falconx_sandbox

CrowdStrike FalconPy CrowdStrike FalconPy CrowdStrike Subreddit

Falcon Intelligence Sandbox examples

The examples within this folder focus on leveraging CrowdStrike's Falcon Intelligence Sandbox and Sample Uploads APIs to analyze potential malware in different environments.

Analyze a single file using Falcon Intelligence sandbox

Documentation for the single file scan samples can be found here.

Retrieve all artifacts for all Falcon Intelligence reports

Downloads all artifacts for all Falcon Intelligence reports.

Running the program

In order to run this demonstration, you you will need access to CrowdStrike API keys with the following scopes:

Service Collection
Scope

Falcon Intelligence Sandbox

READ

Execution syntax

This sample leverages simple command-line arguments to implement functionality.

Basic usage

Download all report artifacts.

GovCloud users can change their CrowdStrike region using the -b argument.

Command-line help

Command-line help is available via the -h argument.

Example source code

The source code for this example can be found here.

Last updated

Was this helpful?