C:\Users\ASUS\Desktop>python ddom.py
C:\Users\ASUS\Desktop\ddom.py:118: SyntaxWarning: invalid escape sequence '\d'
b = re.findall("
[\d]{4}-[\d]{2}-[\d]{2}</td>\n.+\n", con)
C:\Users\ASUS\Desktop\ddom.py:121: SyntaxWarning: invalid escape sequence '\d'
date = re.search(" | ([\d]{4}-[\d]{2}-[\d]{2})</td>", i)
C:\Users\ASUS\Desktop\ddom.py:122: SyntaxWarning: invalid escape sequence '/'
malware = re.search("\t | (.+)</td>", i)
C:\Users\ASUS\Desktop\ddom.py:124: SyntaxWarning: invalid escape sequence '/'
malware = re.sub("<br/>", "", malware.group(1))
C:\Users\ASUS\Desktop\ddom.py:149: SyntaxWarning: invalid escape sequence '.'
"href='ViriFiche.php?ID=[\d]+'>(.+)</TD>", i)
C:\Users\ASUS\Desktop\ddom.py:152: SyntaxWarning: invalid escape sequence '\d'
if not re.search("[\d]{1,2}-[\d]{1,2}", temp_mal_address):
C:\Users\ASUS\Desktop\ddom.py:175: SyntaxWarning: invalid escape sequence '.'
address = re.findall("href='/site/([A-Za-z0-9%._-]+)", linie.decode("utf-8"))
Daily Dose of Malware (DDoM)
Original author: https://github.com/notnop
Rewritten by Enderman and Matt in Python 3!
%%%%&&&&..............%%%/ Malware is art!
%%%%&&&&.........&&&..%%%%% Don't let it become a filthy criminal's tool!
%%%%&&&&.........&&&..%%%%%%%
%%%%&&&&.........&&&..%%%%%%% https://malwarewatch.org
%%%%&&&&.........,,,..%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%% _________________ .%%%%
%%%% _________________ .%%%%
%%%% _________________ .%%%%
%%%% _________________ .%%%%
%%%% _________________ .%%%%
%%%% _________________ .%%%%
%&&% ,%&&%
%&&%%%%%%%%%%%%%%%%%%%%%%%&&%
%&&%%%%%%%%%%%%%%%%%%%%%%%&&%
Namespace(rename=None, yes_to_all=None)
[*] Argument was omitted - going with 100 samples by default
You'll get latest 100 samples from:
# http://malc0de.com
# http://vxvault.net
# http://tracker.h3x.eu
Confirm and start downloading 100 samples? [y/N] y
Searching...
Malc0de: HTTPSConnectionPool(host='malc0de.com', port=443): Max retries exceeded with url: /database/?&page=0 (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: self-signed certificate (_ssl.c:1000)')))
Malc0de: HTTPSConnectionPool(host='malc0de.com', port=443): Max retries exceeded with url: /database/?&page=1 (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: self-signed certificate (_ssl.c:1000)')))
Malc0de: HTTPSConnectionPool(host='malc0de.com', port=443): Max retries exceeded with url: /database/?&page=2 (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: self-signed certificate (_ssl.c:1000)')))
[] Malc0de - Done 0
[] VXVault - Done 0
Traceback (most recent call last):
File "C:\Users\ASUS\Desktop\ddom.py", line 253, in
h3x_clean(scount)
File "C:\Users\ASUS\Desktop\ddom.py", line 184, in h3x_clean
list = h3x_get(x)
^^^^^^^^^^
File "C:\Users\ASUS\Desktop\ddom.py", line 170, in h3x_get
con_page = urllib.request.urlopen(req).readlines()
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "C:\Users\ASUS\AppData\Local\Programs\Python\Python312\Lib\urllib\request.py", line 215, in urlopen
return opener.open(url, data, timeout)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "C:\Users\ASUS\AppData\Local\Programs\Python\Python312\Lib\urllib\request.py", line 521, in open
response = meth(req, response)
^^^^^^^^^^^^^^^^^^^
File "C:\Users\ASUS\AppData\Local\Programs\Python\Python312\Lib\urllib\request.py", line 630, in http_response
response = self.parent.error(
^^^^^^^^^^^^^^^^^^
File "C:\Users\ASUS\AppData\Local\Programs\Python\Python312\Lib\urllib\request.py", line 559, in error
return self._call_chain(*args)
^^^^^^^^^^^^^^^^^^^^^^^
File "C:\Users\ASUS\AppData\Local\Programs\Python\Python312\Lib\urllib\request.py", line 492, in _call_chain
result = func(*args)
^^^^^^^^^^^
File "C:\Users\ASUS\AppData\Local\Programs\Python\Python312\Lib\urllib\request.py", line 639, in http_error_default
raise HTTPError(req.full_url, code, msg, hdrs, fp)
urllib.error.HTTPError: HTTP Error 500: Internal Server Error
|
http://malc0de.com/ has been taken down and is now parked via DreamHost.