TechTuch 360 Defense
search

Core Security Rules

Configure active heuristics for real-time engine analysis.

code_off

Detect Obfuscated Code

Identifies packed or encoded payloads (b64-decode, etc.)

cloud_download

Flag Remote File Inclusion

Monitors dynamic include calls using user-controlled paths.

javascript

Scan JS / TS Files

Deep inspection of client-side logic for vulnerabilities.

bug_report

Heuristic SQLi Detection

Pattern matching for potential SQL injection vectors.

code

Detect Dynamic Evaluation

Flags dynamic code execution patterns.

terminal

Detect Shell Execution

Flags system and passthru similar calls.

key

Detect Hardcoded Credentials

Finds passwords, API keys, and tokens embedded in code.

swap_horiz

SSRF Detection

Detects server-side request forgery patterns.

Custom YARA Rules

Upload proprietary detection logic for custom threats.

upload_file

Drop .yar files here or click to upload

Supports multi-rule syntax.

Active Custom Rules (2)

check_circleinternal_malware_v1.yar
check_circlecloud_exfil_patterns.yar

tuneScanning Sensitivity

Aggression LevelExtreme (75%)
LazyBalancedParanoid
warning

Caution: High Sensitivity

Extreme levels may increase false positives. Recommended for critical production environments only.

Live Engine Data

Rule Coverage

Your active rule configuration covers 98.4% of known CVEs in the current threat landscape.

Global EfficiencyOptimum