Skip to main content

Python library to access the RST Cloud API.

Project description

rstapi-python

Python 3 library for using the various threat intelligence RST Cloud APIs:

  • RST Threat Feed
  • RST Report Hub
  • RST Noise Control
  • RST IoC Lookup
  • RST Whois API
  • RST Scan API (Cobalt Strike beacon, SSL certificate, favicon, HTML body/JS, screenshots)
  • Connectivity (/auth/check — API key validation and request quota / remaining usage)

Installation

To install with pip run pip install rstapi

Usage

See GitHub source https://github.com/rstcloud/rstapi-python for further details and example usage. The file test.py includes examples.

See RST Cloud API docs here: https://www.rstcloud.com/api-docs/

An API token is required to use the RST Cloud API. You can request a RST Cloud API token by contacting trial@rstcloud.net, generating it online https://www.rstcloud.com/#free-trial, or reaching out your account representative.

The better way is to setup an environment variable RST_API_KEY and call it without specifing the key in the code.

import rstapi
c = rstapi.ioclookup()
c.GetIndicator("1.1.1.1")

However, you can explicitly pass a token in the api client constructor:

import rstapi
c = rstapi.ioclookup(APIKEY="YOUR_API_KEY")
c.GetIndicator("1.1.1.1")

Products

RST Threat Feed

A comprehensive threat intel feed of indicators (IP, Domain, URL, Hash) with their relationships to malware, TTPs, tools, threat groups, sectors, CVE, and other objects.

Compiled from over 260 sources, including Twitter, Telegram, online sandboxes (Any.Run, Hybrid Analysis, VMRay, etc.), threat reports, CERTs, malware research sites, GitHub, pastebin, closed sources and our global RST Honeypot network.

Read more: https://www.rstcloud.com/rst-threat-feed/

RST Report Hub

An electronic library of threat reports from hundreds of security companies, individual researchers and cyber communities.

These reports undergo transformation from human-readable formats to machine-readable ones, including STIX 2.1. Extensive multilingual translation, archiving as PDFs, and summarization are conducted. Key data, encompassing threat actors, names, software, CVEs, geolocation, industry, etc., is automatically extracted, with due credit to the original report author.

Read more: https://www.rstcloud.com/rst-report-hub/

RST Noise Control

A service that can be used with TIP, SOAR, or SIEM solutions to minimise the noise coming from False Positive indicators. Make sure that CDN IPs, known domains, common URLs, or hashes of calc.exe don’t trigger alerts.

This API employs over 110 rulesets and incorporates 12 GB of individual exceptions, to check if indicators are “known-good” and to be considered noise.

Read more: https://www.rstcloud.com/rst-noise-control/

RST IoC Lookup

An API to check individual values if they are a suspicious or malicious indicator (IP, Domain, URL, Hash). Offering dynamic scoring and automatic decay of outdated indicators, the service ensures fair request rate with low cost.

Ideal for real-time checks in SOAR or be integration into custom applications for online user connection scrutiny.

Read more: https://www.rstcloud.com/rst-ioc-lookup/

RST Scan API

Scan external targets for Cobalt Strike beacons, SSL certificates, favicons, HTML content and JavaScript, and page screenshots (first frame, full page, last frame). All operations use public URLs or IP:port targets as documented in the RST Cloud API.

import rstapi
s = rstapi.scan()
s.GetSslCertificate("198.51.100.1:443")
s.GetHtmlScreenshotFirst("https://example.com", path="shot.png")  # decodes image_base64 to shot.png
import rstapi
q = rstapi.connectivity().CheckApiKey()
remaining = q.get("quota", {}).get("remaining")  # requests left in the current period

RST Whois API

A service to get actual registration info in JSON format for a given domain without limitations on speed and no ban from WHOIS servers. The results include whenever possible:

  • Data in a unified JSON format
  • Registrar and registrant info
  • Age of the domain
  • Dates (registered, updated, expires)
  • Raw response from WHOIS servers

Read more: https://www.rstcloud.com/rst-whois-api/

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

rstapi-1.1.0.tar.gz (16.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

rstapi-1.1.0-py3-none-any.whl (13.0 kB view details)

Uploaded Python 3

File details

Details for the file rstapi-1.1.0.tar.gz.

File metadata

  • Download URL: rstapi-1.1.0.tar.gz
  • Upload date:
  • Size: 16.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.9

File hashes

Hashes for rstapi-1.1.0.tar.gz
Algorithm Hash digest
SHA256 44fba4f1c99415c7541511f2130720707bab0dd25633cda9ef298317d6d91aaf
MD5 c14286bbcba9a431362865ab04b4fc9f
BLAKE2b-256 f2058e47b1fa5647b7ca16816209b609a3eb8e89bcdcf3a56ee5b4cb87e69180

See more details on using hashes here.

File details

Details for the file rstapi-1.1.0-py3-none-any.whl.

File metadata

  • Download URL: rstapi-1.1.0-py3-none-any.whl
  • Upload date:
  • Size: 13.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.9

File hashes

Hashes for rstapi-1.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 e42aa02c182611ecceed89d7f8b193faa6649989e3cf46c09c1091142c506f15
MD5 297772121722c733b59f21afaba6b836
BLAKE2b-256 ad7bd50836f0212195b90dd52f438a9bf11b9ed8d1234e02cd2e9d9255badd08

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page