Browse Source

minor details

psy 2 years ago
parent
commit
5a88a08703

+ 1 - 1
README.md

@@ -5,7 +5,7 @@
 
 #### Info:
 
-Apache web logs sneaker - 2016/2020 - by psy [03c8.net]
+Apache web logs sneaker - 2016/2022 - by psy [03c8.net]
 
   With this tool you can search for specific keywords (such as: government, police...) 
   on Whois description of the IPs of your website visitors by -automagically- analyzing 

+ 1 - 1
pydog4apache/core/__init__.py

@@ -1,7 +1,7 @@
 #!/usr/bin/env python3 
 # -*- coding: utf-8 -*-"
 """
-PyDog4Apache - 2016/2020 - by psy (epsylon@riseup.net)
+PyDog4Apache - 2016/2022 - by psy (epsylon@riseup.net)
 
 You should have received a copy of the GNU General Public License along
 with PyDog4Apache; if not, write to the Free Software Foundation, Inc., 51

+ 4 - 2
pydog4apache/core/main.py

@@ -185,6 +185,8 @@ class PyDog4Apache(object):
                                     date_visit = d.split(sep2, 1)[1]
                                 descr = self.extract_whois(ip)
                                 if descr is not None:
+                                    if self.options.verbose:
+                                        print("    |-> WHOIS Description:", descr)
                                     key = self.check_visitants(descr)
                                     if key:
                                         self.visitants[str(ip)] = "[ " + str(key.upper()) + " ]" + " | " + str(str(descr) + " | " + str(date_visit) + " | " + str(folder+log))
@@ -195,7 +197,7 @@ class PyDog4Apache(object):
         if self.options.file: # export results to file
             namefile = str(self.options.file)
             self.report = open(namefile, 'w')
-            self.report.write("# Apache web logs sneaker - 2016/2020 - by psy (https://03c8.net)\n")
+            self.report.write("# Apache web logs sneaker - 2016/2022 - by psy (https://03c8.net)\n")
             self.report.write("# Project: https://code.03c8.net/epsylon/pydog4apache\n")
             self.report.write("# Reported at: " + str(datetime.datetime.now()) + "\n\n")
         for key,val in list(self.visitants.items()):
@@ -221,7 +223,7 @@ class PyDog4Apache(object):
             import smtplib, socket
             from email.mime.text import MIMEText
             self.notify = open('tempmail', 'w')
-            self.notify.write("# Apache web logs sneaker - 2016/2020 - by psy (https://03c8.net)\n")
+            self.notify.write("# Apache web logs sneaker - 2016/2022 - by psy (https://03c8.net)\n")
             self.notify.write("# Project: https://code.03c8.net/epsylon/pydog4apache\n")
             self.notify.write("# Reported at: " + str(datetime.datetime.now()) + "\n\n")
             self.notify.write("Logs Analyzed:\n\n")

+ 3 - 3
pydog4apache/core/options.py

@@ -1,7 +1,7 @@
 #!/usr/bin/env python3 
 # -*- coding: utf-8 -*-"
 """
-PyDog4Apache - 2016/2020 - by psy (epsylon@riseup.net)
+PyDog4Apache - 2016/2022 - by psy (epsylon@riseup.net)
 
 You should have received a copy of the GNU General Public License along
 with PyDog4Apache; if not, write to the Free Software Foundation, Inc., 51
@@ -12,9 +12,9 @@ import optparse
 class PyDog4ApacheOptions(optparse.OptionParser):
     def __init__(self, *args):
         optparse.OptionParser.__init__(self, 
-                           description='\nApache web logs sneaker - 2016/2020 - by psy (https://03c8.net)',
+                           description='\nApache web logs sneaker - 2016/2022 - by psy (https://03c8.net)',
                            prog='pydog4apache.py',
-                           version='\nVersion: v0.2 (2020) - https://pydog4apache.03c8.net\n')
+                           version='\nVersion: v0.2 (2022) - https://pydog4apache.03c8.net\n')
         self.add_option("-u", "--update", action="store_true", dest="update", help="check for latest stable version")
         self.add_option("-v", "--verbose", action="store_true", dest="verbose", help="active verbose output")
         group1 = optparse.OptionGroup(self, "*Reporting*")

