{"id":12950,"date":"2025-04-17T11:43:15","date_gmt":"2025-04-17T11:43:15","guid":{"rendered":"\/cybersecurity-blog\/?p=12950"},"modified":"2025-04-18T07:16:08","modified_gmt":"2025-04-18T07:16:08","slug":"sdk-integration","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/sdk-integration\/","title":{"rendered":"Seamlessly Integrate ANY.RUN\u2019s Services into Your Infrastructure via SDK"},"content":{"rendered":"\n<p>Making <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=sdk_integration&amp;utm_term=170425&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s products<\/a> better for the benefit of businesses, organizations, and SOC teams is our top priority. To get maximum value out of our solutions, we provide them with API, a tool enabling users to <a href=\"https:\/\/any.run\/integrations\" target=\"_blank\" rel=\"noreferrer noopener\">integrate<\/a> our services into their security infrastructure. And now, to make this process even smoother, we introduce a <a href=\"https:\/\/github.com\/anyrun\/anyrun-sdk\" target=\"_blank\" rel=\"noreferrer noopener\">software development kit (SDK)<\/a>.&nbsp;<\/p>\n\n\n\n<p>With it, it\u2019s even easier to make ANY.RUN a part of your security system. Data provided by our solutions will help you establish a safer infrastructure and improve the defense strategy of your company.&nbsp;<\/p>\n\n\n\n<p>Learn about ANY.RUN\u2019s SDK features, advantages, and use cases below.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Benefiting the Security Team of Your Company<\/strong>\u00a0<\/h2>\n\n\n\n<p>An SDK is a tool that helps increase the efficiency of your workflow through integration and automation. It simplifies day-to-day tasks for cybersecurity specialists at companies and organizations. This is especially relevant for small security teams who could benefit from automation.&nbsp;<\/p>\n\n\n\n<p>As a result of making ANY.RUN\u2019s products a part of your security infrastructure via an SDK, you can:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Simplify and speed up<\/strong> malware analysis and threat hunting for your security team.&nbsp;<\/li>\n\n\n\n<li><strong>Automate routine tasks<\/strong> to save resources for manual in-depth investigation.&nbsp;<\/li>\n\n\n\n<li><strong>Access data on real threats<\/strong> collected by 500,000 researchers and 15,000 companies worldwide.&nbsp;<\/li>\n\n\n\n<li><strong>Reduce the cost<\/strong> of alert triage, incident investigation, and post-attack response.&nbsp;<\/li>\n\n\n\n<li><strong>Mitigate financial and reputational risks<\/strong> by equipping your defense with advanced solutions for threat analysis and detection.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Our SDK simplifies integration of ANY.RUN\u2019s products into your infrastructure. You can use it for enhanced flexibility, accelerated workflow, and automation of daily tasks. <\/p>\n\n\n\n<p>Tailor the service to the needs of your business with our software development kit by making ANY.RUN\u2019s solutions a part of your system, be that SIEM, SOAR, or XDR.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nAccelerate workflows and increase detection rate <br>in <span class=\"highlight\">your SOC<\/span> by integrating ANY.RUN&#8217;s products via SDK&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=sdk_integration&#038;utm_term=170425&#038;utm_content=linktodemo\" rel=\"noopener\" target=\"_blank\">\nRequest 14-day trial\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Available for All Products<\/strong>\u00a0<\/h2>\n\n\n\n<p>The SDK is available for users with <a href=\"https:\/\/any.run\/cybersecurity-blog\/subscriptions-hunter-plan\/\" target=\"_blank\" rel=\"noreferrer noopener\">the Hunter plan<\/a> subscription, as well as with <a href=\"https:\/\/any.run\/cybersecurity-blog\/anyrun-enterprise-plan\/\" target=\"_blank\" rel=\"noreferrer noopener\">the Enterprise plan<\/a> for teams.&nbsp;<\/p>\n\n\n\n<p>You can use ANY.RUN\u2019s SDK with the entire range of our products. It makes it possible to automatically:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Submit files and links for analysis and download reports with <a href=\"https:\/\/app.any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=sdk_integration&amp;utm_term=170425&amp;utm_content=linktoregistration#register\/\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s Interactive Sandbox<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Browse URLs and file hashes, as well as check IOCs, IOBs, IOAs and receive other data on threats with <a href=\"https:\/\/intelligence.any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=sdk_integration&amp;utm_term=170425&amp;utm_content=linktolookup\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Establish the constant IOCs flow reception with <a href=\"https:\/\/intelligence.any.run\/feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=sdk_integration&amp;utm_term=170425&amp;utm_content=linktotifeeds\" target=\"_blank\" rel=\"noreferrer noopener\">TI Feeds<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>We make sure that the software development kit always complies with the current API version and covers all of its functions, enabling you to&nbsp;always stay on top of things.