Analyze suspicious office documents to detect embedded executables or exploits. Find encrypted embedded executables common to APT malware attacks. Enhance your email or network malware detection in line with your existing commercial AV product by adding cryptam to your network to detect new and emerging threats with traditionally low AV detection rates. API on GitHub

File upload to the cryptam document scanner.

Document sample:

Email (optional emailed report):

Keep private, do not publish in recent malware detections.

Comments or spear phishing email:

This will take a minute.


See a chart of current document exploit threats here.