|Raphaël Vinot 218c02aa25 chg: Bump requirements.txt||7 months ago|
|bin||1 year ago|
|cache||1 year ago|
|client||1 year ago|
|doc/logo||1 year ago|
|urlabuse||1 year ago|
|website||11 months ago|
|.gitignore||1 year ago|
|.gitmodules||1 year ago|
|.travis.yml||1 year ago|
|LICENSE||5 years ago|
|Pipfile||7 months ago|
|Pipfile.lock||7 months ago|
|README.md||1 year ago|
|requirements.txt||7 months ago|
|setup.py||1 year ago|
URL Abuse is a versatile free software for URL review, analysis and black-list reporting. URL Abuse is composed of a web interface where requests are submitted asynchronously and a back-end system to process the URLs into features modules.
Please note that some of the API services will require an API key. The API keys should be located in the root of the URL Abuse directory.
If you don’t want to use the online version or run your own version of URL Abuse, you can follow the install process below.
IMPORTANT: Use pipenv
NOTE: Yes, it requires python3.6+. No, it will never support anything older.
git clone https://github.com/antirez/redis.git cd redis git checkout 5.0 make make test cd ..
git clone git://github.com/stricaud/faup.git cd faup mkdir build cd build cmake .. && make sudo make install
git clone https://github.com/CIRCL/url-abuse.git cd url-abuse pipenv install echo URLABUSE_HOME="'`pwd`'" > .env pipenv shell # Copy and review the configuration: cp website/config/config.ini.sample website/config/config.ini # Starts all the backend start.py # Start the web interface start_website.py
We welcome pull requests for new extensions, bug fixes.
Look at the existings functions/modules. The changes will have to be made in the following files:
URL Abuse was being developed as part of the “European Union anti-Phishing Initiative” (EU PI) project. This project was coordinated by Cert-Lexsi and co-funded by the Prevention of and Fight against Crime programme of the European Union.
URL Abuse is currently supported and funded by CIRCL ( Computer Incident Response Center Luxembourg).