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How to Implement<\/strong>\u00a0<\/h2>\n\n\n\n<p>ANY.RUN\u2019s software development kit is based on Python, the most popular programming language for malware analysts. It includes documentation, libraries, and code samples for you to explore. For instructions on how to install and use it, see:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/github.com\/anyrun\/anyrun-sdk\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN&#8217;s SDK documentation on GitHub<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/pypi.org\/project\/anyrun-sdk\/\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN&#8217;s SDK documentation on PyPI<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>We welcome contributions from other developers. You can report bugs and suggest enhancements that would be beneficial for your company, and we\u2019ll be happy to review them, resolve the issues, and make adjustments. For more info on how to contribute, see <a href=\"https:\/\/github.com\/anyrun\/anyrun-sdk\/blob\/main\/CONTRIBUTING.md\" target=\"_blank\" rel=\"noreferrer noopener\">our guide<\/a>.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Use Cases of ANY.RUN\u2019s SDK<\/strong>\u00a0<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Save resources on TI Feeds processing<\/strong>&nbsp;<\/h3>\n\n\n\n<p>ANY.RUN\u2019s TI Feeds <a href=\"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\">provide large amounts of data on IOCs<\/a>. To process all of this data efficiently, while keeping RAM load low,&nbsp;you can <a href=\"https:\/\/github.com\/anyrun\/anyrun-sdk\/blob\/main\/examples\/threat_intelligence\/feeds\/iterate_feeds.py\" target=\"_blank\" rel=\"noreferrer noopener\">use the SDK<\/a>. This will help you set up automated download of feeds in chunks, rather than in one go.&nbsp;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code style=\"white-space: pre-wrap\">import os\n\nfrom anyrun.connectors import FeedsConnector\nfrom anyrun.iterators import FeedsIterator\n\n\ndef main():\n\n    with FeedsConnector(api_key) as connector:\n        for feed in FeedsIterator.stix(connector, period='week', chunk_size=5):\n            print(feed)\n\n\nif __name__ == '__main__':\n    api_key = os.getenv('ANY_RUN_FEEDS_API_KEY')\n    main()<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Simplify the submission process in ANY.RUN\u2019s Sandbox<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Instead of manually submitting URLs and downloading analysis summaries in ANY.RUN\u2019s Interactive Sandbox, configure the SDK to automate these processes.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/anyrun\/anyrun-sdk\/blob\/main\/examples\/sandbox\/perform_url_analysis.py\" target=\"_blank\" rel=\"noreferrer noopener\">Code to automate URL submission<\/a>.<\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/anyrun\/anyrun-sdk\/blob\/main\/examples\/sandbox\/analysis_utils.py\" target=\"_blank\" rel=\"noreferrer noopener\">Code to automate analysis summary download<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Conduct YARA Search<\/strong>&nbsp;<\/h3>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/analysis\/yara\" target=\"_blank\" rel=\"noreferrer noopener\">YARA Search<\/a> in TI Lookup allows you to scan our threat intelligence database to find files that match your descriptions.&nbsp;With the SDK, you can receive search results automatically using just <a href=\"https:\/\/github.com\/anyrun\/anyrun-sdk\/blob\/main\/examples\/threat_intelligence\/yara_lookup\/perform_simplified_yara_search.py\" target=\"_blank\" rel=\"noreferrer noopener\">one command<\/a>:&nbsp;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code style=\"white-space: pre-wrap\">import os\nfrom pprint import pprint\n\nfrom anyrun.connectors import YaraLookupConnector\n\n\ndef load_yara_rule() -&gt; str:\n    with open('yara_lookup_rule_sample.txt', 'r') as file:\n        return file.read()\n\n\ndef main():\n    with YaraLookupConnector(api_key) as connector:\n        lookup_result = connector.get_yara(load_yara_rule(), stix=True)\n        pprint(lookup_result)\n\n\nif __name__ == '__main__':\n    api_key = os.getenv('ANY_RUN_Lookup_API_KEY')\n    main()<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Choose a connection method (for any service)<\/strong>&nbsp;<\/h3>\n\n\n\n<p>You can use the SDK to connect to any service synchronously or asynchronously. Both methods include the same parameters and functions. For example, in TI Lookup you can switch between them with these code samples:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/github.com\/anyrun\/anyrun-sdk\/blob\/main\/examples\/threat_intelligence\/lookup\/get_intelligence.py\" target=\"_blank\" rel=\"noreferrer noopener\">Synchronous version<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/github.com\/anyrun\/anyrun-sdk\/blob\/main\/examples\/threat_intelligence\/lookup\/get_intelligence_async.py\" target=\"_blank\" rel=\"noreferrer noopener\">Asynchronous version<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=sdk_integration&amp;utm_term=170425&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Request a trial period<\/a> for your SOC team and explore ANY.RUN\u2019s services with new possibilities brought by the SDK.<\/p>\n\n\n\n<!-- CTA Split START -->\n<div class=\"cta-split\">\n<div class=\"cta__split-left\">\n\n<!-- Image -->\n<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/mcusercontent.com\/663b94f19348582a8dc323efe\/images\/0d88188b-3e89-2314-5a60-cb87e8077326.png\" alt=\"ANY.RUN cloud interactive sandbox interface\" class=\"cta__split-icon\" \/>\n<\/div>\n\n<div class=\"cta__split-right\">\n<div>\n\n<!-- Heading -->\n<h3 class=\"cta__split-heading\"><br>ANY.RUN for Business<\/h3>\n\n<!-- Text -->\n<p class=\"cta__split-text\">\nDiscover all features <br>of the <span class=\"highlight\">Enterprise plan<\/span> designed <br>to simplify the work of companies and security teams.\n<br \/>\n<\/p>\n<\/div>\n<!-- CTA Link -->\n<a target=\"_blank\" rel=\"noopener\" id=\"article-banner-split\" href=\"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/\"><div class=\"cta__split-link\">See details<\/div><\/a>\n<\/div>\n<\/div>\n<!-- CTA Split END -->\n<!-- CTA Split Styles START -->\n<style>\n.cta-split {\noverflow: hidden;\nmargin: 3rem 0;\ndisplay: grid;\njustify-items: center;\nborder-radius: 0.5rem;\nwidth: 100%;\nmin-height: 25rem;\ngrid-template-columns: repeat(2, 1fr);\nborder: 1px solid rgba(75, 174, 227, 0.32);\nfont-family: 'Catamaran Bold';\n}\n\n.cta__split-left {\ndisplay: flex;\nalign-items: center;\njustify-content: center;\nheight: 100%;\nwidth: 100%;\nbackground-color: #161c59;\nbackground-position: center center;\nbackground: rgba(32, 168, 241, 0.1);\n}\n\n.cta__split-icon { \nwidth: 100%;\nheight: auto;\nobject-fit: contain;\nmax-width: 100%;\n}\n\n.cta__split-right {\ndisplay: flex;\nflex-direction: column;\njustify-content: space-between;\npadding: 2rem;\n}\n\n.cta__split-heading { font-size: 1.5rem; }\n\n.cta__split-text {\nmargin-top: 1rem;\nfont-family: Lato, Roboto, sans-serif;\n}\n\n.cta__split-link {\npadding: 0.5rem 1rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: white;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\ndisplay: block;\nz-index: 1000;\nposition: relative;\ncursor: pointer !important;\n}\n\n.cta__split-link:hover {\nbackground-color: #68CBFF;\ncolor: white;\ncursor: pointer;\n}\n\n.highlight { color: #ea2526;}\n\n\n\/* Mobile styles START *\/\n@media only screen and (max-width: 768px) {\n\n.cta-split {\ngrid-template-columns: 1fr;\nmin-height: auto;\n}\n\n.cta__split-left {\nheight: auto;\nmin-height: 10rem;\n}\n\n\n.cta__split-left, .cta__split-right {\nheight: auto;\n}\n\n.cta__split-heading { font-size: 1.2rem; }\n\n.cta__split-text { font-size: 1rem; }\n.cta__split-icon {\nmax-height: auto;\nobject-fit: cover;\n}\n\n}\n\/* Mobile styles END *\/\n<\/style>\n<!-- CTA Split Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\"><strong>About ANY.RUN<\/strong>&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=sdk_integration&amp;utm_term=170425&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s services<\/a> are used by over 500,000 cybersecurity professionals worldwide, including SOC teams at over <a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-from-organizations\/\" target=\"_blank\" rel=\"noreferrer noopener\">15,000 companies<\/a>. ANY.RUN\u2019s Interactive Sandbox helps businesses ensure fast and accurate analysis of threats targeting Windows, Linux, and Android systems, while the threat intelligence products TI Lookup and TI Feeds enable organizations to enrich their knowledge on active and emerging cyber attacks.