Drag a file, get an instant risk profile with smart heuristics and local SHA‑256 — nothing leaves your browser.
The score aggregates heuristic signals: suspicious extensions, double extensions, hidden characters, MIME/extension mismatches, and unusual size. It is a guide — always verify source and hashes for critical downloads.
Do not open. Verify with the sender, re‑download from the official source, or scan with another tool. For archives, inspect contents before extracting.
Executable types like .exe, .bat, .cmd, .ps1, .jar
can run code. Treat them carefully, especially from email or chat.
Names like invoice.pdf.exe hide the true type. Enable file‑extension visibility in your OS to spot these.
A cryptographic fingerprint. Some vendors list the expected hash — match it before installing software.