Zero‑execution malware triage with hash & entropy.
MetaScan performs static analysis on uploaded binaries to compute entropy and cryptographic hashes, then surfaces an immediate verdict: clean, suspicious, or malicious — without ever executing your file.
MetaScan focuses on static indicators: cryptographic hashes and Shannon entropy. These allow quick correlation with known malware families and packed or obfuscated binaries, without needing execution.
Files are received over TLS, validated for size and type, and stored only in memory buffers during analysis. Dangerous content is never executed on the host system at any point.
MetaScan computes MD5, SHA‑1, and SHA‑256 fingerprints and estimates the file's entropy distribution, surfacing high‑entropy regions characteristic of packed or obfuscated malware.
The backend returns a normalized verdict (clean, unknown, malicious) and, where available, malware family and type hints to accelerate triage in security operations workflows.
Designed to drop into your existing triage pipeline: from analysts manually uploading samples to automated pre‑processing in CI/CD and email security tooling.
MetaScan is intentionally minimal: it performs static inspection and immediately discards the uploaded file. Integrate it as an additional signal alongside EDR, sandboxing, and threat intel platforms.
The UI you see above uses the same backend endpoint exposed to your automation. Use it from your pipelines by POSTing a file to the scan route.
Submit a multipart/form-data request with a single file field named file. The response includes verdict, hashes, entropy, and optional malware family/type metadata.
curl -X POST https://metascan.blog/scan/file -F "file=@/path/to/sample.bin"
MetaScan is developed by a multidisciplinary security team focused on malware analysis, static detection systems, and offensive research tooling.
Static malware analysis, entropy profiling, and backend triage system design, EMBER Dataset.
GitHubAPI architecture, file ingestion pipeline, and analysis engine optimization.
GitHubMalware family mapping, classification research, and enrichment logic.
GitHubUI architecture, dashboard logic, and enterprise interface design.
GitHubEntropy modeling, statistical threshold tuning, and anomaly detection research to improve malware classification accuracy.
GitHubMalware dataset analysis, clustering research, and intelligence-driven enrichment for classification workflows.
GitHub