Risk Scoring & Classification

A weighted risk score across all 44 engines produces a clear verdict: Clean, Suspicious, or Malicious — with MITRE ATT&CK mapping and an AI forensic report.

If It’s Dangerous, We Fix It

One click removes everything risky.

Removes:
  • JavaScript
  • Embedded files
  • Action triggers (OpenAction, Launch, URI)
  • Hidden layers
  • Suspicious annotations
  • Non-standard object streams
🧼 Download Clean PDF
9 surgical sanitize modes — from light clean to full linearization rebuild
Strip JavaScript Remove Embedded Files Flatten Actions Remove Hidden Layers Flatten Forms Remove Annotations Metadata Wipe Object Stream Rebuild Full Linearization
Threat Intelligence

Real Breaches. Every One Caught.

Twenty-five of the most damaging document-based attacks of the last decade — PDF exploits, Office macro loaders, and email-borne lures — and the engines that would have flagged each one before execution.

Everything Else You Expect

After it’s safe, do anything you want with it. 48 tools, all free.

📎

Merge PDFs

Combine

Combine multiple PDF files into one document. Drag, reorder, and merge with a single click.

✂️

Split PDF

Split

Split a PDF into individual pages or custom page ranges. Extract exactly what you need.

🗜️

Compress PDF

Reduce

Reduce PDF file size with intelligent compression. Choose quality vs. size trade-off.

🔄

Rotate Pages

Rotate

Rotate PDF pages by 90°, 180°, or 270°. Apply to all pages, odd, even, or a custom range.

📑

Extract Pages

Extract

Pick specific pages from a PDF and save them as a new document. Supports ranges.

🗑️

Delete Pages

Delete

Click pages to mark them for removal. All remaining pages are saved into a new document.

🔀

Reorder Pages

Reorder

Drag and drop PDF pages into any order, then save as a new document.

🔧

Repair PDF

Repair

Attempt to repair and re-linearize a corrupted or malformed PDF file.

📐

Flatten PDF

Flatten

Flatten form fields and annotations into the PDF content layer for archiving.

🎨

Grayscale PDF

Grayscale

Convert a color PDF to grayscale. Ideal for print optimization and reducing file size.

📝

PDF → Word

PDF → DOCX

Convert PDF documents to fully editable Word (.docx) files.

📈

PDF to Excel

PDF → XLSX

Extract tables from PDF files and export them to an Excel spreadsheet (XLSX).

🖼️

PDF to Images

PDF → PNG/JPG

Convert PDF pages to PNG or JPEG images at your chosen DPI (72–300). Get a ZIP of all pages.

🗄️

PDF → PDF/A

PDF → PDF/A

Convert a PDF to archival PDF/A format for long-term storage, legal, and compliance use.

📄

Word to PDF

DOCX → PDF

Convert DOCX, DOC, ODT, RTF, and TXT documents to PDF with formatting preserved.

📊

Excel to PDF

XLSX → PDF

Convert XLSX, XLS, ODS, and CSV spreadsheets to PDF. Tables and charts preserved.

📽️

PowerPoint to PDF

PPTX → PDF

Convert PPTX, PPT, and ODP presentation files to PDF. Each slide becomes a page.

🖼️

Images to PDF

Images → PDF

Combine JPG, PNG, TIFF, WebP, BMP, and GIF images into a single PDF. Drag to reorder.

🌐

HTML to PDF

HTML → PDF

Convert HTML files or web page URLs to PDF using a full Chromium browser — captures modern CSS, web fonts, and JS-rendered content.

🔬

PDF Forensics Scanner

44 Engines

Forensic analysis of PDF files across 44 independent engines — the most comprehensive free PDF forensics scanner available. Unique capabilities: XFA FormCalc parser, PDF action dependency graph, OCG layer cloaking detection, Unicode/invisible text attacks, trailer chain forensics, codec exploit parameter validation, physical entropy topology, image steganography (LSB chi-square), PDF/A compliance fraud detection, JavaScript behavioral emulation, font CharString stack machine emulator, cross-object XRef integrity graph. Plus: structural integrity, byte-pattern signatures, YARA, ClamAV, ML + SHAP, dynamic sandbox, six-parser differential, phishing, MITRE ATT&CK, offline threat intelligence (6.4M+ indicators). Results across 24 analysis tabs including 🤖 AI Forensic Report (Qwen 2.5 1.5B — structured verdict, key findings, MITRE mapping, recommended actions). 9-mode surgical sanitize.

