ThreatRadar / README.md
avnishs17's picture
added video link
8d13f74

A newer version of the Gradio SDK is available: 5.45.0

Upgrade
metadata
title: ThreatRadar
emoji: πŸ“Š
colorFrom: yellow
colorTo: red
sdk: gradio
sdk_version: 5.33.0
app_file: src/gradio_interface.py
pinned: false
license: mit
short_description: AI-Powered Cybersecurity Threat Intelligence
tags:
  - mcp-server-track

πŸ“‘ ThreatRadar

AI-Powered Cybersecurity Threat Intelligence

A comprehensive cybersecurity threat intelligence platform that combines IOC (Indicator of Compromise) analysis with advanced threat intelligence capabilities. ThreatRadar provides an intuitive web interface for cybersecurity professionals and researchers.

Demo Link - Demo Link

πŸš€ Features

  • 🎯 IOC Analysis: Analyze IP addresses, domains, URLs, and file hashes using VirusTotal
  • 🌐 Threat Intelligence: Search and analyze cybersecurity threats, APT groups, malware families using Tavily
  • πŸ€– AI-Powered Analysis: Uses Nebius LLM for intelligent threat assessment and natural language processing
  • ⚑ Real-Time Detection: Automatically identifies and extracts IOCs from natural language queries
  • πŸ–₯️ Web Interface: Intuitive Gradio-powered web interface for easy access
  • πŸ“Š Rich Reporting: HTML-formatted results with expandable raw data sections

πŸ› οΈ Quick Start

πŸ“‹ Prerequisites

πŸ”§ Setup

  1. Configure your API keys in the Hugging Face Spaces secrets:
    • VT_API_KEY: Your VirusTotal API key
    • NEBIUS_API_KEY: Your Nebius API key
    • TAVILY_API_KEY: Your Tavily API key (optional)

🎯 Usage

🌐 Web Interface (Gradio)

The application automatically starts when deployed to Hugging Face Spaces. Simply:

  1. Enter your query in the input field
  2. Click "πŸ” Analyze" to get comprehensive threat intelligence

πŸ“‹ Example Queries

Query Type Example Description
IP Address 8.8.8.8 Analyze IP reputation and threat status
Domain malicious-domain.com Check domain for malicious activity
File Hash 44d88612fea8a8f36de82e1278abb02f Analyze file hash (MD5/SHA1/SHA256)
URL https://suspicious-site.com Check URL for threats
APT Intelligence What is APT29? Get threat actor information
Malware Research Tell me about Lazarus Group Research threat groups
General Security Explain ransomware attack vectors Security knowledge queries

πŸ”— MCP Server Integration

ThreatRadar automatically provides an MCP (Model Context Protocol) server through Gradio when deployed. This allows integration with MCP-compatible tools and IDEs.

Available MCP Tool:

  • analyze_cyberthreat_query: Comprehensive cybersecurity analysis with automatic IOC detection and threat intelligence
    • Handles: IOCs (IPs, domains, URLs, hashes), APT groups, malware families, campaigns, tactics, and natural language queries
    • Auto-detects: Automatically identifies IOC types and routes to appropriate analysis engines
    • Examples:
      • "8.8.8.8" - IP analysis
      • "APT29 tactics" - Threat intelligence search
      • "What can you tell me about the IP 192.168.1.1 and APT29?" - Mixed analysis

Using with Cursor IDE:

  1. ThreatRadar automatically exposes MCP tools when running
  2. Connect your Cursor IDE or other mcp compatible application to the ThreatRadar MCP server
  3. Use the tools directly from your IDE for threat analysis
# To use with locally cloned applicaiton
Add the below to mcp.json file to use the mcp server. Replace the URL with one provided by GRADIO.
Use it through locally run gradio_interface.py 
{
  "mcpServers": {
    "gradio": {
      "url": "http://127.0.0.1:7860/gradio_api/mcp/sse"
    }
  }
}


# Or through gradio spaces mcp url
{
  "mcpServers": {
    "gradio": {
      "url": "https://agents-mcp-hackathon-threatradar.hf.space/gradio_api/mcp/sse"
    }
  }
}

πŸ—οΈ Project Structure

ThreatRadar/
β”œβ”€β”€ πŸ“„ requirements.txt             # Python dependencies
└── πŸ“ src/                         # Main source code
    β”œβ”€β”€ 🌐 gradio_interface.py      # Web interface (Gradio)
    └── πŸ“ core/                    # Core functionality modules
        β”œβ”€β”€ πŸ”§ base_client.py       # Base client class
        β”œβ”€β”€ πŸ›‘οΈ virustotal_client.py # VirusTotal API integration
        └── πŸ€– nebius_llm_client.py # Nebius LLM integration

🌟 Acknowledgments

  • VirusTotal for comprehensive malware detection
  • Tavily for enhanced threat intelligence search
  • Nebius for AI-powered analysis capabilities
  • Gradio for the intuitive web interface
  • Hugging Face for providing the Spaces platform