def main(): # Much much imports :) updateHandler = Updater eulaHandler = EULA() bannerHandler = muchmuchstrings.banners() terminalHandler = Controller() def checkresults(array): if len(array) == 0: print "No results found\n\n" sys.exit(1) def checkargs(): print "Type: " + type_of_mal print "Lang: " + pl print "Search: " + search def filter_array(array, colum, value): ret_array = [row for row in array if value in row[colum]] return ret_array def print_results(array): # print_results will suprisingly print the results... answer = array[vars.column_for_uid] + "\t" + array[vars.column_for_name]+ "\t" + array[vars.column_for_version] + "\t\t" answer += array[vars.column_for_location] + "\t\t" + array[vars.colomn_for_time] print answer def getArgvs(): parser = OptionParser() parser = OptionParser() parser.add_option("-t", "--type", dest="type_of_mal", default='', help="Type of malware to search. \nFor example botnet,trojan,virus,etc...") parser.add_option("-l", "--language", dest="lang_of_mal", default='', help="Language of the version of the malware which is in the databse.\nFor example: vbs,vb,c,cpp,bin,etc...") parser.add_option("-a", "--architecture", dest="arch_of_mal", default='', help="The architecture the malware is intended for.\nFor example: x86,x64,arm7,etc...") parser.add_option("-p", "--platform", dest="plat_of_mal", default="", help="Platform the malware is inteded for.\nFor example: win32,win64,ios,android,etc...") parser.add_option("-u", "--update", dest="update_bol", default=0, help="Updates the DB of theZoo.", action="store_true") parser.add_option("-v", "--version" , dest="ver_bol", default=0, help="Shows version and licensing information.", action="store_true") parser.add_option("-w", "--license", dest="license_bol", default=0, help="Prints the GPLv3 license information.", action="store_true") (options, args) = parser.parse_args() return options # Here actually starts Main() # Zeroing everything type_of_mal = "" pl = "" search = "" new = "" update = 0 m = []; f = "" arguments = getArgvs() # Checking for EULA Agreement a = eulaHandler.check_eula_file() if a == 0: eulaHandler.prompt_eula() # Get arguments # Check if update flag is on if arguments.update_bol == 1: a = Updater() a.update_db() sys.exit(1) # Check if version flag is on if arguments.ver_bol == 1: print vars.maldb_banner sys.exit(1) # Check if license flag is on if arguments.license_bol == 1: bannerHandler.print_license() sys.exit(1) if ((len(arguments.type_of_mal) > 0) or (len(arguments.arch_of_mal) > 0) or (len(arguments.lang_of_mal) > 0) or (len(arguments.plat_of_mal) > 0)): # Take index.csv and convert into array m csvReader = csv.reader(open(vars.main_csv_file, 'rb'), delimiter=',') for row in csvReader: m.append(row) # Filter by type if len(arguments.type_of_mal) > 0: m = filter_array(m, vars.column_for_type, arguments.type_of_mal) # Filter by programming language if len(arguments.lang_of_mal) > 0: m = filter_array(m, vars.column_for_plat, arguments.lang_of_mal) # Filter by architecture if len(arguments.arch_of_mal) > 0: m = filter_array(m, vars.column_for_arch, arguments.arch_of_mal) # Filter by Platform if len(arguments.plat_of_mal) > 0: m = filter_array(m, vars.column_for_plat, arguments.plat_of_mal) i=0 print vars.maldb_banner print 'ID\tName\t\tType\t\tVersion\t\tLanguage' print '--\t----\t\t----\t\t-------\t\t--------' for g in m: #print 'now' answer = m[i][vars.column_for_uid] answer += '\t%s' % ('{0: <12}'.format(m[i][vars.column_for_name])) answer += '\t%s' % ('{0: <12}'.format(m[i][vars.column_for_type])) answer += '\t%s' % ('{0: <12}'.format(m[i][vars.column_for_version])) answer += '\t%s' % ('{0: <12}'.format(m[i][vars.column_for_pl])) print answer i=i+1 sys.exit(1) # Initiate normal run. No arguments given. os.system('clear') print vars.maldb_banner while 1: terminalHandler.MainMenu() sys.exit(1)
def main(): # Much much imports :) updateHandler = Updater eulaHandler = EULA() bannerHandler = muchmuchstrings.banners() db = db_handler.DBHandler() terminalHandler = Controller() def filter_array(array, colum, value): ret_array = [row for row in array if value in row[colum]] return ret_array def getArgvs(): parser = OptionParser() parser = OptionParser() parser.add_option("-f", "--filter", dest="mal_filter", default=[], help="Filter the malwares.", action="append") parser.add_option("-u", "--update", dest="update_bol", default=0, help="Updates the DB of theZoo.", action="store_true") parser.add_option("-v", "--version", dest="ver_bol", default=0, help="Shows version and licensing information.", action="store_true") parser.add_option("-w", "--license", dest="license_bol", default=0, help="Prints the GPLv3 license information.", action="store_true") (options, args) = parser.parse_args() return