Loading...
Browse 51 file scanning tools
Distributed file scanning platform with centralized orchestration & control
Secure file transfer platform with multi-engine malware scanning & CDR
Data diode & security gateway for secure unidirectional OT/IT data transfer
Deep learning-based malware detection for NAS storage environments
File and URL scanning service for malware and threat detection
Protects endpoints from peripheral and removable media threats with multiscanning
A powerful directory/file, DNS and VHost busting tool written in Go.
VirusTotal API v3 is a threat intelligence platform for scanning files, URLs, and IP addresses, and retrieving reports on threat reputation and context.
Cloud-based virus scan APIs for securing files, URLs, and content uploads with advanced anti-virus and malware scanning capabilities.
A powerful tool for detecting and identifying malware using a rule-based system.
ClamAV is an open-source antivirus engine that detects trojans, viruses, malware, and other malicious threats.
An OCaml Ctypes wrapper for the YARA matching engine that enables malware identification capabilities in OCaml applications.
A python3 application for querying sites hosting publicly pasted data and scanning for sensitive information.
Analyze suspicious files, domains, IPs, and URLs to detect malware and other breaches, and share results with the security community.
Scan files with Yara, match findings to VirusTotal comments.
A library for checking potentially malicious files and archives using YARA and making a decision about their harmfulness.
Laika BOSS is a scalable object scanner and intrusion detection system that extracts child objects, applies security flags, and generates metadata from files for security analysis.
FSF is a modular, recursive file scanning solution that enables analysts to extend the utility of Yara signatures and define actionable intelligence within a file.
A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.
A collection of Yara signatures for identifying malware and other threats
Get strategic cybersecurity insights in your inbox