/Mal-Or-Not

Mal-O-Not: Malicious Entity Detector

Primary LanguagePythonGNU General Public License v3.0GPL-3.0

Mal-OR-Not

Mal-OR-Not: (Malicious Entity Detector)

Nowadays, cyber crimes are at an all-time high, especially after the recent global pandemic situation that's going on, due to which everything had to be shifted to online mode. Cybercriminals have made a fortune in cyberspace.

These cyber crimes may be of countless types and forms but the way they originate will remain constant. Phishing attacks (that is to trick the user into performing malicious actions) are one of the biggest gateways to the occurrence of a cybercrime.

These actions could be - clicking on a malicious URL, opening an infected file, visiting a malicious domain, reacting to spam emails and SMS's, etc.

What I'm trying to highlight here is that the origin of these cyber crimes is generally - an IP address, a URL, a domain, a mobile number, or a malicious file.

We as cybersecurity students who're about to break into the industry decided to take upon this challenge of developing an all-in-one solution to this problem. After a lot of brainstorming and accumulation of thoughts and ideas, we have come up with 'Mal-OR-Not'. We have developed it in a way that any normal user can use it to safeguard himself from cybercrimes and catch any malicious intent in its early phases.

Installation Instructions

Get the required API keys:

Clone this repository and install all requirements:

git clone https://github.com/th3hack3rwiz/Mal-Or-Not.git
cd Mal-Or-Not
chmod +x setup.sh
./setup.sh

Usage

python3 Mal-Or-Not.py

Implementation

User is prompted to enter his name and location for report generation purposes.

Main user interface is displayed to the user, from which he can select what kind of entity he wants to test.

For eg: If a user wants to find out if a certain file is malicious or not. He will do the following: (To test the authenticity of the tool, let's create a real malware using msfvenom)

Now, let's test the malware against Mal-OR-Not

We obtain the following result:

The following report is generated in the 'report/file' directory: