Endermanch / MalwareDatabase

One of a few malware collections on the GitHub.
https://malwarewatch.org
2.34k stars 532 forks source link

ddom.py not working #376

Open webntdev opened 7 months ago

webntdev commented 7 months ago

C:\Users\ASUS\Desktop>python ddom.py C:\Users\ASUS\Desktop\ddom.py:118: SyntaxWarning: invalid escape sequence '\d' b = re.findall("[\d]{4}-[\d]{2}-[\d]{2}<\/td>\n.+\n", con) C:\Users\ASUS\Desktop\ddom.py:121: SyntaxWarning: invalid escape sequence '\d' date = re.search("([\d]{4}-[\d]{2}-[\d]{2})<\/td>", i) C:\Users\ASUS\Desktop\ddom.py:122: SyntaxWarning: invalid escape sequence '\/' malware = re.search("\t(.+)<\/td>", i) C:\Users\ASUS\Desktop\ddom.py:124: SyntaxWarning: invalid escape sequence '\/' malware = re.sub("<br\/>", "", malware.group(1)) C:\Users\ASUS\Desktop\ddom.py:149: SyntaxWarning: invalid escape sequence '.' "href='ViriFiche.php\?ID=[\d]+'>(.+)", i) C:\Users\ASUS\Desktop\ddom.py:152: SyntaxWarning: invalid escape sequence '\d' if not re.search("[\d]{1,2}-[\d]{1,2}", temp_maladdress): C:\Users\ASUS\Desktop\ddom.py:175: SyntaxWarning: invalid escape sequence '.' address = re.findall("href='/site/([A-Za-z0-9%.-]+)", linie.decode("utf-8"))

Daily Dose of Malware (DDoM)

Original author: https://github.com/notnop Rewritten by Enderman and Matt in Python 3!

%%%%&&&&..............%%%/ Malware is art! %%%%&&&&.........&&&..%%%%% Don't let it become a filthy criminal's tool! %%%%&&&&.........&&&..%%%%%%% %%%%&&&&.........&&&..%%%%%%% https://malwarewatch.org %%%%&&&&.........,,,..%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%%% .%%%% %%%% .%%%% %%%% .%%%% %%%% .%%%% %%%% .%%%% %%%% .%%%% %&&% ,%&&% %&&%%%%%%%%%%%%%%%%%%%%%%%&&% %&&%%%%%%%%%%%%%%%%%%%%%%%&&%

Namespace(rename=None, yes_to_all=None) [*] Argument was omitted - going with 100 samples by default

You'll get latest 100 samples from:

http://malc0de.com

    # http://vxvault.net
    # http://tracker.h3x.eu

Confirm and start downloading 100 samples? [y/N] y

Searching... Malc0de: HTTPSConnectionPool(host='malc0de.com', port=443): Max retries exceeded with url: /database/?&page=0 (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: self-signed certificate (_ssl.c:1000)'))) Malc0de: HTTPSConnectionPool(host='malc0de.com', port=443): Max retries exceeded with url: /database/?&page=1 (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: self-signed certificate (_ssl.c:1000)'))) Malc0de: HTTPSConnectionPool(host='malc0de.com', port=443): Max retries exceeded with url: /database/?&page=2 (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: self-signed certificate (_ssl.c:1000)'))) [] Malc0de - Done 0 [] VXVault - Done 0 Traceback (most recent call last): File "C:\Users\ASUS\Desktop\ddom.py", line 253, in h3x_clean(scount) File "C:\Users\ASUS\Desktop\ddom.py", line 184, in h3x_clean list = h3x_get(x) ^^^^^^^^^^ File "C:\Users\ASUS\Desktop\ddom.py", line 170, in h3x_get con_page = urllib.request.urlopen(req).readlines() ^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "C:\Users\ASUS\AppData\Local\Programs\Python\Python312\Lib\urllib\request.py", line 215, in urlopen return opener.open(url, data, timeout) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "C:\Users\ASUS\AppData\Local\Programs\Python\Python312\Lib\urllib\request.py", line 521, in open response = meth(req, response) ^^^^^^^^^^^^^^^^^^^ File "C:\Users\ASUS\AppData\Local\Programs\Python\Python312\Lib\urllib\request.py", line 630, in http_response response = self.parent.error( ^^^^^^^^^^^^^^^^^^ File "C:\Users\ASUS\AppData\Local\Programs\Python\Python312\Lib\urllib\request.py", line 559, in error return self._call_chain(args) ^^^^^^^^^^^^^^^^^^^^^^^ File "C:\Users\ASUS\AppData\Local\Programs\Python\Python312\Lib\urllib\request.py", line 492, in _call_chain result = func(args) ^^^^^^^^^^^ File "C:\Users\ASUS\AppData\Local\Programs\Python\Python312\Lib\urllib\request.py", line 639, in http_error_default raise HTTPError(req.full_url, code, msg, hdrs, fp) urllib.error.HTTPError: HTTP Error 500: Internal Server Error

GavinGoGaming commented 6 months ago

http://malc0de.com/ has been taken down and is now parked via DreamHost.