You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Modernize setup to an installable package supporting pyproject.toml,
Hatch and easy pipx installation. Command can now be called from a
global entry point called `inquestlabs`.
- Inline dependencies in the package spec and deprecate requirements.txt.
- Unify version output from package metadata.
- Update documentation in README.md.
Tests: 88 passed in 1.31s
A Pythonic interface and command line tool for interacting with the [InQuest Labs](https://labs.inquest.net) API. Note that an API key is *not* required to interact with this API. An API key does provide the ability to increase their lookback, remove rate limitations, and download available samples. Users can sign-in via OAuth to generate API keys. There is no cost to sign-in. Authentication is supported via LinkedIn, Twitter, Google, and Github.
7
+
A Pythonic interface and command line tool for interacting with the
8
+
[InQuest Labs](https://labs.inquest.net) API. Note that an API key is *not*
9
+
required to interact with this API. An API key does provide the ability to
10
+
increase their lookback, remove rate limitations, and download available
11
+
samples. Users can sign in via OAuth to generate API keys. There is no cost to
12
+
sign in. Authentication is supported via LinkedIn, Twitter, Google, and
13
+
Github.
8
14
9
-
Searchable API documentation with multi-language snippets: https://labs.inquest.net/docs/
15
+
Searchable API documentation with multi-language snippets:
*[Axial R4PTOR](https://ax1al.com/projects/r4pt0r) from
98
+
[@AXI4L](https://twitter.com/AXI4L).
66
99
67
100
Get in touch or issue a pull-request to get your project listed.
68
101
69
102
## Testing
70
103
71
-
Use pytest to test each case (or individually by specifying which file to test):
104
+
Use pytest to test each case (or individually by specifying which file to
105
+
test):
72
106
73
107
`pytest tests/*`
74
108
75
109
## The Trystero Project
76
110
77
-
The vast majority of attacks (>90%) are email borne. The "Trystero Project" is our code name for an experiment that we're actively conducting to measure the security efficacy of the two largest mail providers, Google and Microsoft, against real-world emerging malware. The basic idea is this... let's take real-world threats daily and loop it through the two most popular cloud email providers, Google and Microsoft. We'll monitor which samples make it to the inbox and compare the results over the time. You can rea more, view graphs, explore data, and compare results at [InQuest Labs: Trystero Project](https://labs.inquest.net/trystero). If you're curious to explore the testing corpus further, see the following two command line options:
111
+
The vast majority of attacks (>90%) are email-borne. The "Trystero Project" is
112
+
our code name for an experiment that we're actively conducting to measure the
113
+
security efficacy of the two largest mail providers, Google and Microsoft,
114
+
against real-world emerging malware. The basic idea is this... let's take
115
+
real-world threats daily and loop it through the two most popular cloud email
116
+
providers, Google and Microsoft. We'll monitor which samples make it to the
117
+
inbox and compare the results over the time. You can read more, view graphs,
118
+
explore data, and compare results at [InQuest Labs: Trystero
119
+
Project](https://labs.inquest.net/trystero). If you're curious to explore the
120
+
testing corpus further, see the following two command line options:
78
121
79
122
### List Trystero Days
80
123
81
-
For a list of days we have ran the Trystero Project and the number of samples harvested for each day. Note that `first_record` denotes the earliest record (2020-08-09):
124
+
For a list of days we have ran the Trystero Project and the number of samples
125
+
harvested for each day. Note that `first_record` denotes the earliest record
You can receive further details about each sample from any given daily corpus. Information included is similar to the output of `dfi list` with the addition of `bypasses` that denotes which provider was bypassed and `available_on_labs` which states the sample can be seen on labs.inquest.net:
377
+
You can receive further details about each sample from any given daily corpus.
378
+
Information included is similar to the output of `dfi list` with the addition
379
+
of `bypasses` that denotes which provider was bypassed and `available_on_labs`
380
+
which states the sample can be seen on labs.inquest.net:
0 commit comments