Threat Detection and Analysis Tools
These tools are built and maintained by the Perkins Cybersecurity Educational Fund to support defenders, educators, and students.
Each tool below explains exactly what it does, who it helps, and what you can do with it.
Traceix (THRT)
Fast hash lookup for malware research
Search a file hash to see whether it appears in malware classification systems or AI training datasets used for threat analysis.
Best for: analysts, students, and researchers who want quick context on a suspicious sample.
Launch TraceixCortex Agents
Automate intake and triage from a watch folder
Turn a folder into a triage drop zone so files can be collected and processed in a more organized workflow.
Best for: teams or analysts who want less manual sorting and faster sample handling.
Learn MoreSecure Legion
Private messaging designed for anonymity
A serverless private messaging protocol over Tor designed to minimize traceability. No phone numbers, no central logs, and a strong focus on anonymity.
Best for: users who need privacy-first communication tools.
Learn MoreAutomated Untrusted Resource Analyzer (AURA)
Check whether a file looks malicious
Upload a file and use AI-assisted analysis to estimate whether it is malicious or benign. Includes a free and open API for community threat analysis.
Best for: anyone who wants a fast first look at a suspicious file.
Try the File ScannerRansom Note Comparison
Identify ransomware from a ransom note
Upload a ransom note or search by ransomware name to find likely matches, identify the actor or family, and check for decryptor links when available.
Best for: incident response, ransomware investigation, and quick family identification.
Launch Ransom Note MatcherYARA Rule Builder
Create and test YARA rules in your browser
Build custom YARA rules, upload files, and test matches without installing local tooling.
Best for: analysts, students, and educators learning or refining malware detection logic.
Launch YARA BuilderFree VPS for Students & Educators
Get lab infrastructure for hands-on security learning
Request a free virtual private server for reverse engineering, malware analysis, and practical lab work. This initiative is supported by our sponsors.
Best for: students and educators who need a safe place to learn by doing.
Request Your VPS