opt_exploit = args['-p'] opt_log = args['-l'] opt_log_path = args['<log_path>'] utility.write_log( 20, '[Out] Parse command options [{}].'.format(os.path.basename(__file__))) return opt_cloud, opt_ml, opt_gcs, opt_explore, opt_censys, opt_exploit, opt_log, opt_log_path # main. if __name__ == '__main__': file_name = os.path.basename(__file__) full_path = os.path.dirname(os.path.abspath(__file__)) utility = Utilty() utility.write_log(20, '[In] GyoiThon [{}].'.format(file_name)) # Get command arguments. opt_cloud, opt_ml, opt_gcs, opt_explore, opt_censys, opt_exploit, opt_log, opt_log_path = command_parse( utility) # Read config.ini. config = configparser.ConfigParser() config.read(os.path.join(full_path, 'config.ini')) # Common setting value. log_path = '' method_crawl = '' method_log = '' try:
# Show credit. def show_credit(utility): credit = u""" =[ Adversarial Threat Detector v0.0.1-beta ]= + -- --=[ Author : Isao Takaesu (@bbr_bbq) ]=-- + -- --=[ Website : https://github.com/gyoisamurai/Adversarial-Threat-Detector ]=-- """ utility.print_message(NONE, credit) # main. if __name__ == '__main__': file_name = os.path.basename(__file__) full_path = os.path.dirname(os.path.abspath(__file__)) utility = Utilty() report_util = ReportUtility(utility) report_html = HtmlReport(utility) report_ipynb = IpynbReport(utility) utility.write_log( 20, '[In] Adversarial Threat Detector [{}].'.format(file_name)) # Show banner. show_banner(utility) # Parse arguments. parser = argparse.ArgumentParser( description='Adversarial Threat Detector.') parser.add_argument('--model_name', default='', type=str,
-g Optional : Google Custom Search for identify product/version. -e Optional : Explore default path of product. -c Optional : Discover open ports and wrong ssl server certification using Censys. -p Optional : Execute exploit module using Metasploit. -l Optional : Analyze log based HTTP response for identify product/version. -d Optional : Development of signature and train data. -i Optional : Explore relevant FQDN with the target FQDN. -h --help Show this help message and exit. """.format(f=__file__) # main. if __name__ == '__main__': file_name = os.path.basename(__file__) full_path = os.path.dirname(os.path.abspath(__file__)) utility = Utilty() utility.write_log(20, '[In] GyoiThon [{}].'.format(file_name)) # Get command arguments. args = docopt(__doc__) opt_cloud = args['-s'] opt_ml = args['-m'] opt_gcs = args['-g'] opt_explore = args['-e'] opt_censys = args['-c'] opt_exploit = args['-p'] opt_log = args['-l'] opt_log_path = args['--log_path'] opt_develop = args['-d'] opt_develop_category = args['--category'] opt_develop_vendor = args['--vendor']
from urllib.parse import urlparse from Investigator import Investigate from Recommender import Recommend from util import Utilty # Type of printing. OK = 'ok' # [*] NOTE = 'note' # [+] FAIL = 'fail' # [-] WARNING = 'warn' # [!] NONE = 'none' # No label. if __name__ == "__main__": file_name = os.path.basename(__file__) full_path = os.path.dirname(os.path.abspath(__file__)) utility = Utilty() # Read config.ini. config = configparser.ConfigParser() config.read(os.path.join(full_path, 'config.ini')) if len(sys.argv) == 1: utility.print_message(FAIL, 'Invalid parameter "{}"'.format(sys.argv)) exit(1) if sys.argv[1] == 'TRAIN': utility.print_message(NOTE, 'Start {} mode.'.format(sys.argv[1])) obj_recommend = Recommend(utility) obj_recommend.training_model() utility.print_message(NOTE, 'End {} mode.'.format(sys.argv[1])) elif sys.argv[1] == 'TEST' and len(sys.argv) == 3: