Malwoverview v8.0 (codename: Revolutions) has been released:
https://github.com/alexandreborges/malwoverview
To install its complete version: pip install malwoverview[all]
Partial List of Improvements:
NEW SERVICE INTEGRATIONS (6):
01. http://URLScan.io — submit URLs, retrieve results, search scans, search by domain/IP (-u/-U)
02. Shodan — IP lookup and search queries (-s/-S, -ip 4)
03. AbuseIPDB — IP reputation checks (-ab/-AB, -ip 5)
04. GreyNoise — IP classification (-gn/-GN, -ip 6)
05. Whois/RDAP — domain and IP lookups (-wh/-WH)
06. LLM threat enrichment — Claude, Gemini, OpenAI, Ollama (--enrich, --llm)
NEW CAPABILITIES (16):
07. Cross-service hash correlation across VT, HA, Triage, AlienVault (--correlate-hash)
08. Batch hash check — Bazaar (-b 11), Hybrid Analysis (-a 16), Triage (-x 8)
09. Directory scan — Bazaar (-b 12), Hybrid Analysis (-a 17), Triage (-x 9)
10. Comprehensive IP lookup across all services (-ip 7)
11. IOC extraction from text, PDF, email, URL (--extract-iocs)
12. YARA rule scanning (--yara, --yara-target)
13. Interactive REPL mode with 22 commands (--interactive)
14. JSON and CSV structured output (--output-format)
15. Result caching with configurable TTL (--no-cache, --cache-ttl)
16. HTTP/HTTPS/SOCKS5 proxy support (--proxy)
17. MITRE ATT&CK technique mapping (--attack-map)
18. Quiet and verbose modes (--quiet, --verbose)
19. HTML/PDF report generation (--report)
20. TUI dashboard mode (--tui)
21. Context-aware LLM prompts — separate threat analysis and CVE analysis prompts
22. LLM provider override from CLI (--llm claude|gemini|openai|ollama)
#threathunting #malware #vulnerability #ai #informationsecurity #cybersecurity #cve