+ 1 - 1
pydog4apache/core/update.py

@@ -1,7 +1,7 @@
 #!/usr/bin/env python3 
 # -*- coding: utf-8 -*-"
 """
-PyDog4Apache - 2016/2020 - by psy (epsylon@riseup.net)
+PyDog4Apache - 2016/2022 - by psy (epsylon@riseup.net)
 
 You should have received a copy of the GNU General Public License along
 with PyDog4Apache; if not, write to the Free Software Foundation, Inc., 51

+ 11 - 2
pydog4apache/docs/AUTHOR

@@ -17,27 +17,36 @@
 
  software/projects:
 
+ - Anarcha-Pragmatism: Intellectual model (and movement) based on the culture of the "action/reaction".
  - AnonTwi: Tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of privacy/encryption.
+ - BrAInStocker: Tool to predict (using Linear Regression) the next number within a series of random numbers.
  - Bordercheck: Tool to visualize 'real-time' on a world map the geolocation of data when surfing the web.
  - CIntruder: Tool to bypass captchas using OCR (Optical Character Recognition) bruteforcing methods.
  - Collatz: Tool to simulate the Collatz's conjeture.
+ - DiaNA: Tool for the search and recognition of patterns in DNA sequences.
  - DieKunstDerFuge: Video on different topics related to hacktivism recorded during 2013 from an intimate narrative perspective.
  - ECOin: Decentralized key/value registration and transfer system based on Bitcoin technology (a cryptocurrency).
  - Euler-Bricks: Tool to search for Euler's "bricks".
+ - FuzzSSH: Tool to detect SSH (protocol) vulnerabilities.
  - Goldbach: Tool to simulate the Goldbach's conjeture.
  - Lorea: Social networking autonomous project to build a distributed, encrypted and federated network.
+ - Neuralia: Neural Network that tries to learn and reply the correct answer.
+ - NoINIW-2051: Shell-based CyberPunk m-RPG videogame. 
  - Orb: Tool for massive footprinting.
+ - PandeMaths: Tool that simulates a mathematical model of pandemics.
  - pArAnoIA-Browser: Tool designed to surf the Internet using some "paranoic" methods.
  - Propagare: Tool for extraction, organization and semantic analysis of newspapers.
  - PyAISnake: Tool to train AI models on solve spatial problems through the classic video game "snake".
  - PyDog4Apache: Tool to sneak logs from Apache web server.
+ - Smuggler: Tool to detect and exploit HTTP Smuggling vulnerabilities.
  - UFONet: Denial of Service [DDoS & DoS attacks] Toolkit (a botnet of botnets).
  - XSSer: Automatic -framework- to detect, exploit and report XSS vulnerabilities.
 
 =======================
 
- BTC: 
+ donations: 
 
-  19aXfJtoYJUoXEZtjNwsah2JKN9CK5Pcjw
+  [BTC]: 19aXfJtoYJUoXEZtjNwsah2JKN9CK5Pcjw
+  [ECO]: ETsRCBzaMawx3isvb5svX7tAukLdUFHKze
 
 ========================

+ 1 - 1
pydog4apache/docs/README.txt

@@ -7,7 +7,7 @@
 |_|    \__, |____/ \___/ \__, |  |_|/_/   \_\ .__/ \__,_|\___|_| |_|\___|
        |___/             |___/              |_|                          
 
-Apache web logs sneaker - 2016/2020 - by psy 
+Apache web logs sneaker - 2016/2022 - by psy 
 
 ===========================================================================
 

+ 2 - 0
pydog4apache/keywords.txt

@@ -64,3 +64,5 @@ Sociedad
 Contraloria
 Guardia
 Academia
+Tor
+Proxy

+ 1 - 1
pydog4apache/pydog4apache

@@ -1,7 +1,7 @@
 #!/usr/bin/env python3 
 # -*- coding: utf-8 -*-"
 """
-PyDog4Apache - 2016/2020 - by psy (epsylon@riseup.net)
+PyDog4Apache - 2016/2022 - by psy (epsylon@riseup.net)
 
 You should have received a copy of the GNU General Public License along
 with PyDog4Apache; if not, write to the Free Software Foundation, Inc., 51