ENTERPRISE MALWARE FILE SCANNER

Zero‑execution malware triage with hash & entropy.

MetaScan performs static analysis on uploaded binaries to compute entropy and cryptographic hashes, then surfaces an immediate verdict: clean, suspicious, or malicious — without ever executing your file.

Static‑only inspection, no execution
SHA256, SHA1, MD5 fingerprints
Entropy‑driven packed malware hints
⦿ Live File Scanner
Backend: /scan/file
Files are streamed to the analysis backend over HTTPS. They are never executed and not persisted on disk.
Ready for analysis
How MetaScan evaluates your files

MetaScan focuses on static indicators: cryptographic hashes and Shannon entropy. These allow quick correlation with known malware families and packed or obfuscated binaries, without needing execution.

Step 1
Pre‑ingest sanity checks

Files are received over TLS, validated for size and type, and stored only in memory buffers during analysis. Dangerous content is never executed on the host system at any point.

Step 2
Hash & entropy profile

MetaScan computes MD5, SHA‑1, and SHA‑256 fingerprints and estimates the file's entropy distribution, surfacing high‑entropy regions characteristic of packed or obfuscated malware.

Step 3
Verdict enrichment

The backend returns a normalized verdict (clean, unknown, malicious) and, where available, malware family and type hints to accelerate triage in security operations workflows.

Built for security & SOC teams

Designed to drop into your existing triage pipeline: from analysts manually uploading samples to automated pre‑processing in CI/CD and email security tooling.

< 2s
Typical single‑file static analysis latency for binaries under 10 MB.
3
Standard cryptographic hashes (MD5, SHA1, SHA256) returned per scan.
Static‑only
No code execution, no outbound callbacks, and no persistence of analyzed payloads.
Security posture

MetaScan is intentionally minimal: it performs static inspection and immediately discards the uploaded file. Integrate it as an additional signal alongside EDR, sandboxing, and threat intel platforms.

Simple HTTP interface

The UI you see above uses the same backend endpoint exposed to your automation. Use it from your pipelines by POSTing a file to the scan route.

HTTP
POST /scan/file

Submit a multipart/form-data request with a single file field named file. The response includes verdict, hashes, entropy, and optional malware family/type metadata.

curl -X POST https://metascan.blog/scan/file -F "file=@/path/to/sample.bin"
Core Team

MetaScan is developed by a multidisciplinary security team focused on malware analysis, static detection systems, and offensive research tooling.

Threat Intelligence, Malware Research & QA
Abhay Aneesh

Static malware analysis, entropy profiling, and backend triage system design, EMBER Dataset.

GitHub
Network Troubleshooting & Hosting
Y Jai Kishore

API architecture, file ingestion pipeline, and analysis engine optimization.

GitHub
Policy Baseline Adherence
Anshit Kashyap

Malware family mapping, classification research, and enrichment logic.

GitHub
Software Testing & Independent Analysis
Aditya Singh

UI architecture, dashboard logic, and enterprise interface design.

GitHub
Detection Modeling & Statistical Analysis
Aryan Sambyal

Entropy modeling, statistical threshold tuning, and anomaly detection research to improve malware classification accuracy.

GitHub
Threat Intelligence & Data Analytics
Raunak Das

Malware dataset analysis, clustering research, and intelligence-driven enrichment for classification workflows.

GitHub