build: exclude requests lib
- use splunk built-in, maybe useful for certifi cacert.pem style: add path instead of __init__.py style: remove shebang (not meant to be executed by generic python)
This commit is contained in:
parent
3a288d036b
commit
f624f1fee7
|
@ -1,5 +1,3 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
"""
|
||||
Get lookup csv from botnet-filter
|
||||
Usage: "| getbotnetfilter | outputlookup override_if_empty=false botnet-filter-splunk.csv"
|
||||
|
@ -8,9 +6,11 @@ Usage: "| getbotnetfilter | outputlookup override_if_empty=false botnet-filter-s
|
|||
import sys
|
||||
from os import path
|
||||
|
||||
sys.path.insert(0, path.join(path.dirname(__file__)))
|
||||
from utils import Utility
|
||||
|
||||
sys.path.insert(0, path.join(path.dirname(__file__), "..", "lib"))
|
||||
from splunklib.searchcommands import Configuration, GeneratingCommand, Option, dispatch
|
||||
from utils import Utility
|
||||
|
||||
DOWNLOAD_URL = (
|
||||
"https://malware-filter.gitlab.io/malware-filter/botnet-filter-splunk.csv"
|
||||
|
@ -32,5 +32,4 @@ class GetBotnetFilter(Utility, GeneratingCommand):
|
|||
yield self.gen_record(**row)
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
dispatch(GetBotnetFilter, sys.argv, sys.stdin, sys.stdout, __name__)
|
||||
dispatch(GetBotnetFilter, sys.argv, sys.stdin, sys.stdout, __name__)
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
"""
|
||||
Get botnet IPs from feodo tracker
|
||||
Usage: "| getbotnetip | outputlookup override_if_empty=false botnet_ip.csv"
|
||||
|
@ -11,9 +9,11 @@ from datetime import datetime, timezone
|
|||
from os import path
|
||||
from re import search
|
||||
|
||||
sys.path.insert(0, path.join(path.dirname(__file__)))
|
||||
from utils import Utility
|
||||
|
||||
sys.path.insert(0, path.join(path.dirname(__file__), "..", "lib"))
|
||||
from splunklib.searchcommands import Configuration, GeneratingCommand, Option, dispatch
|
||||
from utils import Utility
|
||||
|
||||
DOWNLOAD_URL = "https://feodotracker.abuse.ch/downloads/ipblocklist.csv"
|
||||
|
||||
|
@ -46,8 +46,6 @@ class GetBotnetIP(Utility, GeneratingCommand):
|
|||
row["custom_message"] = self.custom_message
|
||||
|
||||
yield self.gen_record(**row)
|
||||
break
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
dispatch(GetBotnetIP, sys.argv, sys.stdin, sys.stdout, __name__)
|
||||
dispatch(GetBotnetIP, sys.argv, sys.stdin, sys.stdout, __name__)
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
"""
|
||||
Get IP blocklists from OpenDBL
|
||||
Usage: "| getopendbl | outputlookup override_if_empty=false opendbl_ip.csv"
|
||||
|
@ -11,11 +9,12 @@ from datetime import datetime, timezone
|
|||
from os import path
|
||||
from re import search
|
||||
|
||||
sys.path.insert(0, path.join(path.dirname(__file__), "..", "lib"))
|
||||
|
||||
from splunklib.searchcommands import Configuration, GeneratingCommand, Option, dispatch
|
||||
sys.path.insert(0, path.join(path.dirname(__file__)))
|
||||
from utils import Utility
|
||||
|
||||
sys.path.insert(0, path.join(path.dirname(__file__), "..", "lib"))
|
||||
from splunklib.searchcommands import Configuration, GeneratingCommand, Option, dispatch
|
||||
|
||||
OPENDBL_LIST = {
|
||||
"Emerging Threats: Known Compromised Hosts": "etknown.list",
|
||||
"TOR exit nodes": "tor-exit.list",
|
||||
|
@ -75,5 +74,4 @@ class GetOpenDBL(Utility, GeneratingCommand):
|
|||
yield self.gen_record(**row)
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
dispatch(GetOpenDBL, sys.argv, sys.stdin, sys.stdout, __name__)
|
||||
dispatch(GetOpenDBL, sys.argv, sys.stdin, sys.stdout, __name__)
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
"""
|
||||
Get lookup csv from phishing-filter
|
||||
Usage: "| getphishingfilter | outputlookup override_if_empty=false phishing-filter-splunk.csv"
|
||||
|
@ -8,9 +6,11 @@ Usage: "| getphishingfilter | outputlookup override_if_empty=false phishing-filt
|
|||
import sys
|
||||
from os import path
|
||||
|
||||
sys.path.insert(0, path.join(path.dirname(__file__)))
|
||||
from utils import Utility
|
||||
|
||||
sys.path.insert(0, path.join(path.dirname(__file__), "..", "lib"))
|
||||
from splunklib.searchcommands import Configuration, GeneratingCommand, Option, dispatch
|
||||
from utils import Utility
|
||||
|
||||
DOWNLOAD_URL = (
|
||||
"https://malware-filter.gitlab.io/malware-filter/phishing-filter-splunk.csv"
|
||||
|
@ -39,5 +39,4 @@ class GetPhishingFilter(Utility, GeneratingCommand):
|
|||
yield self.gen_record(**affixed_row)
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
dispatch(GetPhishingFilter, sys.argv, sys.stdin, sys.stdout, __name__)
|
||||
dispatch(GetPhishingFilter, sys.argv, sys.stdin, sys.stdout, __name__)
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
"""
|
||||
Get lookup csv from pup-filter
|
||||
Usage: "| getpupfilter | outputlookup override_if_empty=false pup-filter-splunk.csv"
|
||||
|
@ -8,9 +6,11 @@ Usage: "| getpupfilter | outputlookup override_if_empty=false pup-filter-splunk.
