{"id":4864,"date":"2023-04-20T07:16:26","date_gmt":"2023-04-20T07:16:26","guid":{"rendered":"\/cybersecurity-blog\/?p=4864"},"modified":"2023-04-20T09:41:46","modified_gmt":"2023-04-20T09:41:46","slug":"anyrun-guides-and-tutorials","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/anyrun-guides-and-tutorials\/","title":{"rendered":"Introducing ANY.RUN Guides and Tutorials\u00a0"},"content":{"rendered":"\n<p>We&#8217;re thrilled to present our Guides and Tutorials page \u2014 a curated set of resources designed to help you get started with <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=guides_tutorials&amp;utm_content=landing\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN malware sandbox<\/a>.&nbsp;<\/p>\n\n\n\n<p>Over the years, we&#8217;ve written numerous articles explaining how to work with ANY.RUN and showcasing real-world applications. Unfortunately, they were scattered across our blog, making them hard to find when you need them.&nbsp;But not anymore!&nbsp;<\/p>\n\n\n\n<p>Our new education hub is here to guide you through getting started with our malware sandbox, configuring your team&#8217;s environment and learning about the advanced malware analysis tools ANY.RUN provides.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nStart learning with <span class=\"highlight\">Guides and Tutorials<\/span>\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/cybersecurity-blog\/guides\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=guides_tutorials&amp;utm_content=guides\" rel=\"noopener\" target=\"_blank\">\nBrowse guides\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>The hub is organized in a way so that you can go through it chronologically, which is ideal if you&#8217;re new to the service. But if you&#8217;d like to revisit a specific topic, you can find it in the navigation menu and jump straight to that section.&nbsp;<\/p>\n\n\n\n<p>We will keep on expanding the list of materials to cover more topics, and we\u2019ll make sure to add information about new ANY.RUN releases.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Have any suggestions on what we could improve? Please, leave them in the comments and we will get back to you shortly.&nbsp;<\/p>\n\n\n\n<p>The help center doesn\u2019t cover your question yet? No worries! Feel free to reach out to our friendly support team using the <a href=\"https:\/\/app.any.run\/contact-us?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=guides_tutorials&amp;utm_content=contactus\" target=\"_blank\" rel=\"noreferrer noopener\">contact form<\/a> on the website.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;re thrilled to present our Guides and Tutorials page \u2014 a curated set of resources designed to help you get started with ANY.RUN malware sandbox.&nbsp; Over the years, we&#8217;ve written numerous articles explaining how to work with ANY.RUN and showcasing real-world applications. Unfortunately, they were scattered across our blog, making them hard to find when [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4881,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[57,10,34],"class_list":["post-4864","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-instructions","tag-anyrun","tag-cybersecurity","tag-malware-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Introducing ANY.RUN Guides and Tutorials\u00a0<\/title>\n<meta name=\"description\" content=\"We&#039;ve created a one-stop education hub to help you master ANY.RUN malware sandbox. Explore it now and start threat hunting with us!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/anyrun-guides-and-tutorials\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-guides-and-tutorials\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-guides-and-tutorials\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Introducing ANY.RUN Guides and Tutorials\u00a0\",\"datePublished\":\"2023-04-20T07:16:26+00:00\",\"dateModified\":\"2023-04-20T09:41:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-guides-and-tutorials\/\"},\"wordCount\":244,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\"],\"articleSection\":[\"Instructions on ANY.RUN\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/anyrun-guides-and-tutorials\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-guides-and-tutorials\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-guides-and-tutorials\/\",\"name\":\"Introducing ANY.RUN Guides and Tutorials\u00a0\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2023-04-20T07:16:26+00:00\",\"dateModified\":\"2023-04-20T09:41:46+00:00\",\"description\":\"We've created a one-stop education hub to help you master ANY.RUN malware sandbox. Explore it now and start threat hunting with us!\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-guides-and-tutorials\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/anyrun-guides-and-tutorials\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/anyrun-guides-and-tutorials\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Instructions on ANY.RUN\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/instructions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Introducing ANY.RUN Guides and Tutorials\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Introducing ANY.RUN Guides and Tutorials\u00a0","description":"We've created a one-stop education hub to help you master ANY.RUN malware sandbox. Explore it now and start threat hunting with us!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/anyrun-guides-and-tutorials\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-guides-and-tutorials\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-guides-and-tutorials\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Introducing ANY.RUN Guides and Tutorials\u00a0","datePublished":"2023-04-20T07:16:26+00:00","dateModified":"2023-04-20T09:41:46+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-guides-and-tutorials\/"},"wordCount":244,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis"],"articleSection":["Instructions on ANY.RUN"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/anyrun-guides-and-tutorials\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-guides-and-tutorials\/","url":"https:\/\/any.run\/cybersecurity-blog\/anyrun-guides-and-tutorials\/","name":"Introducing ANY.RUN Guides and Tutorials\u00a0","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2023-04-20T07:16:26+00:00","dateModified":"2023-04-20T09:41:46+00:00","description":"We've created a one-stop education hub to help you master ANY.RUN malware sandbox. Explore it now and start threat hunting with us!","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-guides-and-tutorials\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/anyrun-guides-and-tutorials\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/anyrun-guides-and-tutorials\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Instructions on ANY.RUN","item":"https:\/\/any.run\/cybersecurity-blog\/category\/instructions\/"},{"@type":"ListItem","position":3,"name":"Introducing ANY.RUN Guides and Tutorials\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4864"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=4864"}],"version-history":[{"count":6,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4864\/revisions"}],"predecessor-version":[{"id":4877,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4864\/revisions\/4877"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/4881"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=4864"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=4864"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=4864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}