Advanced Threat Intelligence Search

Search our comprehensive database of threat samples to aid your security research and investigations.

Begin Your Research

Our database contains thousands of samples of malicious software. Use the search bar above to find threat intelligence by hash, signature, tag or file type.

Search by Hash

Precisely locate malicious code samples using cryptographic fingerprints:

MD5
32 Characters
SHA1
40 Characters
SHA256
64 Characters

Popular Categories

Browse malware grouped by common threat classifications:

Ransomware
Trojan
Backdoor
Spyware
Rootkit
Worm

Search Tips

  • Use hash: prefix for hash searches (e.g. hash:5f4dcc3b5aa765d61d8327deb882cf99)
  • Use quotes for exact tag matches (e.g. tag:"banking trojan")
  • Combine search terms with AND/OR operators