Skip to content

Latest commit

 

History

History
62 lines (50 loc) · 2.33 KB

README.md

File metadata and controls

62 lines (50 loc) · 2.33 KB

malScraper Screenshot 2023-12-27_00-37-09

Table of Contents

Introduction

  • malScraper is a modular tool that streamlines the process of scraping and managing lists of Payload Domains, IOC's & C2 IPs from various feeds. It simplifies the task of blacklisting for security and threat intelligence purposes.

Features

  • Modular Design: Easily extendable with additional modules.
  • Version Checking: Verify if you are using the latest version on startup.
  • Reopen Functionality: Ability to reopen a previously composed report.

Version History

  • 1.3 - Initial Python Conversion

    • The tool has been converted to Python for improved functionality.
  • 1.2 - Version Checking

    • malScraper now verifies if you are using the latest version on startup.
  • 1.1 - Reopen Functionality

    • Added the ability to reopen a previously composed report.
  • 1.0 - Initial Implementation

    • Core functionality was implemented in the first release.

Installation

  1. Clone the repository.
    git clone https://github.com/rynmon/malScraper
  2. Navigate to the project directory.
    cd malScraper
  3. Install dependencies.
    pip install -r requirements.txt

Usage

  • To use malScraper, follow these steps:
  1. Run the tool.
    python malScraper.py
  2. Follow the on-screen instructions to configure and use the tool.

Contributing

  • Contributions are welcome! If you find a bug or have an enhancement in mind, feel free to open an issue or submit a pull request.

Version Checking

  • malScraper will automatically check for updates on startup. Make sure you are using the latest version to benefit from new features and improvements.

License