-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Co-authored-by: Madhushree Ray <[email protected]>
- Loading branch information
1 parent
8d00165
commit 88744cb
Showing
9 changed files
with
654 additions
and
46 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
name: Release Steampipe Anywhere Components | ||
|
||
on: | ||
push: | ||
tags: | ||
- 'v*' | ||
|
||
|
||
jobs: | ||
anywhere_publish_workflow: | ||
uses: turbot/steampipe-workflows/.github/workflows/steampipe-anywhere.yml@main | ||
secrets: inherit |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,18 +1,38 @@ | ||
# Table: virustotal_domain | ||
--- | ||
title: "Steampipe Table: virustotal_domain - Query VirusTotal Domain Reports using SQL" | ||
description: "Allows users to query Domain Reports in VirusTotal, specifically providing detailed information about a domain, including the detection of potentially malicious activities." | ||
--- | ||
|
||
Get information about a domain including WHOIS, popularity, DNS and more. | ||
# Table: virustotal_domain - Query VirusTotal Domain Reports using SQL | ||
|
||
Note: An `id` (registered domain name) must be provided in all queries to this table. | ||
VirusTotal is a free online service that analyzes files and URLs for viruses, worms, trojans and other kinds of malicious content. It aggregates many antivirus products and online scan engines to check for viruses that the user's own antivirus solution may have missed, or to verify against any false positives. Domain Reports in VirusTotal provide detailed information about a domain, including the detection of potentially malicious activities. | ||
|
||
## Table Usage Guide | ||
|
||
The `virustotal_domain` table provides insights into Domain Reports within VirusTotal. As a cybersecurity analyst, explore domain-specific details through this table, including detections, resolutions, and subdomains. Utilize it to uncover information about domains, such as those linked with malicious activities, the resolved IPs, and the detection of potentially harmful subdomains. | ||
|
||
**Important Notes** | ||
- You must specify the `id` (registered domain name) in the `where` clause to query this table. | ||
|
||
## Examples | ||
|
||
### Get domain information | ||
Explore the detailed information associated with a specific domain to understand its characteristics and potential security risks. This can be particularly useful for cybersecurity analysis and threat detection. | ||
|
||
```sql | ||
```sql+postgres | ||
select | ||
* | ||
from | ||
virustotal_domain | ||
where | ||
id = 'steampipe.io' | ||
id = 'steampipe.io'; | ||
``` | ||
|
||
```sql+sqlite | ||
select | ||
* | ||
from | ||
virustotal_domain | ||
where | ||
id = 'steampipe.io'; | ||
``` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,24 +1,45 @@ | ||
# Table: virustotal_search | ||
--- | ||
title: "Steampipe Table: virustotal_search - Query VirusTotal Search Results using SQL" | ||
description: "Allows users to query VirusTotal search results. This table provides a comprehensive view of the antivirus scan results, website scanning, and URL/domain blacklisting." | ||
--- | ||
|
||
Perform simple searches for VirusTotal. | ||
# Table: virustotal_search - Query VirusTotal Search Results using SQL | ||
|
||
Note: A search `query` must be provided in all queries to this table. | ||
VirusTotal is a service that analyzes files and URLs for viruses, worms, trojans, and other kinds of malicious content. It aggregates information from many antivirus and URL scanners to provide a comprehensive view of antivirus scan results, website scanning, and URL/domain blacklisting. This service is useful for detecting malicious content and understanding the security landscape. | ||
|
||
## Table Usage Guide | ||
|
||
The `virustotal_search` table provides insights into the search results from VirusTotal. As a security analyst, explore the details of antivirus scan results, website scanning, and URL/domain blacklisting through this table. Utilize it to uncover information about potential security threats, such as malware, trojans, and other malicious content. | ||
|
||
**Important Notes** | ||
- You must specify the `query` in the `where` clause to query this table. | ||
|
||
## Examples | ||
|
||
### Simple searches (free tier) | ||
|
||
Explore various internet entities like websites, IP addresses, and file hashes for potential security threats by cross-referencing them with the VirusTotal database. This is useful for identifying potential risks associated with these entities, helping to maintain cybersecurity. | ||
The free tier only supports simple search terms for hashes and IDs. | ||
|
||
This example combines simple searches of different types into a single | ||
consistent result set. | ||
|
||
```sql | ||
|
||
```sql+postgres | ||
select * from virustotal_search where query = 'github.com' | ||
union | ||
select * from virustotal_search where query = 'https://turbot.com' | ||
union | ||
select * from virustotal_search where query = '76.76.21.21' | ||
union | ||
select * from virustotal_search where query = '8739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85' | ||
select * from virustotal_search where query = '8739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85'; | ||
``` | ||
|
||
```sql+sqlite | ||
select * from virustotal_search where query = 'github.com' | ||
union | ||
select * from virustotal_search where query = 'https://turbot.com' | ||
union | ||
select * from virustotal_search where query = '76.76.21.21' | ||
union | ||
select * from virustotal_search where query = '8739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85'; | ||
``` |
Oops, something went wrong.