Skip to content

groldo/maLLMu-ng

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

maLLMu-ng

Create config.yaml

cat <<EOF >>config.yaml
openai:
  access-token: "<openai-api-token>"
EOF

Run the app

python3 -m venv .venv && source .venv/bin/activate && python3 -m pip install -r requirements.txt
python3 main.py --help
python3 main.py # only RestAPI interface
python3 main.py --gui # for gradio interface on http://127.0.0.1:7860

Test with test_e2e_with_elffile_rev_shell.py

The whole frontend procedure of maLLMu-ng can be see in test_e2e_with_elffile_rev_shell.py. After setting up the application run:

python3 e2e/test_e2e_with_elffile_rev_shell.py

Compile simple_reverse_shell

simple_reverse_shell is as the name states a simple reverse shell, which can be used for testing purposes in the GUI. The application doesn't actually executes the file and just disassambles the binary file and gets the strings output from it.

It can be used to test the capabilities from maLLMu-ng.

sudo apt update
sudo apt install gcc
gcc -o simple_reverse_shell e2e/simple_reverse_shell.c

The simple_reverse_shell binary can then be used to play around with the gradio user interface on http://127.0.0.1:7860.

Development

Running tests

python3 -m pip install pytest
pytest aiiocfinder/tests/

Create classdiagram

pyreverse aiiocfinder/  --output png --ignore $(pwd)/aiiocfinder/tests,$(pwd)/aiiocfinder/iocfinder/tests --colorize

About

AI-driven Malware Analysis

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published