MalwareBazaar_MCP
An AI-driven MCP server that autonomously interfaces with Malware Bazaar, delivering real-time threat intel and sample metadata for authorized cybersecurity research workflows.
claude mcp add --transport stdio mytechnotalent-malwarebazaar_mcp python malwarebazaar_mcp.py \ --env MALWAREBAZAAR_API_KEY="<APIKEY>"
How to use
This MCP server provides an AI-driven interface to Malware Bazaar, delivering real-time threat intel and sample metadata for authorized cybersecurity research workflows. It exposes tools to fetch recent samples, retrieve detailed metadata for a given sample, download sample files, and query samples by tag. The server is designed to run as a local service that your MCP client can query, enabling automated threat intelligence collection and analysis without manual browsing. To use it, configure your MCP client to point at this server and ensure the MALWAREBAZAAR_API_KEY is set in the environment so the server can authenticate with Malware Bazaar. Once running, you can call the tools to programmatically obtain the latest samples, investigate specific hashes, retrieve sample files, or search by tag information. The workflow supports integration into larger SOC automation, threat research notebooks, or incident response pipelines.
How to install
Prerequisites:
- Python 3.8+ installed on your system
- Access to Malware Bazaar API and an API key
- The MalwareBazaar_MCP repository checked out locally
Step-by-step:
- Create and activate a Python environment (optional but recommended):
- python -m venv .venv
- source .venv/bin/activate # mac/linux
- .venv\Scripts\activate # Windows
- Install required Python dependencies:
- pip install -r requirements.txt
- Create an API key for Malware Bazaar and save it for the MCP server:
- Obtain ключ from Malware Bazaar portal (as described in the README) and set it in the environment: MALWAREBAZAAR_API_KEY=<APIKEY>
- Configure the MCP client to point to this server (see Step 4 in README):
- For Linux/macOS: include the following in your MCP client config: { "mcpServers": { "malwarebazaar": { "description": "Malware Bazaar MCP Server", "command": "/path/to/python", "args": ["malwarebazaar_mcp.py"] } } }
- For Windows: similar configuration using the appropriate python executable path
- Run the MCP server:
- python malwarebazaar_mcp.py
- Test using the MCP client to query for recent samples or specific hashes as shown in the README examples.
Additional notes
Environment variable MALWAREBAZAAR_API_KEY is required for authenticating with Malware Bazaar. Ensure you keep the API key secure and do not commit it to version control. If you encounter authentication or rate-limit issues, verify the API key is active and has the necessary permissions. The MCP tools available are: get_recent (up to 10 of the most recent samples), get_info (metadata for a sample), get_file (download a sample file), and get_taginfo (samples associated with a tag). When downloading samples, ensure you have proper authorization and follow your organization's data handling policies.
Related MCP Servers
ragflow
RAGFlow is a leading open-source Retrieval-Augmented Generation (RAG) engine that fuses cutting-edge RAG with Agent capabilities to create a superior context layer for LLMs
solace-agent-mesh
An event-driven framework designed to build and orchestrate multi-agent AI systems. It enables seamless integration of AI agents with real-world data sources and systems, facilitating complex, multi-step workflows.
evo-ai
Evo AI is an open-source platform for creating and managing AI agents, enabling integration with different AI models and services.
volcano-agent-sdk
🌋 Build AI agents that seamlessly combine LLM reasoning with real-world actions via MCP tools — in just a few lines of TypeScript.
mcp
This MCP server provides documentation about Strands Agents to your GenAI tools, so you can use your favorite AI coding assistant to vibe-code Strands Agents.
cursor10x
The Cursor10x MCP is a persistent multi-dimensional memory system for Cursor that enhances AI assistants with conversation context, project history, and code relationships across sessions.