options # Here actually starts Main() arguments = getArgvs() # Checking for EULA Agreement a = eulaHandler.check_eula_file() if a == 0: eulaHandler.prompt_eula() # Get arguments # Check if update flag is on if arguments.update_bol == 1: a = Updater() with open('conf/db.ver', 'r') as f: a.update_db(f.readline()) sys.exit(1) # Check if version flag is on if arguments.ver_bol == 1: print(vars.maldb_banner) sys.exit(1) # Check if license flag is on if arguments.license_bol == 1: bannerHandler.print_license() sys.exit(1) if len(arguments.mal_filter) > 0: manySearch = manysearches.MuchSearch() print(vars.maldb_banner) manySearch.sort(arguments.mal_filter) sys.exit(1) # Initiate normal run. No arguments given. os.system('cls' if os.name == 'nt' else 'clear') print(vars.maldb_banner) while 1: terminalHandler.MainMenu() sys.exit(1)
def main(): # Much much imports :) updateHandler = Updater eulaHandler = EULA() bannerHandler = muchmuchstrings.banners() terminalHandler = Controller() def checkresults(array): if len(array) == 0: print "No results found\n\n" sys.exit(1) def checkargs(): print "Type: " + type_of_mal print "Lang: " + pl print "Search: " + search def filter_array(array, colum, value): ret_array = [row for row in array if value in row[colum]] return ret_array def print_results(array): # print_results will suprisingly print the results... answer = array[vars.column_for_uid] + "\t" + array[vars.column_for_name]+ "\t" + array[vars.column_for_version] + "\t\t" answer += array[vars.column_for_location] + "\t\t" + array[vars.colomn_for_time] print answer # Here actually starts Main() options, remainder = getopt.getopt(sys.argv[1:], 'hwuvs:p:t:', ['type=', 'language=', 'search=', 'help', 'update', 'version', 'dbv' ]) # Zeroing everything type_of_mal = "" pl = "" search = "" new ="" update=0 m=[]; f = "" # Checking for EULA Agreement a = eulaHandler.check_eula_file() if a == 0: eulaHandler.prompt_eula() # Get arguments for opt, arg in options: if opt in ('-h', '--help'): print vars.fulllicense print vars.useage sys.exit(1) elif opt in ('-u', '--update'): updateHandler.update_db() sys.exit(1) elif opt in ('-v', '--version'): bannerHandler.versionbanner() sys.exit(1) elif opt in '-w': bannerHandler.print_license() sys.exit(1) elif opt in ('-t', '--type'): type_of_mal = arg elif opt in ('-p', '--language'): pl = arg elif opt in ('-s', '--search'): search = arg elif opt in '--dbv': # Getting version of malware-DB's database a = updateHandler.get_maldb_ver() if a == 0: sys.exit(0) elif len(a) > 0: print '' print "Malware-DB Database's version is: " + a sys.exit() # Take index.csv and convert into array m csvReader = csv.reader(open(vars.main_csv_file, 'rb'), delimiter=',') for row in csvReader: m.append(row) # Filter by type if len(type_of_mal) > 0: m = filter_array(m, vars.column_for_type, type_of_mal) # Filter by programming language if len(pl) > 0: m = filter_array(m, vars.column_for_pl, pl) os.system('clear') print vars.maldb_banner while 1: terminalHandler.MainMenu() sys.exit(1)
def main(): # Much much imports :) updateHandler = Updater eulaHandler = EULA() bannerHandler = muchmuchstrings.banners() db = db_handler.DBHandler() terminalHandler = Controller() def filter_array(array, colum, value): ret_array = [row for row in array if value in row[colum]] return ret_array def getArgvs(): parser = OptionParser() parser = OptionParser() parser.add_option("-f", "--filter", dest="mal_filter", default=[], help="Filter the malwares.", action="append") parser.add_option("-u", "--update", dest="update_bol", default=0, help="Updates the DB of theZoo.", action="store_true") parser.add_option("-v", "--version", dest="ver_bol", default=0, help="Shows version and licensing information.", action="store_true") parser.add_option("-w", "--license", dest="license_bol", default=0, help="Prints the GPLv3 license information.", action="store_true") (options, args) = parser.parse_args() return options # Here actually starts Main() arguments = getArgvs() # Checking for EULA Agreement a = eulaHandler.check_eula_file() if a == 0: eulaHandler.prompt_eula() # Get arguments # Check if update flag is on if arguments.update_bol == 1: a = Updater() a.update_db() sys.exit(1) # Check if version flag is on if arguments.ver_bol == 1: print vars.maldb_banner sys.exit(1) # Check if license flag is on if arguments.license_bol == 1: bannerHandler.print_license() sys.exit(1) if len(arguments.mal_filter) > 0: manySearch = manysearches.MuchSearch() print vars.maldb_banner manySearch.sort(arguments.mal_filter) sys.exit(1) # Initiate normal run. No arguments given. os.system('cls' if os.name == 'nt' else 'clear') print vars.maldb_banner while 1: terminalHandler.MainMenu() sys.exit(1)