🗂️

Office Forensics Scanner

20 Engines

Forensic analysis of Word, Excel, PowerPoint, Outlook, Access, and Visio files across 20 independent engines — container integrity, cryptographic anomalies, VBA & XLM macro extraction, OLE compound structure, metadata provenance, IOC extraction (URLs, IPs, domains, hashes), ClamAV, YARA, threat intel, LibreOffice rendering, sandbox detonation, entropy, OPC/schema validation, NLP social-engineering detection, intelligent correlation, and AI forensic report. Zero data retention.

🔬

Universal File Forensics Scanner

19 Engines

Forensic analysis of all file types — images, audio, video, archives, executables, scripts, databases, fonts, network captures — across 15 independent engines: file identification (magic bytes/MIME/format mismatch), entropy & compression anomaly, metadata forensics (EXIF/ID3), IOC & string extraction, binary artifact extraction, PE executable analysis, ELF binary analysis, archive inspection (zip bombs/path traversal), image steganography (LSB chi-square), script & code analysis (reverse shells/webshells), ClamAV, YARA, threat intel, intelligent correlation, and AI forensic report. Zero data retention.

🔬

File Fingerprint Comparator

25+ Features

Upload two PDF or Office documents to compare their structural fingerprints and security profiles side by side. Scanned in parallel through all forensic engines, then diffed across 25+ features — similarity score, variant verdict, differences-first table. Detect malware variants, verify document integrity. Zero data retention.

🛡️

Protect PDF

PQC + AES-256

AES-256 password protection with permissions, or wrap your PDF in a Post-Quantum Cryptography (PQC) layer — quantum-computer-resistant encryption.

🔓

Unlock PDF

PQC + AES-256

Remove AES-256 password protection from PDFs you own, or decrypt PQC-encrypted .pqcpdf bundles using your private key or password.

Redact PDF

Privacy

Permanently remove sensitive text, names, numbers, and patterns. Server-side redaction — content is truly erased, not just covered.

💧

Add Watermark

Stamp

Stamp text watermarks on PDF pages. Control opacity, position, font size, and color.

✍️

Sign PDF

Sign & PAdES

Draw, type, or upload a signature image — or apply an invisible PAdES cryptographic digital signature (pyhanko, RSA-2048). Own certificate or auto self-signed.

🖊️

Send for E-Signature

Multi-Signer

Multi-party electronic signature workflow — add up to 10 signers, sequential or parallel order. Each signer gets a unique secure link. PAdES-B cryptographic signatures, zero retention, no account needed.

📷

PDF Scanner

Camera → PDF

Scan documents to searchable PDF using your camera or uploaded photos. Real-time edge detection, OpenCV perspective correction, CLAHE auto-enhancement, Tesseract 5 OCR. No app install, zero retention.

✏️

Edit PDF

Annotate

16 annotation tools including text, draw, eraser, shapes (with fill), highlight, whiteout, sticky notes, signatures, QR codes, and stamps. Plus form builder, bookmark editor, and per-page rotation. Changes are permanently embedded server-side.

📝

Fill PDF Form

Fill

Detect and fill interactive form fields — text inputs, checkboxes, radio buttons, and drop-downs. Optionally flatten for archiving.

🔍

Compare PDFs

Diff

Visual pixel-level diff between two PDF versions. Highlights added, removed, and changed content page by page.

📋

Extract Text

Text

Extract all text content from a PDF with layout preservation. Download as plain text.

ℹ️

PDF Info

Inspect

Inspect PDF metadata: page count, dimensions, author, title, encryption status, and more.

