Skip to content

intezer/analyze-cli

Repository files navigation

intezer-analyze

A cross-platform CLI tool which enables analyzing files with Intezer Analyze.

Prerequisites

Python 3.6 and above

Python and pip should be available in your path

Installation

pip install intezer-analyze-cli

Usage

Proxies

The CLI supports proxies. To use a proxy, set the environment variable HTTP_PROXY or HTTPS_PROXY to the proxy address.

Login

To begin using the cli, first you should login with your API key:

intezer-analyze login <api_key>

If you are running the CLI against an on premise deployment, enter the url:

intezer-analyze login <api_key> http://<address>/api

Analyze

Send a file or a directory for analysis in Intezer Analyze.

Usage

intezer-analyze analyze PATH

Parameters

PATH: Path to file or directory to send the files inside for analysis.

Examples:

Send a single file for analysis:

$ intezer-analyze analyze C:\threat.exe

Send all files in directory for analysis:

$ intezer-analyze analyze C:\files-to-analyze

For complete documentation please run intezer-analyze analyze --help

Analyze hashes file

Send a text file with list of hashes

Usage

intezer-analyze analyze-by-list PATH

Parameters

PATH: Path to txt file.

Example

Send txt file with hashes for analysis:

$ intezer-analyze analyze-by-list ~/files/hashes.txt

For complete documentation please run intezer-analyze analyze-by-list --help

Index

Send a file or a directory for indexing

Usage

intezer-analyze index PATH INDEX_AS [FAMILY_NAME]

Parameters

PATH: Path to file or directory to index

INDEX_AS: malicious or trusted

FAMILY_NAME: The family name (optional)

Example

index a single file:

$ intezer-analyze index ~/files/threat.exe.sample malicious family_name

index all files in directory:

$ intezer-analyze index ~/files/files-to-index trusted

For complete documentation please run intezer-analyze index --help

Index hashes file

Send a text file with list of hashes to index

Usage

intezer-analyze index-by-list PATH --index-as=INDEX [FAMILY_NAME]

Parameters

PATH: Path to txt file

--index-as: malicious or trusted

FAMILY_NAME: The family name (optional)

Example

Send a file with hashes and verdict for indexing:

$ intezer-analyze index-by-list ~/files/hashes.txt --index-as=malicious family_name

For complete documentation please run intezer-analyze index-by-list --help

Upload offline endpoint scan

Upload an offline scan created by running the Intezer Endpoint Scanner with '-o' flag

Usage

intezer-analyze upload-endpoint-scan OFFLINE_SCAN_DIRECTORY

Parameters

OFFLINE_SCAN_DIRECTORY: Path to directory with offline endpoint scan results

Examples:

Upload a directory with offline endpoint scan results:

$ intezer-analyze upload-endpoint-scan /home/user/offline_scans/scan_MYPC_2019-01-01_00-00-00

For complete documentation please run intezer-analyze upload-endpoint-scan --help

Upload multiple offline endpoint scans

Upload multiple offline scans created by running the Intezer Endpoint Scanner with '-o' flag

Usage

intezer-analyze upload-endpoint-scans-in-directory OFFLINE_SCANS_ROOT_DIRECTORY

Parameters

OFFLINE_SCANS_ROOT_DIRECTORY: Path to root directory containing offline endpoint scan results

Examples:

Upload a directory with offline endpoint scan results:

$ intezer-analyze upload-endpoint-scans-in-directory /home/user/offline_scans

For complete documentation please run intezer-analyze upload-endpoint-scans-in-directory --help

Upload all subdirectories with .eml files to analyze

Upload a directory with .eml files

Parameter

UPLOAD_EMAILS_IN_DIRECTORY: Path to root directory containing the .eml files

Examples:

  $ intezer-analyze upload-emails-in-directory /path/to/emails_root_directory

Troubleshooting

The cli produce a log file named intezer-analyze-cli.log in the current working directory. To enable console output, set the environment variable INTEZER_DEBUG=1.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Contributors 8

Languages