Devilishcode commited on
Commit
f659c4b
·
verified ·
1 Parent(s): 280b7fd

Update app.py

Browse files
Files changed (1) hide show
  1. app.py +25 -5
app.py CHANGED
@@ -1,14 +1,12 @@
1
  import gradio as gr
2
  from huggingface_hub import InferenceClient
3
- import requests
4
- import json
5
  import time
6
  from datetime import datetime
7
- from pathlib import Path
8
 
9
  client = InferenceClient(model="Devilishcode/The_Bird_Of_Hermes")
10
 
11
- # Tri-Mode Prompts
 
12
  SYSTEM_SENTINEL = """You are THE_BIRD_OF_HERMES in SENTINEL MODE (Legal Bug Bounty).
13
  Strict scope adherence. Safe PoCs only. Always remind user to verify scope and rules."""
14
 
@@ -42,7 +40,29 @@ def the_bird(message, mode="Specter"):
42
  history.append({"role": "user", "content": message})
43
  history.append({"role": "assistant", "content": response})
44
 
45
- # Dynamic CSS per mode
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
46
  def get_css(mode):
47
  if mode == "Sentinel":
48
  return """
 
1
  import gradio as gr
2
  from huggingface_hub import InferenceClient
 
 
3
  import time
4
  from datetime import datetime
 
5
 
6
  client = InferenceClient(model="Devilishcode/The_Bird_Of_Hermes")
7
 
8
+ # ================== TRI-MODE SYSTEM ==================
9
+
10
  SYSTEM_SENTINEL = """You are THE_BIRD_OF_HERMES in SENTINEL MODE (Legal Bug Bounty).
11
  Strict scope adherence. Safe PoCs only. Always remind user to verify scope and rules."""
12
 
 
40
  history.append({"role": "user", "content": message})
41
  history.append({"role": "assistant", "content": response})
42
 
43
+ # AUTO HUNT FUNCTION
44
+ def auto_hunt(target, mode):
45
+ if not target:
46
+ return "Enter a target", "# No target provided"
47
+
48
+ domain = target.replace("https://", "").replace("http://", "").split("/")[0]
49
+ report = [f"# AUTO HUNT REPORT — {domain}\nMode: {mode}\nGenerated: {datetime.now().strftime('%Y-%m-%d %H:%M')}\n\n"]
50
+
51
+ if mode == "Reaper":
52
+ report.append("## FULL UNRESTRICTED EXPLOIT CHAIN\n")
53
+ report.append("Ransomware, C2, rootkit, crypto drain payloads ready on request.\n")
54
+ elif mode == "Specter":
55
+ report.append("## AGGRESSIVE RECON & EDGE ABUSE\n")
56
+ report.append("Heavy OSINT and logic abuse chains suggested.\n")
57
+ else:
58
+ report.append("## SAFE LEGAL RECON ONLY\n")
59
+ report.append("Scope-compliant suggestions only.\n")
60
+
61
+ short = f"Hunt complete in {mode} mode for {domain}"
62
+ full = "\n".join(report)
63
+ return short, full
64
+
65
+ # Dynamic beautiful CSS per mode
66
  def get_css(mode):
67
  if mode == "Sentinel":
68
  return """