Solved

Virustotal URLs scanning

Posted on 2015-01-29
6
75 Views
Last Modified: 2015-03-04
From Virustotal API web page, I understand that we can write a python code to check against a list of URL from text file.
Can anyone help me with this? I would like to see if the links that user post on our forum is legitimate.

Thank you so much,
0
Comment
Question by:totoroha
  • 3
  • 2
6 Comments
 
LVL 25

Expert Comment

by:clockwatcher
ID: 40578883
Where are you getting stuck?  They have sample code on their site:  https://www.virustotal.com/en/documentation/public-api/#getting-url-scans.  The code formatting is messed up in my IE version.  But it's fine in Chrome.
0
 
LVL 32

Expert Comment

by:DrDamnit
ID: 40579508
What have you tried so far?
0
 

Author Comment

by:totoroha
ID: 40579741
my dream is like having an ultimate tool to compare the hash value, urls to virustotal and get the results back in a excel format form. But my programming skill is not that good, so i'm wrestling with everything now. ^_^
0
VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

 

Author Comment

by:totoroha
ID: 40605768
can anyone help me with this please?
0
 
LVL 25

Accepted Solution

by:
clockwatcher earned 500 total points
ID: 40606044
I have no idea where you are stuck.
0
 

Author Comment

by:totoroha
ID: 40645777
The code that I have it returns some error. So currremtly i'm stuck with it. Beside, my programming skills is not good so it's an obstacle too.
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A brand new malware strain was recently discovered by security researchers at Palo Alto Networks dubbed “AceDeceiver.” This new strain of iOS malware can successfully infect non-jailbroken devices and jailbroken devices alike.
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
Learn the basics of strings in Python: declaration, operations, indices, and slicing. Strings are declared with quotations; for example: s = "string": Strings are immutable.: Strings may be concatenated or multiplied using the addition and multiplic…
Learn the basics of modules and packages in Python. Every Python file is a module, ending in the suffix: .py: Modules are a collection of functions and variables.: Packages are a collection of modules.: Module functions and variables are accessed us…

930 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now