exit(1) # Show banner. show_banner(utility) # Create instances. cloud_checker = CloudChecker(utility) version_checker = VersionChecker(utility) version_checker_ml = VersionCheckerML(utility) comment_checker = CommentChecker(utility) error_checker = ErrorChecker(utility) page_checker = PageChecker(utility) google_hack = GoogleCustomSearch(utility) content_explorer = ContentExplorer(utility) spider = SpiderControl(utility) report = CreateReport(utility) cve_explorer = CveExplorerNVD(utility) censys = Censys(utility) # Get target information from "host.txt". protocol_list, fqdn_list, port_list, path_list = get_target_info( full_path, utility) # Start investigation. for idx in range(len(fqdn_list)): # Check parameters. msg = 'investigation : {}, {}, {}, {}'.format(protocol_list[idx], fqdn_list[idx], port_list[idx], path_list[idx]) utility.write_log(20, 'Start ' + msg)
if opt_develop: creator = Creator(utility) creator.extract_file_structure(opt_develop_category, opt_develop_vendor, opt_develop_package) print(os.path.basename(__file__) + ' finish!!') utility.write_log(20, '[Out] GyoiThon [{}].'.format(file_name)) sys.exit(0) # Explore relevant FQDN with the target FQDN. if opt_invent: inventory_list_path = os.path.join(full_path, 'inventory_list.txt') if os.path.exists(inventory_list_path): inventory = Inventory(utility) spider = SpiderControl(utility) google_hack = GoogleCustomSearch(utility) report = CreateReport(utility) with codecs.open(inventory_list_path, 'r', 'utf-8') as fin: targets = fin.readlines() for target in targets: items = target.replace('\r', '').replace('\n', '').split('\t') if len(items) != 2: utility.print_message( FAIL, 'Invalid inventory target : {}'.format(target)) continue # Check target URL. port_num = '' invent_url = ''
sys.exit(0) # Explore relevant FQDN with the target FQDN. report_path = None invent_report_header = None inventory = None if opt_invent: # Create path. org_list_path = os.path.join(full_path, 'organization_list.csv') domain_list_path = os.path.join(full_path, 'domain_list.csv') # Create instances. inventory = Inventory(utility) google_hack = GoogleCustomSearch(utility) cv = ComputerVision(utility) report = CreateReport(utility) # Define report header for continuous health check. invent_report_header = report.header_invent if opt_invent_screen_shot: invent_report_header.extend(report.header_ss) # Explore domains and subdomains from domain list. if opt_invent_domain_list is not None and os.path.exists( domain_list_path): # Get import path of domain list. # Search domain. domain_info_dict_tmp = inventory.domain_explore( import_list=domain_list_path) # Search sub-domain.
utility.write_log(20, '[Out] GyoiThon [{}].'.format(file_name)) exit(1) # Show banner. show_banner(utility) # Create instances. cloud_checker = CloudChecker(utility) version_checker = VersionChecker(utility) comment_checker = CommentChecker(utility) error_checker = ErrorChecker(utility) page_checker = PageChecker(utility) google_hack = GoogleCustomSearch(utility) content_explorer = ContentExplorer(utility) spider = SpiderControl(utility) report = CreateReport(utility) cve_explorer = CveExplorerNVD(utility) # Get target information from "host.txt". protocol_list, fqdn_list, port_list, path_list = get_target_info( full_path, utility) # Start investigation. for idx in range(len(fqdn_list)): # Check parameters. msg = 'investigation : {}, {}, {}, {}'.format(protocol_list[idx], fqdn_list[idx], port_list[idx], path_list[idx]) utility.write_log(20, 'Start ' + msg) if utility.check_arg_value(protocol_list[idx], fqdn_list[idx],