API Bouncer

Buy me a coffee

Security APIs

Security APIs provide authentication, encryption, and access control services. Implement robust security features in your applications including password hashing, token management, and permission systems.

Common Use Cases

36 Free Security APIs

NameDescriptionAuthHTTPSCORSStatus
Application Environment VerificationAndroid library and API to verify the safety of user devices, detect rooted devices and other risksapikeyYesyesunknown
BinaryEdgeProvide access to BinaryEdge 40fy scanning platformapikeyYesyesunknown
BitWardenBest open-source password manageroauthYesunknownunknown
BotdBotd is a browser library for JavaScript bot detectionapikeyYesyesunknown
BugcrowdBugcrowd API for interacting and tracking the reported issues programmaticallyapikeyYesunknownunknown
CensysSearch engine for Internet connected host and devicesapikeyYesnounknown
ClassifyEncrypting & decrypting text messagesnoneYesyesunknown
Complete Criminal ChecksProvides data of offenders from all U.S. States and Pureto RicoapikeyYesyesunknown
CRXcavatorChrome extension risk scoringapikeyYesunknownunknown
Dehash.ltHash decryption MD5, SHA1, SHA3, SHA256, SHA384, SHA512noneYesunknownunknown
EmailRepEmail address threat and risk predictionnoneYesunknownunknown
EscapeAn API for escaping different kind of queriesnoneYesnounknown
FingerprintJS ProFraud detection API offering highly accurate browser fingerprintingapikeyYesyesunknown
FraudLabs ProScreen order information using AI to detect fraudsapikeyYesunknownunknown
FullHuntSearchable attack surface database of the entire internetapikeyYesunknownunknown
GitGuardianScan files for secrets (API Keys, database credentials)apikeyYesnounknown
GreyNoiseQuery IPs in the GreyNoise dataset and retrieve a subset of the full IP context dataapikeyYesunknownunknown
HackerOneThe industry’s first hacker API that helps increase productivity towards creative bug bounty huntingapikeyYesunknownunknown
HashableA REST API to access high level cryptographic functions and methodsnoneYesyesunknown
HaveIBeenPwnedPasswords which have previously been exposed in data breachesapikeyYesunknownunknown
Intelligence XPerform OSINT via Intelligence XapikeyYesunknownunknown
LoginRadiusManaged User Authentication ServiceapikeyYesyesunknown
Microsoft Security Response Center (MSRC)Programmatic interfaces to engage with the Microsoft Security Response Center (MSRC)noneYesunknownunknown
Mozilla http scannerMozilla observatory http scannernoneYesunknownunknown
Mozilla tls scannerMozilla observatory tls scannernoneYesunknownunknown
National Vulnerability DatabaseU.S. National Vulnerability DatabasenoneYesunknownunknown
PasswordinatorGenerate random passwords of varying complexitiesnoneYesyesunknown
Privacy.comGenerate merchant-specific and one-time use credit card numbers that link back to your bankapikeyYesunknownunknown
PulsediveScan, search and collect threat intelligence data in real-timeapikeyYesunknownunknown
SecurityTrailsDomain and IP related information such as current and historical WHOIS and DNS recordsapikeyYesunknownunknown
ShodanSearch engine for Internet connected devicesapikeyYesunknownunknown
SpyseAccess data on all Internet assets and build powerful attack surface management applicationsapikeyYesunknownunknown
Threat JammerRisk scoring service from curated threat intelligence dataapikeyYesunknownunknown
UK PoliceUK Police datanoneYesunknownunknown
VirusheeVirushee file/data scanningnoneYesyesunknown
VulDBVulDB API allows to initiate queries for one or more items along with transactional botsapikeyYesunknownunknown

Getting Started with Security APIs

12 of these APIs require no authentication — you can start making requests immediately without signing up for an account. Just pick one from the table above, check its documentation, and send your first request.

23 APIs in this category require a free API key. This usually means creating a free account on the provider's website and copying your key from the dashboard. The process typically takes less than a minute.

Not sure where to start? Look for APIs marked as "alive" in the status column — these were recently verified as working. For browser-based projects, check that the API supports CORS.

Frequently Asked Questions

Are these Security APIs really free?

Yes, all APIs listed on API Bouncer have a free tier. Some are completely open (no sign-up needed), while others require a free account to get an API key. Free tiers typically have rate limits — check each API's documentation for specifics.

Which Security API should I use for my project?

It depends on your needs. Consider: Do you need authentication or prefer no-auth? Does your project need CORS support for browser access? How many requests will you make? Start with a no-auth API to prototype quickly, then switch to a more feature-rich option if needed.

How do I know if an API is still working?

We run periodic health checks on all listed APIs. The "Status" column shows whether each API was responding at our last check. APIs marked as "alive" were recently verified. You can also test any API yourself using curl or our guides on testing APIs.

Can I use these APIs in a commercial project?

Most free APIs allow commercial use, but terms vary by provider. Always check the specific API's terms of service. Some APIs have separate free and commercial tiers with different rate limits.