This application allows you to batch rename all files in a directory or a given type (e.g., "Images") in a single operation. The application can use EXIF metadata to rename the files.
⚠ This is NOT a file manager.
OPERATION
The new name is defined by a pattern containing text and tags that incorporate elements of the file or EXIF data. For example, the pattern "Trip %date %model.%ext" will create a file name like "Trip 2023-10-20 12-05-22 Pixel 7a.jpg".
The available tags are currently:
• %name: The current file name.
• %ext: The current file extension.
• %counter: A counter.
• %size: The file size.
• %date: The file's date or the one in the EXIF data.
• %model: The device model in the EXIF data.
• %lat and %lng: GPS coordinates in the EXIF data.
• %artist: The artist in the EXIF data.
The format of each tag can be configured.
You can save different configurations and easily recall them.
⚠ If you want other tags or additional configuration options, feel free to contact us.
The application allows working with folders or file types (Images, Videos, documents, etc.). File types are configurable.
For more flexibility, you can also:
• Filter the files to be renamed.
• Select files individually for renaming.
• Force the new name.
PERSONAL DATA
🛡 This completely free application has no restrictions, is guaranteed to be tracker-free, and does not collect any data.
REQUIRED PERMISSIONS
To access all device files, the application requests the following permissions:
• MANAGE_EXTERNAL_STORAGE - Allows broad access to storage.
• WRITE_EXTERNAL_STORAGE - Allows writing to storage exclusively for renaming files.
WARNINGS
⚠ The files are renamed in place. Therefore, as with all applications of the same category, make sure not to rename files that are necessary for your applications. The author cannot be held responsible if certain applications no longer function as before after renaming files!
Please note that hidden folders and files, as well as Android and WhatsApp folders, are not scanned by default to avoid creating issues with applications. However, experienced users can, at their own risk, authorize these elements.