malscraper v1.4

scrapes a list of payload domains, ioc's & c2 ips from various feeds, for easy blacklisting.

malScraper Screenshot malScraper Image

introduction

malscraper is a modular tool that streamlines the process of scraping and managing lists of payload domains, ioc's & c2 ips from various feeds. it simplifies the task of blacklisting for security and threat intelligence purposes.

features

  • modular design: easily extendable with additional modules.
  • version checking: verify if you are using the latest version on startup.
  • reopen functionality: ability to reopen a previously composed report.

version history

  • 1.4 - Complete rewrite in Python, making it fully cross-platform compatible with Windows, macOS, and Linux environments. Maintains all the key functionality of the original bash script while adding new features, improving performance, and enhancing the user experience.
  • 1.3 - initial python conversion
    the tool has been converted to python for improved functionality.
  • 1.2 - version checking
    malscraper now verifies if you are using the latest version on startup.
  • 1.1 - reopen functionality
    added the ability to reopen a previously composed report.
  • 1.0 - initial implementation
    core functionality was implemented in the first release.

installation

1. clone the repository.
   git clone https://github.com/rynmon/malscraper

2. navigate to the project directory.
   cd malscraper

3. install dependencies.
   pip install -r requirements.txt
                

usage

to use malscraper, follow these steps:

1. run the tool.
   python malscraper.py

2. follow the on-screen instructions to configure and use the tool.
                

contributing

contributions are welcome! if you find a bug or have an enhancement in mind, feel free to open an issue or submit a pull request.

license

this project is licensed under the mit license.