Skip to main content

An AI-driven MCP server that autonomously interfaces with Malware Bazaar

Project description

MalwareBazaar_MCP

An AI-driven MCP server that autonomously interfaces with Malware Bazaar, delivering real-time threat intel and sample metadata for authorized cybersecurity research workflows.


MCP Tools

get_recent: Get up to 10 most recent samples from MalwareBazaar.

get_info: Get detailed metadata about a specific malware sample.

get_file: Download a malware sample from MalwareBazaar.

get_taginfo: Get malware samples associated with a specific tag.


Step 1: Create a MalwareBazaar APIKEY

https://auth.abuse.ch/user/me

Step 2: Create .env

MALWAREBAZAAR_API_KEY=<APIKEY>

Step 3a: Create Virtual Env & Install Requirements - MAC/Linux

curl -LsSf https://astral.sh/uv/install.sh | sh
cd MalwareBazaar_MCP
uv init .
uv venv
source .venv/bin/activate
uv pip install -r requirements.txt

Step 3b: Create Virtual Env & Install Requirements - Windows

powershell -ExecutionPolicy ByPass -c "irm https://astral.sh/uv/install.ps1 | iex"
cd MalwareBazaar_MCP
uv init .
uv venv
.venv\Scripts\activate
uv pip install -r requirements.txt

Step 4a: Add Config to the MCP Client - MAC/Linux

{
    "mcpServers": {
        "malwarebazaar": {
            "description": "Malware Bazaar MCP Server",
            "command": "/Users/XXX/.local/bin/uv",
            "args": [
                "--directory",
                "/Users/XXX/Documents/MalwareBazaar_MCP",
                "run",
                "malwarebazaar_mcp.py"
            ]
        }
    }
}

Step 4b: Add Config to the MCP Client - Windows

{
    "mcpServers": {
        "malwarebazaar": {
            "description": "Malware Bazaar MCP Server",
            "command": "uv",
            "args": [
                "--directory",
                "C:\Users\XXX\Document\MalwareBazaar_MCP",
                "run",
                "malwarebazaar_mcp.py"
            ]
        }
    }
}

Step 5: Run MCP Server

uv run malwarebazaar_mcp.py

Step 6: Run MCP Client & Query

Help me understnad the latest hash from Malware Bazaar.

Step 7: Run Tests

python -m unittest discover -s tests

uv pip install coverage==7.8.0
coverage run --branch -m unittest discover -s tests
coverage report -m
coverage html
open htmlcov/index.html  # MAC
xdg-open htmlcov/index.html  # Linux
start htmlcov\index.html  # Windows
coverage erase

License

Apache License, Version 2.0

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

File details

Details for the file iflow_mcp_mytechnotalent_malwarebazaar_mcp-1.5.0.tar.gz.

File metadata

File hashes

Hashes for iflow_mcp_mytechnotalent_malwarebazaar_mcp-1.5.0.tar.gz
Algorithm Hash digest
SHA256 0d29c79277dcf201b5d24fcdd277bb64acb72818b8c88ac047a84f25a324be84
MD5 20cd265b0dc9179420a22ee61bffc02e
BLAKE2b-256 2b22acc56dbad86447909f655fc35f0dd5b755d61348548f4396452f415a2af3

See more details on using hashes here.

File details

Details for the file iflow_mcp_mytechnotalent_malwarebazaar_mcp-1.5.0-py3-none-any.whl.

File metadata

File hashes

Hashes for iflow_mcp_mytechnotalent_malwarebazaar_mcp-1.5.0-py3-none-any.whl
Algorithm Hash digest
SHA256 edafc23cfff9eb393c4d938d677a96b3f26b1bf1859d02c1acb09cf22566b7c7
MD5 d3a2f0ede01f439d33f080ee5c10b371
BLAKE2b-256 21602227b0e85b66ffb05dc5727d3db1c3c28a7d81745e9a93286783f31c3174

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page