API Documentation

API reference for the Cursed Tools cybersecurity investigation platform.

(Early Alpha) API Endpoints

The Cursed Tools API provides a way for you to integrate the platform's capabilities with your cybersecurity investigation environment and tooling. All registered users automatically receive an API token and encryption key that they can use to access the data behind the UI in a programatic way.

The API WILL change. Right now we want to focus on getting it out to you so you can provide feedback on where you struggle with it, what would ease the burden on you, and how you can make better use of it. Consider it as an early Alpha version meant for exploratory access and feedback.

Base URL

https://api.cursed.tools/

Security & Encryption

Automatic Encryption for All Users when master encryption key is provided

  • All authenticated users receive automatic encryption by default
  • Immediate server-side encryption: Files are encrypted instantly upon upload
  • In-memory only operations: Files are never stored unencrypted on disk
  • Secure transmission: All uploads occur over TLS-encrypted connections
  • Per-file encryption keys: Each file receives its own unique encryption key
  • Per-user key derivation: Your master key is derived from your authentication credentials and we have NO access to it at all

Sharing and Privacy

  • Private by default: All files and analysis jobs are private to your account, with or without the encryption key being provided. IMPORTANT - File and Job visibility is not modifiable through the API endpoint by design, to reduce the chance of mishaps. If you want to share your findings externally it must be done through the UI.
  • Optional sharing: You may choose to make investigations public through the web UI
  • Security risk warning: Public investigations can be accessed by unauthorized third parties if the link is shared
  • User responsibility: Consider the sensitivity of your data before making investigations public and protect your API keys and credentials

Getting Started

Prerequisites

  1. Authentication - Set up your API credentials
  2. File Upload - Learn how to securely upload investigation files

Core Workflow

  1. Authenticate using your API token
  2. Upload files for analysis
  3. Start analysis jobs (EVTX parsing, Sigma rules, etc.). IMPORTANT - When no encryption key is provided the workload will still be private to you, but it won't be encrypted.
  4. Monitor job status until completion
  5. Retrieve results using your credentials (master encryption key is required for encrypted workloads)

API Endpoints

File Management

Windows Event Log Analysis

Sigma Rule Processing

Job Management

Lookup Services

Security Best Practices

API Token Management

  • Store securely: Never commit tokens to version control
  • Rotate regularly: Generate new tokens periodically
  • Monitor usage: Track API call quota consumption through the web UI dashboard

Data Handling

  • Verify file sources: Ensure you have rights to upload and analyze files
  • Review sharing settings: Carefully consider making investigations public
  • Comply with regulations: Follow GDPR, CCPA, and other applicable laws

Support and Resources

Getting Help

  • API Documentation: Comprehensive guides for each endpoint
  • Support Email: [email protected] (include "API Support" in subject)

Rate Limits and Quotas

  • Monitor usage: Track your quota consumption in the dashboard
  • Upgrade plans: Increase limits with paid subscriptions OR remove limitations with our business plans by contacting us at [email protected]
  • Efficient usage: Batch operations when possible to conserve quota

Endpoint Reference (Quick View)

CategoryMethodPathAuth RequiredDescription
File UploadPOST/uploadNoUpload files for encrypted analysis
File ManagementGET/file/listYesList your uploaded files
File ManagementPOST/file/deleteYesDelete files from your account
Job ManagementGET/job/listYesList your analysis jobs
Job ManagementGET/job/{id}Optional*Get job status & results
Job ManagementPOST/job/deleteYesDelete analysis jobs
Windows Event LogsPOST/winevtx/parseNo**Parse EVTX files
Windows Event LogsPOST/winevtx/searchNo**Search EVTX results
Lookup ServicesPOST/lookupNo**Event-ID, file-name, and IOC lookup
Sigma RulesPOST/sigma/fileNo**Run Sigma rules on files
Sigma RulesPOST/sigma/dataNo**Run Sigma rules on data blobs
Sigma RulesPOST/sigma/rulesNo**Retrieve Sigma rule sets

*Public jobs do not require authentication IF they were explicitly shared. Otherwise, authentication is required.

**Providing authentication credentials ensures that the operations you perform are locked down to your user account and your data.


Usage Pattern

All requests must include X-Cursed-Api-Token. Endpoints that operate on workloads and data that has been encrypted also require X-Cursed-Api-Enc-Key. The following headers are implicit in every example:

X-Cursed-Api-Token: your-api-token
X-Cursed-Api-Enc-Key: your-encryption-key   # Only when accessing encrypted content
Content-Type: application/json              # Unless otherwise noted (e.g. multipart/form-data)

Language Cheat-Sheet

Below is a minimal cheat-sheet showing how to make GET and POST requests using cURL. Replace the URL and payload as needed. You can easily find the alternatives ways to programatically do the request format in different languages via online tutorials or via AI LLMs.

cURL

# GET
curl -X GET "https://api.cursed.tools/analysis/URL" \
  -H "X-Cursed-Api-Token: $API_TOKEN" \
  -H "X-Cursed-Api-Enc-Key: $API_ENC_KEY"

# POST
curl -X POST "https://api.cursed.tools/analysis/URL" \
  -H "X-Cursed-Api-Token: $API_TOKEN" \
  -H "X-Cursed-Api-Enc-Key: $API_ENC_KEY" \
  -H "Content-Type: application/json" \
  -d '{"key":"value"}'

Bash (wget)

wget --header="X-Cursed-Api-Token: $API_TOKEN" \
     --header="X-Cursed-Api-Enc-Key: $API_ENC_KEY" \
     --header="Content-Type: application/json" \
     --post-data='{ "key":"value" }' \
     https://api.cursed.tools/analysis/URL -O response.json

For complete schemas, edge-cases, advanced options, and more extensive support, visit each dedicated endpoint page linked above. We are continuously adding depth—check the changelog for updates.


The Cursed Tools API is designed to provide secure, encrypted access to powerful cybersecurity investigation capabilities while maintaining the highest standards of data protection and user privacy.