Esempio n. 1
0
    opt_log = args['-l']
    opt_log_path = args['<log_path>']

    utility.write_log(
        20,
        '[Out] Parse command options [{}].'.format(os.path.basename(__file__)))
    return opt_cloud, opt_ml, opt_gcs, opt_explore, opt_censys, opt_exploit, opt_log, opt_log_path


# main.
if __name__ == '__main__':
    file_name = os.path.basename(__file__)
    full_path = os.path.dirname(os.path.abspath(__file__))

    utility = Utilty()
    utility.write_log(20, '[In] IndroML2 [{}].'.format(file_name))

    # Get command arguments.
    opt_cloud, opt_ml, opt_gcs, opt_explore, opt_censys, opt_exploit, opt_log, opt_log_path = command_parse(
        utility)

    # Read config.ini.
    config = configparser.ConfigParser()
    config.read(os.path.join(full_path, 'config.ini'))

    # Common setting value.
    log_path = ''
    method_crawl = ''
    method_log = ''
    max_target_url = 0
    max_target_byte = 0
Esempio n. 2
0
    -e   Optional : Explore default path of product.
    -c   Optional : Discover open ports and wrong ssl server certification using Censys.
    -p   Optional : Execute exploit module using Metasploit.
    -l   Optional : Analyze log based HTTP response for identify product/version.
    -d   Optional : Development of signature and train data.
    -i   Optional : Explore relevant FQDN with the target FQDN. 
    -h --help     Show this help message and exit.
""".format(f=__file__)

# main.
if __name__ == '__main__':
    file_name = os.path.basename(__file__)
    full_path = os.path.dirname(os.path.abspath(__file__))

    utility = Utilty()
    utility.write_log(20, '[In] GyoiThon [{}].'.format(file_name))

    # Get command arguments.
    args = docopt(__doc__)
    opt_cloud = args['-s']
    opt_ml = args['-m']
    opt_gcs = args['-g']
    opt_explore = args['-e']
    opt_censys = args['-c']
    opt_exploit = args['-p']
    opt_log = args['-l']
    opt_log_path = args['--log_path']
    opt_develop = args['-d']
    opt_develop_category = args['--category']
    opt_develop_vendor = args['--vendor']
    opt_develop_package = args['--package']
Esempio n. 3
0
    {f} -h | --help
options:
    -g   Optional : Gather your face images.
    -c   Optional : Create dataset that train and test.
    -t   Optional : Train face recognition model.
    -a   Optional : Adversarial Examples test.
    -r   Optional : Record your appearance for Deep Fake.
    -h --help     Show this help message and exit.
""".format(f=__file__)

if __name__ == '__main__':
    file_name = os.path.basename(__file__)
    full_path = os.path.dirname(os.path.abspath(__file__))

    utility = Utilty()
    utility.write_log(20,
                      '[In] Broken Face recognition [{}].'.format(file_name))

    # Get command arguments.
    args = docopt(__doc__)
    opt_gather = args['-g']
    opt_label_name = args['--label_name']
    opt_create = args['-c']
    opt_train = args['-t']
    opt_adversarial = args['-a']
    opt_record = args['-r']
    opt_rec_file_name = args['--rec_file_name']

    # Read config.ini.
    config = configparser.ConfigParser()
    config.read(os.path.join(full_path, 'config.ini'))
Esempio n. 4
0
        utility.print_message(
            WARNING, 'Not implementation: {}'.format(args.defence_type))

    return ret_status, report_util


# main.
if __name__ == '__main__':
    file_name = os.path.basename(__file__)
    full_path = os.path.dirname(os.path.abspath(__file__))

    utility = Utilty()
    report_util = ReportUtility(utility)
    report_html = HtmlReport(utility)
    report_ipynb = IpynbReport(utility)
    utility.write_log(
        20, '[In] Adversarial Threat Detector [{}].'.format(file_name))

    # Initialize Database.
    utility.sql = DbControl(utility)

    # Show banner.
    show_banner(utility)

    # Parse arguments.
    parser = argparse.ArgumentParser(
        description='Adversarial Threat Detector.')
    parser.add_argument('--target_id',
                        default=0,
                        type=int,
                        help='Target\'s identifier for GyoiBoard.')
    parser.add_argument('--scan_id',
Esempio n. 5
0
def show_credit(utility):
    credit = u"""
       =[ GyoiThon v0.0.1-beta                               ]=
+ -- --=[ Author  : Gyoiler (@gyoithon)                      ]=--
+ -- --=[ Website : https://github.com/gyoisamurai/GyoiThon/ ]=--
    """
    utility.print_message(NONE, credit)


# main.
if __name__ == '__main__':
    file_name = os.path.basename(__file__)
    full_path = os.path.dirname(os.path.abspath(__file__))

    utility = Utilty()
    utility.write_log(20, '[In] GyoiThon [{}].'.format(file_name))

    # Read config.ini.
    config = configparser.ConfigParser()
    config.read(os.path.join(full_path, 'config.ini'))

    # Common setting value.
    log_path = ''
    method_crawl = ''
    try:
        log_dir = config['Common']['log_path']
        log_path = os.path.join(full_path, log_dir)
        method_crawl = config['Common']['method_crawl']
    except Exception as e:
        msg = 'Reading config.ini is failure : {}'.format(e)
        utility.print_exception(e, msg)