Skip to content

Commit

Permalink
Change Docs Links
Browse files Browse the repository at this point in the history
  • Loading branch information
Javier Ramirez Molina committed Nov 20, 2023
1 parent d0fedb2 commit e74b83b
Show file tree
Hide file tree
Showing 10 changed files with 22 additions and 22 deletions.
4 changes: 2 additions & 2 deletions examples/import_yara_ruleset.py
Original file line number Diff line number Diff line change
Expand Up @@ -19,8 +19,8 @@
Read more:
https://www.virustotal.com/gui/hunting-overview
https://developers.virustotal.com/v3.0/reference#livehunt
https://support.virustotal.com/hc/en-us/articles/360000363717-VT-Hunting
https://docs.virustotal.com/reference/list-hunting-rulesets
https://docs.virustotal.com/docs/whats-vthunting
"""

import argparse
Expand Down
4 changes: 2 additions & 2 deletions examples/intelligence_search_to_network_infrastructure.py
Original file line number Diff line number Diff line change
Expand Up @@ -20,8 +20,8 @@
Read more:
https://www.virustotal.com/gui/intelligence-overview
https://developers.virustotal.com/v3.0/reference#intelligence-search
https://support.virustotal.com/hc/en-us/articles/360001387057-VirusTotal-Intelligence-Introduction
https://docs.virustotal.com/reference/search
https://docs.virustotal.com/docs/virustotal-intelligence-introduction
"""

import argparse
Expand Down
14 changes: 7 additions & 7 deletions examples/jupyter/ransomware_report_usecases1.ipynb
Original file line number Diff line number Diff line change
Expand Up @@ -81,13 +81,13 @@
"\n",
"You can easily extract the distribution vectors of those matches thanks to the different relationships related to those observables. More concretely, we are going to focus on these relationships:\n",
"\n",
"* [itw_ips](https://developers.virustotal.com/reference#itw_ips)\n",
"* [itw_urls](https://developers.virustotal.com/reference#files-itw_urls)\n",
"* [itw_domains](https://developers.virustotal.com/reference#files-itw_domains)\n",
"* [compressed_parents](https://developers.virustotal.com/reference#files-compressed_parents)\n",
"* [execution_parents](https://developers.virustotal.com/reference#files-execution_parents)\n",
"* [pcap_parents](https://developers.virustotal.com/reference#files-pcap_parents)\n",
"* [email_parents](https://developers.virustotal.com/reference#files-email_parents)\n",
"* [itw_ips](https://docs.virustotal.com/reference/itw_ips)\n",
"* [itw_urls](https://docs.virustotal.com/reference/files-itw_urls)\n",
"* [itw_domains](https://docs.virustotal.com/reference/files-itw_domains)\n",
"* [compressed_parents](https://docs.virustotal.com/reference/files-compressed_parents)\n",
"* [execution_parents](https://docs.virustotal.com/reference/files-execution_parents)\n",
"* [pcap_parents](https://docs.virustotal.com/reference/files-pcap_parents)\n",
"* [email_parents](https://docs.virustotal.com/reference/files-email_parents)\n",
"\n",
"Please note that as the search is looking for old files, the **retrospection's limitation** that you might have can affect to the number of results that this report provides.\n"
]
Expand Down
4 changes: 2 additions & 2 deletions examples/livehunt_network_watch.py
Original file line number Diff line number Diff line change
Expand Up @@ -19,8 +19,8 @@
Read more:
https://www.virustotal.com/gui/hunting-overview
https://developers.virustotal.com/v3.0/reference#livehunt
https://developers.virustotal.com/docs/nethunt
https://docs.virustotal.com/reference/list-hunting-rulesets
https://docs.virustotal.com/docs/nethunt
"""

import argparse
Expand Down
2 changes: 1 addition & 1 deletion examples/search_and_download_topn_files.py
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
NOTE: In order to use this script you will need to have access to
VT Intelligence or to the Premium API. Learn more about these services at:
https://www.virustotal.com/gui/intelligence-overview
https://developers.virustotal.com/v3.0/reference#search
https://docs.virustotal.com/reference/search
https://www.virustotal.com/learn/
"""

Expand Down
4 changes: 2 additions & 2 deletions examples/search_behavior_mbc.py
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@
NOTE: In order to use this script you will need to have access to
VT Intelligence or to the Premium API. Learn more about these services at:
https://www.virustotal.com/gui/intelligence-overview
https://developers.virustotal.com/v3.0/reference#search
https://docs.virustotal.com/reference/search
https://www.virustotal.com/learn/
"""

Expand Down Expand Up @@ -70,7 +70,7 @@ async def fetch_behavior_reports(self):
while True:
file_hash = await self.queue.get()
# behavior report ID is format SHA256_SandboxName
# https://developers.virustotal.com/reference/get-file-behaviour-id
# https://docs.virustotal.com/reference/get-file-behaviour-id
report_id = f'{file_hash}_CAPA'
behavior_report = await client.get_object_async(
f'/file_behaviours/{report_id}')
Expand Down
2 changes: 1 addition & 1 deletion examples/search_similar_files.py
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@
NOTE: In order to use this script you will need to have access to
VT Intelligence or to the Premium API. Learn more about these services at:
https://www.virustotal.com/gui/intelligence-overview
https://developers.virustotal.com/v3.0/reference#search
https://docs.virustotal.com/reference/search
https://www.virustotal.com/learn/
"""

Expand Down
2 changes: 1 addition & 1 deletion vt/feed.py
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ class Feed:
"""Feed represents a stream of objects received from VirusTotal in real-time.
For more information about VirusTotal Feeds see:
https://developers.virustotal.com/v3.0/reference#feeds
https://docs.virustotal.com/reference/file-feed
In the example below the loop iterates forever, retrieving file objects as
they are processed by VirusTotal. For a more elaborate example see the file
Expand Down
6 changes: 3 additions & 3 deletions vt/iterator.py
Original file line number Diff line number Diff line change
Expand Up @@ -26,14 +26,14 @@ class Iterator:
Some endpoints in the VirusTotal API represent a collection of objects, for
example:
`/files/{id}/comments <https://developers.virustotal.com/v3.0/reference#files-comments-get>`_
`/files/{id}/comments <https://docs.virustotal.com/reference/get-comments>`_
`/intelligence/search <https://developers.virustotal.com/v3.0/reference#intelligence-search>`_
`/intelligence/search <https://docs.virustotal.com/reference/search>`_
These collections can be iterated using an instance of this class.
Learn more about collections in the VirusTotal API in:
https://developers.virustotal.com/v3.0/reference#collections
https://docs.virustotal.com/reference/collections-create
The following example iterates over the most recent 200 comments, retrieving
them in batches of 20:
Expand Down
2 changes: 1 addition & 1 deletion vt/object.py
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,7 @@ class Object:
to :meth:`vt.Client.post_object`.
Learn more about objects in the VirusTotal API in:
https://developers.virustotal.com/v3.0/reference#objects
https://docs.virustotal.com/reference/objects
"""

# Attributes from all object types that match any of the following names
Expand Down

0 comments on commit e74b83b

Please sign in to comment.