opt_log = args['-l'] opt_log_path = args['<log_path>'] utility.write_log( 20, '[Out] Parse command options [{}].'.format(os.path.basename(__file__))) return opt_cloud, opt_ml, opt_gcs, opt_explore, opt_censys, opt_exploit, opt_log, opt_log_path # main. if __name__ == '__main__': file_name = os.path.basename(__file__) full_path = os.path.dirname(os.path.abspath(__file__)) utility = Utilty() utility.write_log(20, '[In] IndroML2 [{}].'.format(file_name)) # Get command arguments. opt_cloud, opt_ml, opt_gcs, opt_explore, opt_censys, opt_exploit, opt_log, opt_log_path = command_parse( utility) # Read config.ini. config = configparser.ConfigParser() config.read(os.path.join(full_path, 'config.ini')) # Common setting value. log_path = '' method_crawl = '' method_log = '' max_target_url = 0 max_target_byte = 0
-e Optional : Explore default path of product. -c Optional : Discover open ports and wrong ssl server certification using Censys. -p Optional : Execute exploit module using Metasploit. -l Optional : Analyze log based HTTP response for identify product/version. -d Optional : Development of signature and train data. -i Optional : Explore relevant FQDN with the target FQDN. -h --help Show this help message and exit. """.format(f=__file__) # main. if __name__ == '__main__': file_name = os.path.basename(__file__) full_path = os.path.dirname(os.path.abspath(__file__)) utility = Utilty() utility.write_log(20, '[In] GyoiThon [{}].'.format(file_name)) # Get command arguments. args = docopt(__doc__) opt_cloud = args['-s'] opt_ml = args['-m'] opt_gcs = args['-g'] opt_explore = args['-e'] opt_censys = args['-c'] opt_exploit = args['-p'] opt_log = args['-l'] opt_log_path = args['--log_path'] opt_develop = args['-d'] opt_develop_category = args['--category'] opt_develop_vendor = args['--vendor'] opt_develop_package = args['--package']
{f} -h | --help options: -g Optional : Gather your face images. -c Optional : Create dataset that train and test. -t Optional : Train face recognition model. -a Optional : Adversarial Examples test. -r Optional : Record your appearance for Deep Fake. -h --help Show this help message and exit. """.format(f=__file__) if __name__ == '__main__': file_name = os.path.basename(__file__) full_path = os.path.dirname(os.path.abspath(__file__)) utility = Utilty() utility.write_log(20, '[In] Broken Face recognition [{}].'.format(file_name)) # Get command arguments. args = docopt(__doc__) opt_gather = args['-g'] opt_label_name = args['--label_name'] opt_create = args['-c'] opt_train = args['-t'] opt_adversarial = args['-a'] opt_record = args['-r'] opt_rec_file_name = args['--rec_file_name'] # Read config.ini. config = configparser.ConfigParser() config.read(os.path.join(full_path, 'config.ini'))
utility.print_message( WARNING, 'Not implementation: {}'.format(args.defence_type)) return ret_status, report_util # main. if __name__ == '__main__': file_name = os.path.basename(__file__) full_path = os.path.dirname(os.path.abspath(__file__)) utility = Utilty() report_util = ReportUtility(utility) report_html = HtmlReport(utility) report_ipynb = IpynbReport(utility) utility.write_log( 20, '[In] Adversarial Threat Detector [{}].'.format(file_name)) # Initialize Database. utility.sql = DbControl(utility) # Show banner. show_banner(utility) # Parse arguments. parser = argparse.ArgumentParser( description='Adversarial Threat Detector.') parser.add_argument('--target_id', default=0, type=int, help='Target\'s identifier for GyoiBoard.') parser.add_argument('--scan_id',
def show_credit(utility): credit = u""" =[ GyoiThon v0.0.1-beta ]= + -- --=[ Author : Gyoiler (@gyoithon) ]=-- + -- --=[ Website : https://github.com/gyoisamurai/GyoiThon/ ]=-- """ utility.print_message(NONE, credit) # main. if __name__ == '__main__': file_name = os.path.basename(__file__) full_path = os.path.dirname(os.path.abspath(__file__)) utility = Utilty() utility.write_log(20, '[In] GyoiThon [{}].'.format(file_name)) # Read config.ini. config = configparser.ConfigParser() config.read(os.path.join(full_path, 'config.ini')) # Common setting value. log_path = '' method_crawl = '' try: log_dir = config['Common']['log_path'] log_path = os.path.join(full_path, log_dir) method_crawl = config['Common']['method_crawl'] except Exception as e: msg = 'Reading config.ini is failure : {}'.format(e) utility.print_exception(e, msg)