malscraper v1.4
scrapes a list of payload domains, ioc's & c2 ips from various feeds, for easy blacklisting.


table of contents
introduction
malscraper is a modular tool that streamlines the process of scraping and managing lists of payload domains, ioc's & c2 ips from various feeds. it simplifies the task of blacklisting for security and threat intelligence purposes.
features
- modular design: easily extendable with additional modules.
- version checking: verify if you are using the latest version on startup.
- reopen functionality: ability to reopen a previously composed report.
version history
- 1.4 - Complete rewrite in Python, making it fully cross-platform compatible with Windows, macOS, and Linux environments. Maintains all the key functionality of the original bash script while adding new features, improving performance, and enhancing the user experience.
- 1.3 - initial python conversion
the tool has been converted to python for improved functionality. - 1.2 - version checking
malscraper now verifies if you are using the latest version on startup. - 1.1 - reopen functionality
added the ability to reopen a previously composed report. - 1.0 - initial implementation
core functionality was implemented in the first release.
installation
1. clone the repository. git clone https://github.com/rynmon/malscraper 2. navigate to the project directory. cd malscraper 3. install dependencies. pip install -r requirements.txt
usage
to use malscraper, follow these steps:
1. run the tool. python malscraper.py 2. follow the on-screen instructions to configure and use the tool.
contributing
contributions are welcome! if you find a bug or have an enhancement in mind, feel free to open an issue or submit a pull request.
license
this project is licensed under the mit license.