Your central hub for malware analysis and threat hunting.
Live Threat Feed
AbuseIPDB Daily
Blacklist
Fetches the latest blacklist with a minimum
confidence score of 70. (Usage limit: 5 requests/day)
Click the
"Request Blacklist" button to fetch data.
Core Platform Pillars
Threat Hunting Hub
Proactively hunt for threats with AI-generated
queries and CVE watchlists.
Analysis Workbench
Manage cases with an IoC collector and integrated
analyst notebook.
Training Ground
Sharpen your skills with AI-generated analysis
scenarios and challenges.
Collaboration Hub
A collaborative workspace for users who want to
work as a team.
Knowledge Base
A knowledge base you can build yourself
Predictive Threat Modeling
Proactively simulate attacks against your known
defenses (Playbooks) to find gaps before attackers do.
MDAA Status
Versionv1.5.6
AI Model...
API LatencyPinging...
API Status
Checking...
Tool Overview
This application runs entirely in your browser. Your
data and API key are never sent to any server besides the Google AI API endpoint.
All analysis and session data are stored locally on your machine.
Supported AI Models
The model our platform initially supports is Gemini
2.5 Flash for free and your paid plan is Pro.
Gemini 3.0 Pro Preview
Gemini 2.5 Flash
Gemini 2.5 Pro
Gemini 2.5 Flash Lite
Gemini 2.0 Flash
Gemini 2.0 Flash Lite
Statement
The more efficient use of MDAA depends on your Gemini
API KEY plan. This project does not require a paid API to function at this level.
Using a paid API plan is always better. Please consider this before paying for a
Gemini API Key. If you don't have one yet, you can get one at https://aistudio.google.com/api-keys.
Warning
Please use it with caution and ethically.
Predictive Threat Modeling
Proactively simulate attacks against your known defenses
(Playbooks) to find gaps before attackers do.
Adversarial Simulation Setup
Select playbooks to test against (Optional).
If none are selected, AI will assume standard defenses.
MDAA Chat
Your AI assistant for malware analysis
Threat Hunting Hub
Proactively search for threats using AI-powered playbooks and
intelligence.
Threat Actor Playbooks
Select a threat actor to view their common
TTPs and get AI-generated hunting queries.
Hypothesis Builder
Describe a potential threat scenario, and let
AI generate a hunting plan for you.
CVE Exploit Watchlist
Critical vulnerabilities being actively exploited
in the wild. Updated regularly.
Analysis Workbench
Workspace for: No Active Session
IoC Collector
No IoCs collected
for this session yet.
Analyst Notebook
Visual Attack Graph
This graph visualizes the attack chain based on
your analysis.
Use the "Visualize Attack" button on
an AI response to generate a graph.
Training Ground
Sharpen your analysis skills with AI-powered scenarios and
challenges.
Analysis Scenarios
Let AI generate a mock sandbox report for you to
analyze and answer questions about.
Technique Deep Dive
Choose a MITRE ATT&CK technique to get a detailed
explanation from the AI.
"Guess the Threat Actor"
AI will provide a set of TTPs. Can you identify
the threat actor behind them?
PowerShell Deobfuscation
Practice deobfuscating PowerShell scripts to
uncover their true intent.
YARA Rule Writing
Get a malware description and practice crafting a
YARA rule to detect it.
PCAP Analysis
Analyze a fictional network traffic summary to
spot C2 communications.
Memory Forensics
Identify malicious processes from a simulated
memory forensics output.
Phishing Analysis
Dissect fictional phishing emails to find red
flags and malicious indicators.
Log Analysis
Find the attacker's trail in log snippets from
compromised systems.
Reverse Engineering
Explain what a small snippet of malware assembly
code is doing.
Incident Response
Practice your response to a simulated security
incident like ransomware.
Threat Modeling
Practice identifying potential threats in an
application using the STRIDE methodology.
OSINT Challenge
Test your Open-Source Intelligence skills by
investigating a given piece of information.
Report Writing
Structure a formal executive report from a
summary of a security incident.
Settings
Select the language you will use to speak into the
microphone.
Appearance
AI Model Configuration
Select the Gemini model for your analysis. 'Flash' is
faster, while 'Pro' offers more powerful reasoning capabilities.
Security & API Keys
Your API keys are encrypted and stored locally in your browser. For more details on
security, read our
Security
Overview.
Advanced: System Prompt (Session Only)
You can temporarily modify the AI's system
instructions for the current session. Changes will be reset when you close the tab.
(Toon Format)
Collaboration Hub
Team's central command for managing and sharing analysis
cases.
Knowledge Base
Select a playbook from the left to view or edit, or
create a new one to get started.
Summarize Threat Report
Paste the full text of a threat intelligence report below to get an
AI-powered summary.
Unlock Session
Please enter your password to decrypt the API keys for this session.
VirusTotal Analysis
Confirm
Are you sure?
Help us improve
What was wrong with the response? Your feedback will help improve the next
answer.
Enter new name for the chat
Create Custom Playbook
Refine Prompt?
Can AI improve your prompts on using this new action?