Loading...
Browse 139 file analysis tools
NDR platform for IT/OT threat detection with behavioral analysis
NDR platform for IT/OT threat detection with behavioral analysis
EPP antivirus with signature-based and behavioral malware detection
EPP antivirus with signature-based and behavioral malware detection
Sandboxes email attachments to detect malicious behavior via dynamic analysis
Sandboxes email attachments to detect malicious behavior via dynamic analysis
CDR API for file sanitization via Content Disarm & Reconstruction
CDR API for file sanitization via Content Disarm & Reconstruction
Secure kiosk for sanitizing USB & uploaded files using CDR technology
Secure kiosk for sanitizing USB & uploaded files using CDR technology
Malware scanning tool for DFIR using 40+ engines from ReversingLabs
Malware scanning tool for DFIR using 40+ engines from ReversingLabs
GenAI-powered malware analysis tool for unknown and zero-day threats
GenAI-powered malware analysis tool for unknown and zero-day threats
AI-powered malware detection service with web interface and API access
AI-powered malware detection service with web interface and API access
Cloud-based malware prevention engine using ML and sandboxing for file threats
Cloud-based malware prevention engine using ML and sandboxing for file threats
A forensic analysis tool that extracts and parses logs, notifications, and system information from iOS/iPadOS devices and backups.
A forensic analysis tool that extracts and parses logs, notifications, and system information from iOS/iPadOS devices and backups.
Visual AI-based malware detection converting files to images for analysis
Visual AI-based malware detection converting files to images for analysis
A GitHub repository for fuzzing and testing file formats
A free, open-source tool that uncovers persistently installed software on macOS, helping to generically reveal malware.
A free, open-source tool that uncovers persistently installed software on macOS, helping to generically reveal malware.
A comprehensive malware-analysis tool that utilizes external AV scanners to identify malicious elements in binary files.
A comprehensive malware-analysis tool that utilizes external AV scanners to identify malicious elements in binary files.
A C-based steganographic tool that hides files within WAV audio files using least significant bit encoding techniques.
A C-based steganographic tool that hides files within WAV audio files using least significant bit encoding techniques.
Embeddable Yara library for Java with support for loading rules and scanning data.
Embeddable Yara library for Java with support for loading rules and scanning data.
Yara rule generator using VirusTotal code similarity feature code-similar-to.
Yara rule generator using VirusTotal code similarity feature code-similar-to.
A modified version of GNU dd with added features like hashing and fast disk wiping.
A modified version of GNU dd with added features like hashing and fast disk wiping.
Copy executables with execute, but no read permission on Unix systems.
A threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon.
A threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon.
HxD is a freeware hex editor and disk editor with advanced features for editing files, memory, and disks.
HxD is a freeware hex editor and disk editor with advanced features for editing files, memory, and disks.
A project providing open-source YARA rules for malware and malicious file detection
A project providing open-source YARA rules for malware and malicious file detection
Java decompiler for modern Java features up to Java 14.
Comprehensive suite for advanced file analysis and software supply chain security.
Comprehensive suite for advanced file analysis and software supply chain security.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance