Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/jmousqueton/api.ransomware.live
The Ransomware.live API Server is a Flask-based web application that provides endpoints to query and retrieve data related to ransomware posts and cyberattacks. This API serves as a backend for Ransomware.live, a service that aggregates and displays information about recent ransomware incidents and groups.
https://github.com/jmousqueton/api.ransomware.live
api cti flask flask-api leaks monitoring python ransomware ransomwarelive threat-intelligence threatintel
Last synced: 3 months ago
JSON representation
The Ransomware.live API Server is a Flask-based web application that provides endpoints to query and retrieve data related to ransomware posts and cyberattacks. This API serves as a backend for Ransomware.live, a service that aggregates and displays information about recent ransomware incidents and groups.
- Host: GitHub
- URL: https://github.com/jmousqueton/api.ransomware.live
- Owner: JMousqueton
- License: mit
- Created: 2023-06-04T09:37:50.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2024-08-21T08:30:35.000Z (5 months ago)
- Last Synced: 2024-08-21T09:27:29.553Z (5 months ago)
- Topics: api, cti, flask, flask-api, leaks, monitoring, python, ransomware, ransomwarelive, threat-intelligence, threatintel
- Language: Python
- Homepage: https://api.ransomware.live
- Size: 189 KB
- Stars: 6
- Watchers: 2
- Forks: 2
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
![](https://raw.githubusercontent.com/JMousqueton/ransomware.live/main/.github/ransomware.live.png)
>[`Api.Ransomware.live`](https://api.ransomware.live) is an api to query [`Ransomware.live`](https://ransomware.live)
## π¬ Description
The Ransomware.live API Server is a Flask-based web application that provides endpoints to query and retrieve data related to ransomware posts and cyberattacks. This API serves as a backend for Ransomware.live, a service that aggregates and displays information about recent ransomware incidents and groups.
[Ransomware.live](https://ransomware.live) is originally a fork of [ransomwatch](https://github.com/joshhighet/ransomwatch)
[Ransomware.live](https://ransomware.live) is a ransomware leak site monitoring tool. It will scrape all of the entries on various ransomware leak sites and published them.
## πͺ Features
- Retrieve the 100 most recent ransomware posts.
- Get information about all ransomware groups.
- Fetch details about a specific ransomware group by its name.
- Query posts where the year and month match the 'discovered' field.
- Fetch posts associated with a specific ransomware group.
- Retrieve the last 100 entries from the 'cyberattacks.json' file, sorted by date.## π Endpoints
- `/recentvictims`: Retrieve the 100 most recent ransomware posts.
- `/groups`: Get information about all ransomware groups.
- `/group/`: Fetch details about a specific ransomware group by its name.
- `/victims//`: Query posts where the year and month match the 'discovered' field.
- `/groupvictims/`: Fetch posts associated with a specific ransomware group.
- `/recentcyberattacks`: Retrieve the last 100 entries from the 'cyberattacks.json' file, sorted by date.## βοΈ Setup and Usage
1. Clone the repository to your local machine:
```bash
git clone https://github.com/yourusername/ransomware-live-api.git
cd ransomware-live-api
```2. Install the required dependencies using pip:
```bash
pip install -r requirements.txt
```3. Run the Flask server:
```bash
python api_server.py
```The server will start running locally, and you can access the API at http://localhost:5000.
## π API Documentation
For detailed information about the available endpoints, parameters, and responses, you can visit the API documentation generated using Swagger. Open your web browser and navigate to:
http://localhost:5000/apidocs
## β€οΈ Contributing
We welcome contributions to improve the Ransomware.live API Server. If you find a bug or have an idea for an enhancement, feel free to open an issue or submit a pull request. For major changes, please open an issue first to discuss the proposed changes.
## π¨πΌβπΌ About me
I'm **Julien Mousqueton**
- I'm **CTO** in Cyber Security π‘
- I'm a **lecturer** π in Cyber Security @ [Ecole 2600](https://www.ecole2600.com) π΄ββ οΈ
- I'm a **blogger** βπ» at [julien.io](https://julien.io) in french π«π·You can find more in [my resume](https://cv.julien.io) in English (also available in [French](https://cv.julien.io/fr) / aussi disponible en [franΓ§ais](https://cv.julien.io/fr))
## π€© Credits
- [Josh Highet](https://github.com/joshhighet) for the original [ransomwatch](https://github.com/joshhighet/ransomwatch) project.
- [ValΓ©ry RieΓ-Marchive](https://twitter.com/ValeryMarchive) for ideas and his involvement in the cyber community.## β οΈ Disclamer
Please note that this code was developed for educational and informational purposes. The usage of this code or any data obtained from the API is at your own risk. The developers and contributors to this project do not endorse or support any malicious or illegal activities related to ransomware or cyberattacks.
## π License
The Ransomware.live API Server is licensed under the `MIT License`. For more information, see the [LICENSE](https://github.com/jmousqueton/api.ransomware.live/blob/main/LICENSE) file.