Malcore: Simple File Analysis
  • Malcore API docs
  • Packer Checking
  • Deep Static Analysis
  • PCAP diffing
  • Gather sections
  • Shellcode Emulation
  • Executable File Analysis
  • Binary Diffing
  • Script Analysis
  • Ransom Note Comparison
  • PCAP Analysis
  • Snort Rule Generation
  • Hash Checksum
  • Strings
  • Imports and Exports
  • Status Check
  • Yara Rule Scanning
  • Parse Exif Data
  • Domain Analysis
  • Threat Score
  • Execute From URL
  • Document File Analysis
  • URL Checking
  • Browser Extension Analysis
  • Android Permission Lookup
  • AndroidManifest Parsing
  • Phone Application Analysis
  • Dynamic Analysis
  • Threat Feed
  • AI Classifier
  • Scan Results Manipulation
Powered by GitBook
On this page
  • [ POST ] https://api.malcore.io/api/urlcheck
  • Path Params
  • Headers
  • Request
  • Response

URL Checking

[ POST ] https://api.malcore.io/api/urlcheck


Path Params

  • url string

Headers

  • apiKey string


Request

curl -X POST https://api.malcore.io/api/urlcheck \
   -H "apiKey: MY-API-KEY" |
   --data "url=http://my.bad/url" \

Response

🟢 200

{
  "threat_level": [
    "UNWANTED_SOFTWARE"
  ],
  "success": true,
  "defanged_url": "hxxp://185.216.71.16/ewe/ewe.exe",
  "time_taken": 0.2167830467224121
}

🔴 400

{}
PreviousDocument File AnalysisNextBrowser Extension Analysis

Last updated 1 year ago