Loading...
Threat management tools for threat intelligence, advanced persistent threat detection, and cyber threat analysis. Task: File Analysis
Browse 21 security tools
Real-time malware detection engine with sandboxing and zero-day detection
Real-time malware detection engine with sandboxing and zero-day detection
Automated malware analysis and detection platform
File security solution detecting malware in non-executable documents
File security solution detecting malware in non-executable documents
File threat intelligence integration combining hash lookups & malware detection
File threat intelligence integration combining hash lookups & malware detection
RESTful API for file/URL malware analysis via FireEye virtual execution engine
RESTful API for file/URL malware analysis via FireEye virtual execution engine
File and network threat intelligence repository with reputation lookups
File and network threat intelligence repository with reputation lookups
Enterprise file analysis platform for high-volume malware detection
Enterprise file analysis platform for high-volume malware detection
AI-powered file & software analysis platform for threat detection & risk assessment
AI-powered file & software analysis platform for threat detection & risk assessment
CDR API for file sanitization via Content Disarm & Reconstruction
CDR API for file sanitization via Content Disarm & Reconstruction
AI-powered malware detection service with web interface and API access
AI-powered malware detection service with web interface and API access
Malware analysis platform using emulation-based sandbox technology
Malware analysis platform using emulation-based sandbox technology
Visual AI-based malware detection converting files to images for analysis
Visual AI-based malware detection converting files to images for analysis
Yara rule generator using VirusTotal code similarity feature code-similar-to.
Yara rule generator using VirusTotal code similarity feature code-similar-to.
A threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon.
A threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon.
A tool for extracting IOCs from various input sources and converting them into JSON format.
A tool for extracting IOCs from various input sources and converting them into JSON format.
A tool to extract indicators of compromise from security reports in PDF format.
A tool to extract indicators of compromise from security reports in PDF format.
A modular tool for collecting intelligence sources for files and outputting in CSV format.
A modular tool for collecting intelligence sources for files and outputting in CSV format.
LOKI is a simple IOC and YARA Scanner for Indicators of Compromise Detection.
LOKI is a simple IOC and YARA Scanner for Indicators of Compromise Detection.
A PowerShell module for interacting with VirusTotal to analyze suspicious files and URLs.
A PowerShell module for interacting with VirusTotal to analyze suspicious files and URLs.
An Open Source solution for management of Threat Intelligence at scale, integrating multiple analyzers and malware analysis tools.
An Open Source solution for management of Threat Intelligence at scale, integrating multiple analyzers and malware analysis tools.
Open Source Intelligence solution for threat intelligence data enrichment and quick analysis of suspicious files or malware.
Open Source Intelligence solution for threat intelligence data enrichment and quick analysis of suspicious files or malware.
Get strategic cybersecurity insights in your inbox
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs