Skip to main content

An AI-driven MCP server that autonomously interfaces with Malware Bazaar

Project description

MalwareBazaar_MCP

An AI-driven MCP server that autonomously interfaces with Malware Bazaar, delivering real-time threat intel and sample metadata for authorized cybersecurity research workflows.


MCP Tools

get_recent: Get up to 10 most recent samples from MalwareBazaar.

get_info: Get detailed metadata about a specific malware sample.

get_file: Download a malware sample from MalwareBazaar.

get_taginfo: Get malware samples associated with a specific tag.


Step 1: Create a MalwareBazaar APIKEY

https://auth.abuse.ch/user/me

Step 2: Create .env

MALWAREBAZAAR_API_KEY=<APIKEY>

Step 3a: Create Virtual Env & Install Requirements - MAC/Linux

curl -LsSf https://astral.sh/uv/install.sh | sh
cd MalwareBazaar_MCP
uv init .
uv venv
source .venv/bin/activate
uv pip install -r requirements.txt

Step 3b: Create Virtual Env & Install Requirements - Windows

powershell -ExecutionPolicy ByPass -c "irm https://astral.sh/uv/install.ps1 | iex"
cd MalwareBazaar_MCP
uv init .
uv venv
.venv\Scripts\activate
uv pip install -r requirements.txt

Step 4a: Add Config to the MCP Client - MAC/Linux

{
    "mcpServers": {
        "malwarebazaar": {
            "description": "Malware Bazaar MCP Server",
            "command": "/Users/XXX/.local/bin/uv",
            "args": [
                "--directory",
                "/Users/XXX/Documents/MalwareBazaar_MCP",
                "run",
                "malwarebazaar_mcp.py"
            ]
        }
    }
}

Step 4b: Add Config to the MCP Client - Windows

{
    "mcpServers": {
        "malwarebazaar": {
            "description": "Malware Bazaar MCP Server",
            "command": "uv",
            "args": [
                "--directory",
                "C:\Users\XXX\Document\MalwareBazaar_MCP",
                "run",
                "malwarebazaar_mcp.py"
            ]
        }
    }
}

Step 5: Run MCP Server

uv run malwarebazaar_mcp.py

Step 6: Run MCP Client & Query

Help me understnad the latest hash from Malware Bazaar.

Step 7: Run Tests

python -m unittest discover -s tests

uv pip install coverage==7.8.0
coverage run --branch -m unittest discover -s tests
coverage report -m
coverage html
open htmlcov/index.html  # MAC
xdg-open htmlcov/index.html  # Linux
start htmlcov\index.html  # Windows
coverage erase

License

Apache License, Version 2.0

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

File details

Details for the file iflow_mcp_mytechnotalent_malwarebazaar_mcp-1.5.1.tar.gz.

File metadata

File hashes

Hashes for iflow_mcp_mytechnotalent_malwarebazaar_mcp-1.5.1.tar.gz
Algorithm Hash digest
SHA256 9f5994f833cc439f5b012a4573fe527899eb696f996c27bccf93bb75da617e4b
MD5 cd3209bf478db0c407a8ca0a89749011
BLAKE2b-256 0e6bdb15afd4a21289e079555b9b3440b5370beb668b0429611bc2993ccc7ffd

See more details on using hashes here.

File details

Details for the file iflow_mcp_mytechnotalent_malwarebazaar_mcp-1.5.1-py3-none-any.whl.

File metadata

File hashes

Hashes for iflow_mcp_mytechnotalent_malwarebazaar_mcp-1.5.1-py3-none-any.whl
Algorithm Hash digest
SHA256 f9c16688fe357cf9b5ce509a0ff8a0505db9b2a4bdf6d520f5dc481f3a5c0027
MD5 5f3f8abe58b2e7d87d7730cafbd8f86f
BLAKE2b-256 ddf4bd630358efbeadf9eea02e0430f52895b890eb3e39142d1021031fd6ec26

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page