Metadata-Version: 2.1
Name: pybinaryedge
Version: 0.5
Summary: Python 3 Wrapper for the binary edge API https://www.binaryedge.io/
Home-page: https://github.com/Te-k/pybinaryedge
Author: Tek
Author-email: tek@randhome.io
License: MIT
Description: # pybinaryedge
        
        Python 3 Wrapper for the BinaryEdge API https://www.binaryedge.io/. See the [APIv2 documentation](https://docs.binaryedge.io/api-v2/) for more information, or the documentation for this library on [Read the Docs](https://pybinaryedge.readthedocs.io/en/latest/index.html).
        
        ## Installation
        
        To install this tool, it is recommended to use [virtual environments](https://docs.python.org/3/tutorial/venv.html).
        
        You can install it directly from [pypi](https://pypi.org/) with `pip install pybinaryedge`.
        
        You can Then you can install it directly from sources :
        ```
        git clone https://github.com/Te-k/pybinaryedge.git
        cd pybinaryedge
        pip install .
        ```
        
        If you use [pipenv](https://pipenv.readthedocs.io/en/latest/), you can run instead :
        ```
        git clone https://github.com/Te-k/pybinaryedge.git
        cd pybinaryedge
        pipenv install
        ```
        
        You need to have an account on the [Binary Edge platform](https://www.binaryedge.io/), create an API key, and configure the CLI tool to use it with `binaryedge config --key KEY`
        
        ## API
        
        See the documentation on [Read the Docs](https://pybinaryedge.readthedocs.io/en/latest/index.html).
        
        Example :
        ```python
        from pybinaryedge import BinaryEdge
        
        be = BinaryEdge(API_KEY)
        # Iterate over the first page of IPs having specific ssh configuration
        search = 'ssh.algorithms.encryption.keyword:"aes256-cbc" ssh.banner.keyword:"SSH-2.0-OpenSSH_LeadSec"'
        results = be.host_search(search)
        for ip in results['events']:
            print("%s" %(ip['target']['ip']))
        ```
        
        List of functions implemented :
        * `host(IP)` : [Details about an Host](https://docs.binaryedge.io/api-v2/#v2queryiptarget)
        * `host_historical(IP)` : [Details about an Host, with data up to 6 months](https://docs.binaryedge.io/api-v2/#v2queryiphistoricaltarget)
        * `host_search(QUERY, PAGE)` : [List of recent events for the given query](https://docs.binaryedge.io/api-v2/#v2querysearch)
        * `host_score(IP)` : [IP Scoring of an host.](https://docs.binaryedge.io/api-v2/#v2queryscoreiptarget)
        * `host_vulnerabilities(IP)` : list of CVE vulnerabilities that may affect a host
        * `image_ip(IP)` : [Details about Remote Desktops found on an Host](https://docs.binaryedge.io/api-v2/#v2queryimageipip)
        * `image_search(QUERY, PAGE)` : [Remote Desktops based on a Query](https://docs.binaryedge.io/api-v2/#v2queryimagesearch)
        * `image_tags()` : [Get the list of possible tags for the images](https://docs.binaryedge.io/api-v2/#v2queryimagetags)
        * `torrent_ip(IP)` : [Details about torrents transferred by an Host](https://docs.binaryedge.io/api-v2/#v2querytorrentiptarget)
        * `torrent_historical_ip(IP)` : [Details about torrents transferred by an Host, with data up to 6 months](https://docs.binaryedge.io/api-v2/#v2querytorrenthistoricaltarget)
        * `dataleaks_email(EMAIL)` : [Verify which dataleaks affect the target email](https://docs.binaryedge.io/api-v2/#v2querydataleaksemailemail)
        * `dataleaks_organization(DOMAIN)` : [Verify how many emails are affected by dataleaks for a specific domain](https://docs.binaryedge.io/api-v2/#v2querydataleaksorganizationdomain)
        * `dataleaks_info()` : [Get the list of dataleaks our platform keeps track.](https://docs.binaryedge.io/api-v2/#v2querydataleaksinfo)
        * `domain_subdomains(DOMAIN, PAGE)` : [Return list of subdomains known from the target domain](https://docs.binaryedge.io/api-v2/#v2querydomainssubdomaintarget)
        * `domain_dns(DOMAIN, PAGE)` : [Return list of dns results known from the target domain.](https://docs.binaryedge.io/api-v2/#v2querydomainsdnstarget)
        * `domain_ip(IP, PAGE)`: [Return records that have the specified IP in their A or AAAA records.](https://docs.binaryedge.io/api-v2/#v2querydomainsiptarget)
        * `sensor_ip(TARGET)`: [Details about an Scanner. List of recent events form the specified host, including details of scanned ports, payloads and tags.](https://docs.binaryedge.io/api-v2/#v2querysensorsiptarget)
        * `sensor_search(QUERY, PAGE)`: [Events based on a Query.](https://docs.binaryedge.io/api-v2/#v2querysensorssearch)
        * `sensor_search_status(QUERY, TYPE, DAYS)`: [Statistics of events for the given query.](https://docs.binaryedge.io/api-v2/#v2querysensorssearchstats)
        : `stats(QUERY, TYPE, PAGE)`: [Statistics of recent events for the given query.](https://docs.binaryedge.io/api-v2/#v2querysearchstats)
        
        ## CLI
        
        This library also implements a CLI binaryedge tool :
        ```
        usage: binaryedge [-h] {config,ip,search,dataleaks} ...
        
        Request BinaryEdge API
        
        positional arguments:
          {config,ip,search,dataleaks}
                                Commands
            config              Configure pybinary edge
            ip                  Query an IP address
            search              Search in the database
            dataleaks           Search in the leaks database
            domains             Search information on a domain
        
        optional arguments:
          -h, --help            show this help message and exit
        ```
        
        Example :
        ```
        $ binaryedge config --key KEY
        $ binaryedge ip -i 149.202.178[.]130
        {
            "events": [
                {
                    "port": 27017,
                    "results": [
                        {
                            "origin": {
                                "country": "sg",
                                "ip": "172.104.173.35",
                                "module": "grabber",
                                "ts": 1536782325059,
                                "type": "service-simple"
        [SNIP]
        ```
        
        ## Changelog
        
        * 0.5 : fix bugs in the doc and code. Add support for `host_vulnerabilities`
        * 0.4: Add support for [BinaryEdge sensors](https://docs.binaryedge.io/api-v2/#v2querysensorsiptarget)
        
        ## License
        
        This code is published under MIT license
        
Keywords: osint
Platform: UNKNOWN
Classifier: Programming Language :: Python :: 3
Classifier: License :: OSI Approved :: MIT License
Classifier: Operating System :: OS Independent
Description-Content-Type: text/markdown
