API Bouncer

Buy me a coffee

Security APIs

Security APIs provide authentication, encryption, and access control services. Implement robust security features in your applications including password hashing, token management, and permission systems.

Last verified: April 1, 2026

Common Use Cases

36 Free Security APIs

NameDescriptionAuthHTTPSCORSStatus
Application Environment VerificationAndroid library and API to verify the safety of user devices, detect rooted devices and other risksapikeyYesyesalive
BinaryEdgeProvide access to BinaryEdge 40fy scanning platformapikeyYesyesalive
BitWardenBest open-source password manageroauthYesunknownalive
BotdBotd is a browser library for JavaScript bot detectionapikeyYesyesalive
BugcrowdBugcrowd API for interacting and tracking the reported issues programmaticallyapikeyYesunknownalive
CensysSearch engine for Internet connected host and devicesapikeyYesnoalive
ClassifyEncrypting & decrypting text messagesnoneYesyesdead
Complete Criminal ChecksProvides data of offenders from all U.S. States and Pureto RicoapikeyYesyesalive
CRXcavatorChrome extension risk scoringapikeyYesunknowndead
Dehash.ltHash decryption MD5, SHA1, SHA3, SHA256, SHA384, SHA512noneYesunknowndead
EmailRepEmail address threat and risk predictionnoneYesunknownalive
EscapeAn API for escaping different kind of queriesnoneYesnoalive
FingerprintJS ProFraud detection API offering highly accurate browser fingerprintingapikeyYesyesalive
FraudLabs ProScreen order information using AI to detect fraudsapikeyYesunknownalive
FullHuntSearchable attack surface database of the entire internetapikeyYesunknownalive
GitGuardianScan files for secrets (API Keys, database credentials)apikeyYesnodead
GreyNoiseQuery IPs in the GreyNoise dataset and retrieve a subset of the full IP context dataapikeyYesunknownalive
HackerOneThe industry’s first hacker API that helps increase productivity towards creative bug bounty huntingapikeyYesunknownalive
HashableA REST API to access high level cryptographic functions and methodsnoneYesyesdead
HaveIBeenPwnedPasswords which have previously been exposed in data breachesapikeyYesunknownalive
Intelligence XPerform OSINT via Intelligence XapikeyYesunknownalive
LoginRadiusManaged User Authentication ServiceapikeyYesyesalive
Microsoft Security Response Center (MSRC)Programmatic interfaces to engage with the Microsoft Security Response Center (MSRC)noneYesunknownalive
Mozilla http scannerMozilla observatory http scannernoneYesunknownalive
Mozilla tls scannerMozilla observatory tls scannernoneYesunknownalive
National Vulnerability DatabaseU.S. National Vulnerability DatabasenoneYesunknownalive
PasswordinatorGenerate random passwords of varying complexitiesnoneYesyesalive
Privacy.comGenerate merchant-specific and one-time use credit card numbers that link back to your bankapikeyYesunknownalive
PulsediveScan, search and collect threat intelligence data in real-timeapikeyYesunknownalive
SecurityTrailsDomain and IP related information such as current and historical WHOIS and DNS recordsapikeyYesunknownalive
ShodanSearch engine for Internet connected devicesapikeyYesunknownalive
SpyseAccess data on all Internet assets and build powerful attack surface management applicationsapikeyYesunknownalive
Threat JammerRisk scoring service from curated threat intelligence dataapikeyYesunknowndead
UK PoliceUK Police datanoneYesunknownalive
VirusheeVirushee file/data scanningnoneYesyesdead
VulDBVulDB API allows to initiate queries for one or more items along with transactional botsapikeyYesunknownalive

Getting Started with Security APIs

12 of these APIs require no authentication — you can start making requests immediately without signing up for an account. Just pick one from the table above, check its documentation, and send your first request.

23 APIs in this category require a free API key. This usually means creating a free account on the provider's website and copying your key from the dashboard. The process typically takes less than a minute.

Not sure where to start? Look for APIs marked as "alive" in the status column — these were recently verified as working. For browser-based projects, check that the API supports CORS.

Frequently Asked Questions

Are these Security APIs really free?

Yes, all APIs listed on API Bouncer have a free tier. Some are completely open (no sign-up needed), while others require a free account to get an API key. Free tiers typically have rate limits — check each API's documentation for specifics.

Which Security API should I use for my project?

It depends on your needs. Consider: Do you need authentication or prefer no-auth? Does your project need CORS support for browser access? How many requests will you make? Start with a no-auth API to prototype quickly, then switch to a more feature-rich option if needed.

How do I know if an API is still working?

We run periodic health checks on all listed APIs. The "Status" column shows whether each API was responding at our last check. APIs marked as "alive" were recently verified. You can also test any API yourself using curl or our guides on testing APIs.

Can I use these APIs in a commercial project?

Most free APIs allow commercial use, but terms vary by provider. Always check the specific API's terms of service. Some APIs have separate free and commercial tiers with different rate limits.