elif arguments.command == 'session': session = SessionFile(arguments.path) dlog.debug(pprint.pformat(session)) modules.load_modules(session) if not arguments.cmd: Terminal(session).cmdloop() else: Terminal(session).onecmd(arguments.cmd) if __name__ == '__main__': parser = CliParser(prog='weevely') subparsers = parser.add_subparsers(dest='command') terminalparser = subparsers.add_parser('terminal', help='Run terminal') terminalparser.add_argument('url', help='The agent URL') terminalparser.add_argument('password', help='The agent password') terminalparser.add_argument('cmd', help='Direct command', nargs='?') sessionparser = subparsers.add_parser( 'session', help='Recover an existant a session file') sessionparser.add_argument('path', help='The session file to load') sessionparser.add_argument('cmd', help='Direct command', nargs='?') agents_available = [ os.path.split(agent)[1].split('.')[0] for agent in glob.glob('%s/*.tpl' % agent_templates_folder_path)
print("\nResults:") print("-"*80) for result in results: #if there is a third value we know its a string, not a list if len(result)>2: print(result) else: print(result[0] + ":" + result[1]) print("-"*80) print("\n") if __name__ == '__main__': program_name = 'crackpipe' program_descr = 'Hashcat password attack automation script' parser = CliParser(prog=program_name, description=program_descr) group = parser.add_mutually_exclusive_group() group.add_argument("--client", help="client mode (TODO - not implemented)", action="store_true") group.add_argument("--server", help="server mode (TODO - not implemented)", action="store_true") parser.add_argument("file", nargs="?", action="store", default="hashes.txt", help="specify a hash file (default: hashes.txt)" ) parser.add_argument("type", nargs="?", action="store", default="1000", help="specify the hash type (default: 1000 - NT)" ) parser.add_argument('-d','--debug', help='Print lots of debugging statements',