X-force, IBM Security utilitary library in python. Search and query all sources: threat_activities and groups, malware_analysis, industries
pip3 install XForce
Using you API_KEY make a basic authentication. See . After make a base64 code → Key + : + Password:
printf "d2f5f0f9-2995-42c6-b1dd-4c92252da129:06c41d5e-0604-4c7c-a599-300c367d2090" | base64 # ZDJmNWYwZjktMjk5NS00MmM2LWIxZGQtNGM5MjI1MmRhMTI5OjA2YzQxZDVlLTA2MDQtNGM3Yy1hNTk5LTMwMGMzNjdkMjA5MAo=
Using API_KEY, call functions. See for key storage
import XForce # Args: 1 - Term of search, 2 - API KEY # Threat activity search return in string XForce.threat_activities(Term, API_KEY) # Malware analysis search return in string XForce.malware_analysis(Term, API_KEY) # Threat groups search return in string XForce.threat_groups(Term, API_KEY) # Industries search return in string XForce.industries(Term, API_KEY) # All categories search return in list with dict XForce.industries(Term, API_KEY)
For see more details of consult, run:
from XForce import details # Args: 1 - GUID, 2 - API KEY # IMPORTANT: all GUID are correspondent to category # All function of details have: # url → with x-force exchange panel details.activity(Id, API_KEY) details.group(Id, API_KEY) details.malware(Id, API_KEY) details.industry(Id, API_KEY)
Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…
Ubuntu users often download software directly from developer websites instead of using the default app…
Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…