|
|||
import sys
|
||||
from os import path
|
||||
|
||||
sys.path.insert(0, path.join(path.dirname(__file__)))
|
||||
from utils import Utility
|
||||
|
||||
sys.path.insert(0, path.join(path.dirname(__file__), "..", "lib"))
|
||||
from splunklib.searchcommands import Configuration, GeneratingCommand, Option, dispatch
|
||||
from utils import Utility
|
||||
|
||||
DOWNLOAD_URL = "https://malware-filter.gitlab.io/malware-filter/pup-filter-splunk.csv"
|
||||
|
||||
|
@ -35,5 +35,4 @@ class GetPupFilter(Utility, GeneratingCommand):
|
|||
yield self.gen_record(**affixed_row)
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
dispatch(GetPupFilter, sys.argv, sys.stdin, sys.stdout, __name__)
|
||||
dispatch(GetPupFilter, sys.argv, sys.stdin, sys.stdout, __name__)
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
"""
|
||||
Get lookup csv from urlhaus-filter
|
||||
Usage: "| geturlhausfilter | outputlookup override_if_empty=false urlhaus-filter-splunk-online.csv"
|
||||
|
@ -8,9 +6,11 @@ Usage: "| geturlhausfilter | outputlookup override_if_empty=false urlhaus-filter
|
|||
import sys
|
||||
from os import path
|
||||
|
||||
sys.path.insert(0, path.join(path.dirname(__file__)))
|
||||
from utils import Utility
|
||||
|
||||
sys.path.insert(0, path.join(path.dirname(__file__), "..", "lib"))
|
||||
from splunklib.searchcommands import Configuration, GeneratingCommand, Option, dispatch
|
||||
from utils import Utility
|
||||
|
||||
DOWNLOAD_URL = (
|
||||
"https://malware-filter.gitlab.io/malware-filter/urlhaus-filter-splunk-online.csv"
|
||||
|
@ -38,5 +38,4 @@ class GetUrlhausFilter(Utility, GeneratingCommand):
|
|||
yield self.gen_record(**affixed_row)
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
dispatch(GetUrlhausFilter, sys.argv, sys.stdin, sys.stdout, __name__)
|
||||
dispatch(GetUrlhausFilter, sys.argv, sys.stdin, sys.stdout, __name__)
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
"""
|
||||
Get lookup csv from vn-badsite-filter
|
||||
Usage: "| getvnbadsitefilter | outputlookup override_if_empty=false vn-badsite-filter-splunk.csv"
|
||||
|
@ -8,9 +6,11 @@ Usage: "| getvnbadsitefilter | outputlookup override_if_empty=false vn-badsite-f
|
|||
import sys
|
||||
from os import path
|
||||
|
||||
sys.path.insert(0, path.join(path.dirname(__file__)))
|
||||
from utils import Utility
|
||||
|
||||
sys.path.insert(0, path.join(path.dirname(__file__), "..", "lib"))
|
||||
from splunklib.searchcommands import Configuration, GeneratingCommand, Option, dispatch
|
||||
from utils import Utility
|
||||
|
||||
DOWNLOAD_URL = (
|
||||
"https://malware-filter.gitlab.io/malware-filter/vn-badsite-filter-splunk.csv"
|
||||
|
@ -38,5 +38,4 @@ class GetVNBadsiteFilter(Utility, GeneratingCommand):
|
|||
yield self.gen_record(**affixed_row)
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
dispatch(GetVNBadsiteFilter, sys.argv, sys.stdin, sys.stdout, __name__)
|
||||
dispatch(GetVNBadsiteFilter, sys.argv, sys.stdin, sys.stdout, __name__)
|
||||
|
|
Loading…
Reference in New Issue