Introduction

ThreatKit helps users evaluate passwords, URLs, emails (phishing), and files (malware) with explainable results.


Quick Start

  1. Open the module you need (Password, Link, Phishing, Malware).
  2. Paste your input and click Scan, Upload, or analyze .
  3. Review the Saftey Score and Reasons.
Notes
  • We Don't store inputs—processing is in memory.
  • Use examples to verify behavior before real inputs.

Modules

Password

Safety Score (0–5) + reasons and suggestions.

  • Length, dictionary/pattern checks
  • Crack Time: Average Time for someone to crack the password
URL

Heuristics for protocol, TLD, length, subdomains, symbols.

  • HTTP-only, suspicious TLD, “@” symbol
Phishing

Email header + body signals, highlighted triggers.

  • Urgency, spoofed domains, odd links
Malware

Static file checks—no execution—sandbox notes.

  • Hashing, MIME/type anomalies

Privacy

Inputs aren’t saved. Files and text are processed in memory only. See Privacy for details.