Skip to content

Query and store results from files, malware, and IP addresses in a local SQL Table using OPSWAT Metadefender Core API https://www.metadefender.com/public-api#!/about

Notifications You must be signed in to change notification settings

TheSecMaven/metadefender_core-python

Repository files navigation

Metadefender Core

Query a file, hash, or IP and store the data in a local SQL Database using the OPSWAT Metadefender Core API https://www.metadefender.com/public-api#!/about

How to Use

feed_collect.py

This simple script will pull the top 1,000 new malware hash signatures, including MD5, SHA1, and SHA256 from the metadefender site. These new malicious hashes have been spotted on the networks of Metadefender Cloud users within the last 24 hours. It then stores this data in a file named 'live_feed-<CURRENT_TIME>'. This would allow for the creation of a database for an entire day so that if a new malicious file appeared on your site at the end of the day, but was only on the feed at 8am, it would still get stopped.
python feed_collect.py

query_metadefender.py

This will allow you to query the Metadefender Core API with an IP address (more capabilities being added) and will return to you any categorizations that were reported in the JSON output. The Raw JSON output is saved to <IP_ADDRESS>.json should one need access to it at a later point. It can be used as follows:
python query_metadefender.py -i 103.212.204.91

What's Next

Storing all of these results in a database is next. Separation of all hashes (MD5,SHA1, SHA256) into 3 tables would also speed up checking against these for live threats.

BIggest HEader

About

Query and store results from files, malware, and IP addresses in a local SQL Table using OPSWAT Metadefender Core API https://www.metadefender.com/public-api#!/about

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages