mirror of
https://github.com/ail-project/ail-framework.git
synced 2024-11-10 00:28:22 +00:00
1379ef705a
AIL is a modular framework to analyse potential information leak from unstructured data source like pastes from Past ebin or similar services. AIL framework is flexible and can be extended to support other functionalities to mine sen sitive information
46 lines
1.4 KiB
Python
Executable file
46 lines
1.4 KiB
Python
Executable file
#!/usr/bin/env python2
|
|
# -*-coding:UTF-8 -*
|
|
|
|
import argparse
|
|
import redis
|
|
from bin.pubsublogger import publisher
|
|
from bin.packages.lib_words import create_dirfile
|
|
import ConfigParser
|
|
|
|
|
|
def main():
|
|
"""Main Function"""
|
|
|
|
# CONFIG #
|
|
cfg = ConfigParser.ConfigParser()
|
|
cfg.read('./packages/config.cfg')
|
|
|
|
parser = argparse.ArgumentParser(
|
|
description='''This script is a part of the Analysis Information Leak
|
|
framework. It create a redis list called "listfile" which contain
|
|
the absolute filename of all the files from the directory given in
|
|
the argument "directory".''',
|
|
epilog='Example: ./Dir.py /home/2013/03/')
|
|
|
|
parser.add_argument('directory', type=str,
|
|
help='The directory to run inside', action='store')
|
|
|
|
parser.add_argument('-db', type=int, default=0,
|
|
help='The name of the Redis DB (default 0)',
|
|
choices=[0, 1, 2, 3, 4], action='store')
|
|
|
|
parser.add_argument('-ow', help='trigger the overwritting mode',
|
|
action='store_true')
|
|
|
|
args = parser.parse_args()
|
|
|
|
r_serv = redis.StrictRedis(host=cfg.get("Redis_Queues", "host"),
|
|
port=cfg.getint("Redis_Queues", "port"),
|
|
db=cfg.getint("Redis_Queues", "db"))
|
|
|
|
publisher.channel = "Script"
|
|
|
|
create_dirfile(r_serv, args.directory, args.ow)
|
|
|
|
if __name__ == "__main__":
|
|
main()
|