Introduction
ThreatKit helps users evaluate passwords, URLs, emails (phishing), and files (malware) with explainable results.
Quick Start
- Open the module you need (Password, Link, Phishing, Malware).
- Paste your input and click Scan, Upload, or analyze .
- Review the Saftey Score and Reasons.
Notes
- We Don't store inputs—processing is in memory.
- Use examples to verify behavior before real inputs.
Modules
Password
Safety Score (0–5) + reasons and suggestions.
- Length, dictionary/pattern checks
- Crack Time: Average Time for someone to crack the password
URL
Heuristics for protocol, TLD, length, subdomains, symbols.
- HTTP-only, suspicious TLD, “@” symbol
Phishing
Email header + body signals, highlighted triggers.
- Urgency, spoofed domains, odd links
Malware
Static file checks—no execution—sandbox notes.
- Hashing, MIME/type anomalies
Privacy
Inputs aren’t saved. Files and text are processed in memory only. See Privacy for details.