mirror of
https://github.com/The-Art-of-Hacking/h4cker.git
synced 2024-12-18 10:56:09 +00:00
Merge pull request #240 from The-Art-of-Hacking/open-interpreter-recon1
Create open_interpreter_recon1.py
This commit is contained in:
commit
26f95b705f
@ -0,0 +1,22 @@
|
||||
'''
|
||||
This script is a basic example of how to use the Open Interpreter library to perform passive reconnaissance on a target domain.
|
||||
'''
|
||||
|
||||
# Import the Open Interpreter library
|
||||
# To install the library, run: pip install open-interpreter
|
||||
from interpreter import interpreter
|
||||
|
||||
# Set the LLM model to use
|
||||
interpreter.llm.model = "gpt-4o-mini"
|
||||
|
||||
# Set the system message
|
||||
interpreter.system_message += """
|
||||
Run shell commands with -y so the user doesn't have to confirm them.
|
||||
"""
|
||||
print(interpreter.system_message)
|
||||
|
||||
# Perform passive reconnaissance on the target domain
|
||||
interpreter.chat("Use Amass to perform passive reconnaissance on secretcorp.org. Analyze the output. Save the output and analysis to a file called secretcorp.md.")
|
||||
|
||||
# Start an interactive chat
|
||||
interpreter.chat()
|
Loading…
Reference in New Issue
Block a user