Add Ransomware.Live Pro API engine for domain victim lookup#174
Add Ransomware.Live Pro API engine for domain victim lookup#174
Conversation
Agent-Logs-Url: https://github.com/stanfrbd/cyberbro/sessions/355587a9-8735-4b72-80e0-f7fbc90dfede Co-authored-by: stanfrbd <44167150+stanfrbd@users.noreply.github.com>
|
This method doesn't exist. API Details
Task
Implementation GuideProvide a concise Python example using 'requests' with the following structure:
|
… auth header and response fields Agent-Logs-Url: https://github.com/stanfrbd/cyberbro/sessions/a051d69b-260b-45dd-b102-2b20d2ca5513 Co-authored-by: stanfrbd <44167150+stanfrbd@users.noreply.github.com>
|
Actually the real API key header is
And the query parameter is not |
Agent-Logs-Url: https://github.com/stanfrbd/cyberbro/sessions/030f883b-5a80-48fb-a550-cd195181947d Co-authored-by: stanfrbd <44167150+stanfrbd@users.noreply.github.com>
|
Well actually here is a valid example with curl Response You have to remove the client email address from the response and be creative with this: I will need permalink and url search request of the GUI that will look like this: Be consistent with other engines and checklists. Be aware that the API is limited to 3000 calls per day, which is enough! Add this to the docs with reference https://www.ransomware.live/api |
Agent-Logs-Url: https://github.com/stanfrbd/cyberbro/sessions/0405d379-e1f0-4116-ba4a-fbb81fb98fd7 Co-authored-by: stanfrbd <44167150+stanfrbd@users.noreply.github.com>
Agent-Logs-Url: https://github.com/stanfrbd/cyberbro/sessions/0405d379-e1f0-4116-ba4a-fbb81fb98fd7 Co-authored-by: stanfrbd <44167150+stanfrbd@users.noreply.github.com>
Done in 8f797b2 (+ URL-encoding fix in e1e8ecf). Here's a summary of what was changed: Engine (
Templates:
Docs:
All 1206 tests pass. Warning Firewall rules blocked me from connecting to one or more addresses (expand for details)I tried to connect to the following addresses, but was blocked by firewall rules:
If you need me to access, download, or install something from one of these locations, you can either:
|
Adds a new
ransomware_liveengine that queries the Ransomware.Live Pro API to check whether a domain has ever appeared as a ransomware victim on a data leak site (DLS).Summary
GET https://api-pro.ransomware.live/victims/searchwithX-API-KEYheader authentication andqquery parameterFQDNandURLobservables (URL → domain extraction via existing pattern)post_title,group_name,website,discoveredtimestamp,permalinklink to Ransomware.Live entry)clientemail field from the API response — never stored or exposedsearch_url(https://www.ransomware.live/search?q=<domain>&scope=all) for direct GUI navigation, URL-encoded for safetyNonewhen API key is absentdisplay_cards.html,display_table.html,index.htmlcheckbox (☠️, alphabetical), clipboard copy informat_results.js, ransomware group nodes ingraph.htmldocs/api-keys/Get-Ransomware-Live-API-key.md) referencing https://www.ransomware.live/api, engine entry inAPI-usage-and-engine-names.md,mkdocs.ymlsidebar entryScope
Validation (required)
Test evidence
17 tests covering: victim found/not-found, correct endpoint/header/param usage, URL domain extraction, missing API key, HTTP 401/403/404/500, connection timeout, invalid JSON, multiple victims, export row formatting, and engine properties.
AI-assisted contribution disclosure
Engine scaffolding, templates, test suite, and UI integration were AI-assisted.
Maintainer merge policy acknowledgement
devfirst for additional validation.mainis kept clean/stable for releases and tags.New engine checklist (only if applicable)
Engine Implementation
engines/ransomware_live.py(using existing engines as template).engines/__init__.py.utils/config.py(ransomware_live_api_key).Configuration & Secrets
.env.sample(RANSOMWARE_LIVE_API_KEY).docker-compose.yml.UI & Frontend
static/format_results.js.templates/engine_layouts/for card/table rendering.templates/display_cards.htmlandtemplates/display_table.html.templates/index.htmlwith description (alphabetic order).templates/graph.html.Documentation
docs/api-keys/Get-Ransomware-Live-API-key.md(if relevant).docs/index.md(if relevant).docs/quick-start/API-usage-and-engine-names.md.mkdocs.ymlsidebar.docs/quick-start/Quick-start-&-Installation.mdand.envexamples.docs/quick-start/Advanced-options-for-deployment.md(docker composeexample).README.mdreferences (env vars and API/services section).Risk and rollback
load_engines.py/config.py/ template additionsAdditional notes
Nonewithout one, consistent with other keyed engines.docker-compose.yml,docs/index.md,Quick-startdocs,README.md) are follow-up tasks.