🔎

OCR PDF

Tesseract 5

Extract text from scanned PDFs and image-based documents using Tesseract 5 LSTM neural network OCR. Output as plain text, searchable PDF, or both.

⚙️

Workflow Builder

Automate

Chain multiple PDF operations into a single automated pipeline. Save, load, and compose named workflows. Rotate, watermark, compress, protect, and more — in any order.

📽️

PDF to PowerPoint

PDF → PPTX

Convert PDF pages to a PPTX presentation. Each page becomes a slide rendered at 150 DPI. Uses PyMuPDF and python-pptx.

🌐

PDF to HTML

PDF → HTML

Convert PDF to a self-contained HTML file with preserved text layout, fonts, and structure. Uses PyMuPDF structured HTML extraction.

📄

PDF to Markdown

PDF → MD

Convert PDF to clean Markdown using pymupdf4llm AI-powered layout analysis. Ideal for LLM workflows, RAG pipelines, and documentation sites.

🔖

Outline / Bookmark Editor

Outline

View and edit PDF bookmarks and document outline. Add, rename, reorder, and delete entries. Set heading levels and target pages.

📋

N-up / Imposition

N-up

Arrange multiple PDF pages per output sheet. 2-up, 4-up, 6-up, 8-up, 9-up, and booklet imposition for print.

📐

Auto-crop & Deskew

Auto-crop

Automatically crop white margins and fix page rotation. Uses PyMuPDF text block analysis to trim excess whitespace.

Accessibility Checker

WCAG

Audit your PDF against WCAG 2.1 and PDF/UA standards. Checks tagging, language, alt text, reading order, font embedding, and more.

🔤

Font Inspector

Fonts

Inspect all fonts in a PDF: name, type, encoding, embedded status, and subset flag. Non-embedded fonts flagged in red.

🎨

Colour Inspector

CMYK

Detect RGB, CMYK, spot, and ICC colour spaces across images, vectors, and text. Flags overprint, transparency, and Total Ink Coverage over 300%.

🖨️

PDF to PDF/X

PDF/X

Convert PDF to print-ready PDF/X (X-1a, X-3, X-4) with CMYK colour conversion via Ghostscript. Fonts embedded, transparency flattened.

📊

Tables to JSON

Tables → JSON

Extract all tables from a PDF as structured JSON. Uses pdfplumber with line and text detection. Preview first table inline.

No tools match your search.

How It Works

1
Upload file
Select your PDF from your device. Files go directly to our processing server — nowhere else.
2
Process server-side
Your file is processed entirely on our server using proven open-source engines — no third-party cloud involved.
3
Download — file is immediately deleted
The processed result is sent straight to your browser. Both the upload and the output are wiped from the server the moment your download begins.

Automate This in Your Pipeline

Scan uploads before they reach storage. Sanitize attachments automatically. Convert documents safely at scale.

Scan uploads before storage

Block malicious PDFs at the point of ingestion — before they reach your document store, email archive, or content platform.

Sanitize attachments automatically

Strip all active content from inbound PDFs before delivery — JavaScript, embedded files, action triggers — without disrupting the document workflow.

Convert documents safely

Merge, compress, OCR, and convert at scale. 45 operations in one pipeline. On-premise deployment removes all file size and rate limits.

POST https://api.pqpdf.com/v1/{operation}

REST API available now — API-key auth, IP whitelisting, 83 operations. On-premise deployment for teams that need full infrastructure control.

Designed for Zero-Trust Environments

Built with multi-engine detection principles used in malware analysis.

Zero server knowledge

Files are processed and immediately destroyed. No document content is retained, indexed, or logged at any point in the processing pipeline.

Layered detection, no single point of failure

44 independent engines means no single detection surface controls the verdict. Built with the same multi-layer approach used in professional malware analysis workflows.

Open-source forensic stack

Every engine is open-source and auditable: YARA, ClamAV, PyMuPDF, peepdf, pdfid, pdf-parser, Tesseract, and more. No proprietary black box in the analysis chain.

Offline threat intelligence

6.4M+ threat indicators matched locally — no external API calls during analysis. Your file and its metadata never leave the processing server.