by mytechnotalent
MalwareBazaar_MCP is an AI-driven MCP server that autonomously interfaces with Malware Bazaar, delivering real-time threat intelligence and sample metadata for authorized cybersecurity research workflows.
MalwareBazaar_MCP is an AI-driven MCP (Multi-Cloud Platform) server designed to interact autonomously with Malware Bazaar. Its primary function is to provide real-time threat intelligence and malware sample metadata, catering specifically to authorized cybersecurity research workflows.
To use MalwareBazaar_MCP, follow these steps:
.env
file: Configure your API key in a .env
file as MALWAREBAZAAR_API_KEY=<APIKEY>
.uv
to create a virtual environment, activate it, and install dependencies from requirements.txt
.uv
to set up the environment and install requirements.malwarebazaar
server details, including the command and arguments to run malwarebazaar_mcp.py
.uv run malwarebazaar_mcp.py
to start the server.unittest
and coverage
to run tests and generate coverage reports.MalwareBazaar_MCP offers the following key features:
get_recent
: Retrieves up to 10 most recent samples.get_info
: Fetches detailed metadata for a specific sample.get_file
: Allows downloading of malware samples.get_taginfo
: Retrieves samples associated with a specific tag.https://auth.abuse.ch/user/me
.uv
? uv
is a tool used for Python package management and virtual environment creation, as indicated in the installation steps.An AI-driven MCP server that autonomously interfaces with Malware Bazaar, delivering real-time threat intel and sample metadata for authorized cybersecurity research workflows.
get_recent
: Get up to 10 most recent samples from MalwareBazaar.get_info
: Get detailed metadata about a specific malware sample.get_file
: Download a malware sample from MalwareBazaar.get_taginfo
: Get malware samples associated with a specific tag..env
MALWAREBAZAAR_API_KEY=<APIKEY>
curl -LsSf https://astral.sh/uv/install.sh | sh
cd MalwareBazaar_MCP
uv init .
uv venv
source .venv/bin/activate
uv pip install -r requirements.txt
powershell -ExecutionPolicy ByPass -c "irm https://astral.sh/uv/install.ps1 | iex"
cd MalwareBazaar_MCP
uv init .
uv venv
.venv\Scripts\activate
uv pip install -r requirements.txt
{
"mcpServers": {
"malwarebazaar": {
"description": "Malware Bazaar MCP Server",
"command": "/Users/XXX/.local/bin/uv",
"args": [
"--directory",
"/Users/XXX/Documents/MalwareBazaar_MCP",
"run",
"malwarebazaar_mcp.py"
]
}
}
}
{
"mcpServers": {
"malwarebazaar": {
"description": "Malware Bazaar MCP Server",
"command": "uv",
"args": [
"--directory",
"C:\Users\XXX\Document\MalwareBazaar_MCP",
"run",
"malwarebazaar_mcp.py"
]
}
}
}
uv run malwarebazaar_mcp.py
Help me understnad the latest hash from Malware Bazaar.
python -m unittest discover -s tests
uv pip install coverage==7.8.0
coverage run --branch -m unittest discover -s tests
coverage report -m
coverage html
open htmlcov/index.html # MAC
xdg-open htmlcov/index.html # Linux
start htmlcov\index.html # Windows
coverage erase
Reviews feature coming soon
Stay tuned for community discussions and feedback