cat <<EOF >>config.yaml
openai:
access-token: "<openai-api-token>"
EOF
python3 -m venv .venv && source .venv/bin/activate && python3 -m pip install -r requirements.txt
python3 main.py --help
python3 main.py # only RestAPI interface
python3 main.py --gui # for gradio interface on http://127.0.0.1:7860
The whole frontend procedure of maLLMu-ng
can be see in test_e2e_with_elffile_rev_shell.py
.
After setting up the application run:
python3 e2e/test_e2e_with_elffile_rev_shell.py
simple_reverse_shell
is as the name states a simple reverse shell,
which can be used for testing purposes in the GUI.
The application doesn't actually executes the file and just disassambles the
binary file and gets the strings
output from it.
It can be used to test the capabilities from maLLMu-ng.
sudo apt update
sudo apt install gcc
gcc -o simple_reverse_shell e2e/simple_reverse_shell.c
The simple_reverse_shell
binary can then be used to play around with the gradio user interface on http://127.0.0.1:7860
.
python3 -m pip install pytest
pytest aiiocfinder/tests/
pyreverse aiiocfinder/ --output png --ignore $(pwd)/aiiocfinder/tests,$(pwd)/aiiocfinder/iocfinder/tests --colorize