This is the official repository for team MIV's malware tracker. The tracker can be found here and is currently under heavy development. It is being used to assist with the collection of malware samples from OSINT sources and MIV's own honeypot network. It is the intention for the tracker to become a centralised repository helping MIV members with malware analysis and information dissemination through the group's website.
The tracker is heavily based on the OSTIP platform, originally developed by kx499.
As prep work on Debian or Ubuntu systems, you will need to run sudo apt install git python-virtualenv python-pip python-dev
To install miv-tracker do the following:
git clone https://github.com/team-miv/miv-tracker.git
virtualenv venv
cd venv
bin/pip install -r requirements.txt
./db_create.py
Note: on first time installation, you will be asked to supply an administrator username and password./db_populate.py
To run miv-tracker locally for testing and development purposes do the following:
source venv/bin/activate
./run.py
To run miv-tracker in a production environment run the following:
source venv/bin/activate
pip install gunicorn
gunicorn --bind 0.0.0.0:5000 run:app
./tasks.py &
Note: An optimal production setup would serve miv-tracker via gunicorn behing Nginx acting as a front end reverse proxy. Instructions to do so can be found here.
This project adheres to Semantic Versioning.