mirror of
https://github.com/The-Art-of-Hacking/h4cker.git
synced 2024-12-18 10:56:09 +00:00
Merge pull request #240 from The-Art-of-Hacking/open-interpreter-recon1
Create open_interpreter_recon1.py
This commit is contained in:
commit
26f95b705f
@ -0,0 +1,22 @@
|
|||||||
|
'''
|
||||||
|
This script is a basic example of how to use the Open Interpreter library to perform passive reconnaissance on a target domain.
|
||||||
|
'''
|
||||||
|
|
||||||
|
# Import the Open Interpreter library
|
||||||
|
# To install the library, run: pip install open-interpreter
|
||||||
|
from interpreter import interpreter
|
||||||
|
|
||||||
|
# Set the LLM model to use
|
||||||
|
interpreter.llm.model = "gpt-4o-mini"
|
||||||
|
|
||||||
|
# Set the system message
|
||||||
|
interpreter.system_message += """
|
||||||
|
Run shell commands with -y so the user doesn't have to confirm them.
|
||||||
|
"""
|
||||||
|
print(interpreter.system_message)
|
||||||
|
|
||||||
|
# Perform passive reconnaissance on the target domain
|
||||||
|
interpreter.chat("Use Amass to perform passive reconnaissance on secretcorp.org. Analyze the output. Save the output and analysis to a file called secretcorp.md.")
|
||||||
|
|
||||||
|
# Start an interactive chat
|
||||||
|
interpreter.chat()
|
Loading…
Reference in New Issue
Block a user