search_malware
Pack: threatfox · Endpoint: https://gateway.pipeworx.io/threatfox/mcp
IOCs tagged to a malware family (e.g., “Cobalt Strike”, “Emotet”, “QakBot”).
Parameters
| Name | Type | Required | Description |
|---|---|---|---|
malware | string | yes | Malware family name or MISP alias |
limit | number | no | Max records (default 1000) |
Example call
curl -X POST https://gateway.pipeworx.io/threatfox/mcp \
-H 'Content-Type: application/json' \
-d '{"jsonrpc":"2.0","id":1,"method":"tools/call","params":{"name":"search_malware","arguments":{}}}'
Connect
Add this to your MCP client config, or use one-click install buttons:
{
"mcpServers": {
"threatfox": {
"url": "https://gateway.pipeworx.io/threatfox/mcp"
}
}
}
See Getting Started for client-specific install steps.