Scrapes a list of Payload Domains, IOC's & C2 IPs from various feeds, for easy blacklisting.
malScraper is a modular tool that streamlines the process of scraping and managing lists of Payload Domains, IOC's & C2 IPs from various feeds. It simplifies the task of blacklisting for security and threat intelligence purposes.
1. Clone the repository. git clone https://github.com/rynmon/malScraper 2. Navigate to the project directory. cd malScraper 3. Install dependencies. pip install -r requirements.txt
To use malScraper, follow these steps:
1. Run the tool. python malScraper.py 2. Follow the on-screen instructions to configure and use the tool.
Contributions are welcome! If you find a bug or have an enhancement in mind, feel free to open an issue or submit a pull request.
malScraper will automatically check for updates on startup. Make sure you are using the latest version to benefit from new features and improvements.
This project is licensed under the MIT License.