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Making ANY.RUN\u2019s products better for the benefit of businesses, organizations, and SOC teams is our top priority. To get maximum value out of our solutions, we provide them with API, a tool enabling users to integrate our services into their security infrastructure. And now, to make this process even smoother, we introduce a software development [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":12979,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57,10,54,55,56],"class_list":["post-12950","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun","tag-cybersecurity","tag-features","tag-release","tag-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Integrate ANY.RUN\u2019s Services into Your Infrastructure via SDK<\/title>\n<meta name=\"description\" content=\"Automate SOC tasks with ANY.RUN&#039;s SDK to simplify, improve, and speed up threat detection, response, and hunting.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/sdk-integration\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/sdk-integration\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/sdk-integration\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Seamlessly Integrate ANY.RUN\u2019s Services into Your Infrastructure via SDK\",\"datePublished\":\"2025-04-17T11:43:15+00:00\",\"dateModified\":\"2025-04-18T07:16:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/sdk-integration\/\"},\"wordCount\":870,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"features\",\"release\",\"update\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/sdk-integration\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/sdk-integration\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/sdk-integration\/\",\"name\":\"Integrate ANY.RUN\u2019s Services into Your Infrastructure via SDK\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2025-04-17T11:43:15+00:00\",\"dateModified\":\"2025-04-18T07:16:08+00:00\",\"description\":\"Automate SOC tasks with ANY.RUN's SDK to simplify, improve, and speed up threat detection, response, and hunting.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/sdk-integration\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/sdk-integration\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/sdk-integration\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service Updates\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Seamlessly Integrate ANY.RUN\u2019s Services into Your Infrastructure via SDK\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Integrate ANY.RUN\u2019s Services into Your Infrastructure via SDK","description":"Automate SOC tasks with ANY.RUN's SDK to simplify, improve, and speed up threat detection, response, and hunting.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/sdk-integration\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/sdk-integration\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/sdk-integration\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Seamlessly Integrate ANY.RUN\u2019s Services into Your Infrastructure via SDK","datePublished":"2025-04-17T11:43:15+00:00","dateModified":"2025-04-18T07:16:08+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/sdk-integration\/"},"wordCount":870,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","features","release","update"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/sdk-integration\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/sdk-integration\/","url":"https:\/\/any.run\/cybersecurity-blog\/sdk-integration\/","name":"Integrate ANY.RUN\u2019s Services into Your Infrastructure via SDK","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-04-17T11:43:15+00:00","dateModified":"2025-04-18T07:16:08+00:00","description":"Automate SOC tasks with ANY.RUN's SDK to simplify, improve, and speed up threat detection, response, and hunting.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/sdk-integration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/sdk-integration\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/sdk-integration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"Seamlessly Integrate ANY.RUN\u2019s Services into Your Infrastructure via SDK"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/12950"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=12950"}],"version-history":[{"count":31,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/12950\/revisions"}],"predecessor-version":[{"id":12984,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/12950\/revisions\/12984"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/12979"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=12950"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=12950"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=12950"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}