Advanced Threat Intelligence Search
Search our comprehensive database of threat samples to aid your security research and investigations.
Begin Your Research
Our database contains thousands of samples of malicious software. Use the search bar above to find threat intelligence by hash, signature, tag or file type.
Search by Hash
Precisely locate malicious code samples using cryptographic fingerprints:
MD532 Characters
SHA140 Characters
SHA25664 Characters
Popular Categories
Browse malware grouped by common threat classifications:
Ransomware
Trojan
Backdoor
Spyware
Rootkit
Worm
Search Tips
- Use hash: prefix for hash searches (e.g. hash:5f4dcc3b5aa765d61d8327deb882cf99)
- Use quotes for exact tag matches (e.g. tag:"banking trojan")
- Combine search terms with AND/OR operators