Vile Analyziz
Documentation

Four Ways to Upload Files

From one-off browser uploads to fleet-wide endpoint scanning, choose the method that fits your workflow. All methods feed into the same analysis pipeline and produce the same comprehensive report.

Method 1

Browser Upload

Drag-and-drop from any device

The simplest way to analyze a file. Open the portal, drag a file onto the upload area (or click to browse), and your report is generated automatically. No account is required for individual uploads on the free tier.

  • Drag-and-drop or file picker interface in any modern browser
  • Supports files up to 500 MB per upload
  • Progress indicator shows upload and analysis status in real time
  • No software installation required - works on any device with a browser
  • No account required for basic analysis on the free tier
Upload a file now
Method 2

CLI Agent

Background scanning for directories

Install the lightweight command-line agent on any workstation or server. Configure it to watch specific directories, and new files are automatically uploaded for analysis as they appear. The agent runs in the background and reports results back to your portal.

  • Watches configured directories for new and modified files
  • Automatic upload and analysis without manual intervention
  • Supports monitor mode (log and skip) or enforce mode (quarantine blocked files)
  • Heartbeat reporting keeps your agent fleet visible in the portal
  • Available for Windows, macOS, and Linux
Agent setup guide
Method 3

API Upload

Programmatic integration via presigned URLs

Integrate file analysis directly into your workflows, CI/CD pipelines, or custom applications. The API provides a two-step upload process: request a presigned upload URL, then PUT the file directly. Results are delivered via polling, webhook, or the portal.

  • Two-step upload: request presigned URL, then HTTP PUT the file
  • Scoped API keys with configurable permissions
  • Results available via polling, webhook callback, or the portal UI
  • Ideal for CI/CD pipelines, automated workflows, and custom tooling
  • Requires a Pro plan or above for API key access
API documentation
Method 4

Endpoint Agent

Scheduled scanning of servers and workstations

Deploy the endpoint agent across your fleet for continuous, scheduled scanning. The agent enrolls with your tenant, receives policy updates (including blocklists), and reports back to the portal. Manage all agents from a single dashboard.

  • Scheduled scans of configured directories on servers and workstations
  • Automatic enrollment and policy synchronization with your tenant
  • Receives blocklist updates and enforcement configuration remotely
  • Fleet management dashboard shows agent status, last heartbeat, and scan results
  • Supports remote commands: quarantine, restore, and configuration updates
View your agents

Supported File Types

The platform supports over 200 file types across 10 categories. Every upload method accepts the same file types.

Executables (EXE, DLL, ELF, Mach-O)
Documents (PDF, Office, RTF)
Scripts (PowerShell, Python, Bash)
Archives (ZIP, RAR, 7z, TAR)
Packages (APK, MSI, DEB, RPM)
Email (EML, MSG)
Media (PNG, JPG, MP4)
Fonts (TTF, OTF, WOFF)
Configuration (JSON, YAML, XML)
Web (HTML, CSS, WASM)
View all 200+ supported file types

Upload Limits by Plan

Each plan includes a monthly analysis quota. After reaching your monthly limit, uploads are throttled to 10 per day until the next billing cycle. All upload methods share the same quota.

PlanMonthly QuotaMax File SizeUpload Methods
Free50 / month500 MBBrowser
Pro1,000 / month500 MBBrowser, CLI, API
Business10,000 / month500 MBAll methods
Enterprise25,000 / month500 MBAll methods

Enterprise plans include usage-based overage billing at $0.05 per additional analysis beyond the included 25,000. See pricing for full plan details.

What Happens After Upload

Regardless of which upload method you use, every file goes through the same analysis pipeline.

1

The file is securely received and queued for analysis.

2

Multiple detection engines scan the file for known threats, suspicious patterns, and behavioral indicators.

3

Vendor intelligence is gathered by identifying the software publisher from code signatures and metadata.

4

A composite trust score is calculated from five weighted dimensions, and the file is classified into a software category.

5

If approval rules are configured, the file is evaluated against your organization's policies.

6

A comprehensive report is generated and available in the portal. Webhooks and SIEM connectors are notified if configured.

Most files are analyzed automatically with no manual steps. Learn more about how to read your results in the Understanding Reports guide.

Ready to get started?

Upload your first file in seconds. No installation, no account, no commitment.

Was this helpful?