cat <<EOF >>config.yaml
openai:
access-token: "<openai-api-token>"
EOFpython3 -m venv .venv && source .venv/bin/activate && python3 -m pip install -r requirements.txt
python3 main.py --help
python3 main.py # only RestAPI interface
python3 main.py --gui # for gradio interface on http://127.0.0.1:7860The whole frontend procedure of maLLMu-ng can be see in test_e2e_with_elffile_rev_shell.py.
After setting up the application run:
python3 e2e/test_e2e_with_elffile_rev_shell.pysimple_reverse_shell is as the name states a simple reverse shell,
which can be used for testing purposes in the GUI.
The application doesn't actually executes the file and just disassambles the
binary file and gets the strings output from it.
It can be used to test the capabilities from maLLMu-ng.
sudo apt update
sudo apt install gcc
gcc -o simple_reverse_shell e2e/simple_reverse_shell.cThe simple_reverse_shell binary can then be used to play around with the gradio user interface on http://127.0.0.1:7860.
python3 -m pip install pytest
pytest aiiocfinder/tests/pyreverse aiiocfinder/ --output png --ignore $(pwd)/aiiocfinder/tests,$(pwd)/aiiocfinder/iocfinder/tests --colorize