Cyber Security and Privacy Foundation

Malware Analyzer

End users can upload file to check for malware. if pdf/doc/docx/image is having malware use CDR box to get clean file

File Hash Check

Check a file hash is malicious or not. Use SHA256 hash type.

Content Disarm and Reconstruction(CDR) Image

Are you scared image you received might have malware? Use CDR to get clean image.

Allowed File Extensions: jpg/jpeg, png, webp, bmp, gif

Content Disarm and Reconstruction(CDR) Doc/PDF

Are you scared doc/pdf you received might have malware? Use CDR to get clean file.

Allowed File Extensions: doc/docx, pdf

Fake Email Checker

Check if an email is temporary or disposable.

Multiple Fake Email Check

Check if multiple emails are temporary or disposable.

Allowed File Extensions: "csv". The file can contain only one column with the header as 'email'.

IP Reputation Checker

Check the reputation of an IP address (only IPv4 format).

Data Breach Checker

Check if an email is found in any data breaches.

Shieldsup Vulnerability Scanner

ShieldsUp is a vulnerability scanner that allows you to scan your site and identify security vulnerabilities.

Example: If you sign up with the email address user@example.com, you can only scan APIs hosted on example.com and its subdomains like uat.example.com.

API Vulnerability Scanner

API Scanner allows you to scan APIs for security vulnerabilities. Note: You can only scan APIs hosted on domains associated with the email domain used during signup.

You will need OpenAPI Specification (OAS) file to scan the API (YAML format) with API server url inside the file.

Example: If you sign up with the email address user@example.com, you can only scan APIs hosted on example.com and its subdomains like api.example.com.