Threat intel, encryption & security
Cybersecurity APIs for threat intelligence, encryption services, and security scanning.
Check IPs, domains, and hashes against threat databases.
POST /api/v1/cyber/threat-intel
{ "indicator": "1.2.3.4",
"type": "ip" }
// Response
{ "malicious": true,
"threat_type": "botnet",
"confidence": 95,
"sources": ["virustotal", "abuseipdb"],
"last_seen": "2025-01-15" }
Verify SSL certificates and detect issues.
POST /api/v1/cyber/ssl-check
{ "domain": "example.com" }
// Response
{ "valid": true,
"issuer": "Let's Encrypt",
"expires": "2025-06-15",
"days_remaining": 150,
"grade": "A+",
"issues": [] }
Check password strength and breach status.
POST /api/v1/cyber/password-check
{ "password_hash": "sha1_prefix" }
// Response
{ "strength": "strong",
"score": 4,
"breached": false,
"breach_count": 0,
"suggestions": [],
"crack_time": "centuries" }
Generate MD5, SHA, bcrypt hashes.
POST /api/v1/cyber/hash
{ "data": "my_string",
"algorithm": "sha256" }
// Response
{ "algorithm": "sha256",
"hash": "8f14e45f...",
"encoding": "hex",
"supported": ["md5", "sha1",
"sha256", "sha512", "bcrypt"] }
Encrypt and decrypt data with various algorithms.
POST /api/v1/cyber/encrypt
{ "data": "sensitive_data",
"algorithm": "aes-256-gcm",
"key": "your_secret_key" }
// Response
{ "encrypted": "U2FsdGVk...",
"algorithm": "aes-256-gcm",
"iv": "abc123...",
"tag": "xyz789..." }
Scan websites for common vulnerabilities.
POST /api/v1/cyber/vuln-scan
{ "url": "https://example.com",
"scan_type": "quick" }
// Response
{ "vulnerabilities": [],
"security_headers": {
"hsts": true,
"csp": true },
"risk_score": 15,
"grade": "A" }
Get your API key and start protecting your infrastructure in minutes.