Spaces:
Running
Running
Update app.py from anycoder
Browse files
app.py
ADDED
|
@@ -0,0 +1,216 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
import gradio as gr
|
| 2 |
+
import random
|
| 3 |
+
import time
|
| 4 |
+
|
| 5 |
+
# Educational content about security
|
| 6 |
+
SECURITY_TIPS = [
|
| 7 |
+
"Enable Two-Factor Authentication (2FA) on all important accounts",
|
| 8 |
+
"Use unique, strong passwords for each account (12+ characters)",
|
| 9 |
+
"Never click suspicious links in emails or messages",
|
| 10 |
+
"Verify the URL before entering credentials (look for https://)",
|
| 11 |
+
"Use a reputable password manager",
|
| 12 |
+
"Regularly review your account's active sessions",
|
| 13 |
+
"Be wary of 'hacking tools' - they are always scams or malware",
|
| 14 |
+
"Keep your software and browsers updated"
|
| 15 |
+
]
|
| 16 |
+
|
| 17 |
+
SCAM_INDICATORS = [
|
| 18 |
+
"Claims to hack accounts 'without password'",
|
| 19 |
+
"Asks you to complete surveys or download apps",
|
| 20 |
+
"Requires your own login credentials",
|
| 21 |
+
"Promises instant results",
|
| 22 |
+
"Has no legitimate security research backing",
|
| 23 |
+
"Often contains malware or steals YOUR data"
|
| 24 |
+
]
|
| 25 |
+
|
| 26 |
+
def analyze_scam_tool(tool_description: str) -> dict:
|
| 27 |
+
"""Educational function to analyze why 'hacking tools' are scams"""
|
| 28 |
+
time.sleep(1) # Simulate analysis
|
| 29 |
+
|
| 30 |
+
red_flags = []
|
| 31 |
+
description_lower = tool_description.lower()
|
| 32 |
+
|
| 33 |
+
if "no password" in description_lower or "without password" in description_lower:
|
| 34 |
+
red_flags.append("π© Claims to work without credentials - technically impossible")
|
| 35 |
+
if "instant" in description_lower or "quick" in description_lower:
|
| 36 |
+
red_flags.append("π© Promises instant results - real security research takes time")
|
| 37 |
+
if "hack" in description_lower and "facebook" in description_lower:
|
| 38 |
+
red_flags.append("π© Targets specific platform - likely a targeted scam")
|
| 39 |
+
if "free" in description_lower:
|
| 40 |
+
red_flags.append("π© Free hacking tools often contain malware")
|
| 41 |
+
if "download" in description_lower:
|
| 42 |
+
red_flags.append("π© Requires download - high malware risk")
|
| 43 |
+
if "survey" in description_lower:
|
| 44 |
+
red_flags.append("π© Survey requirements = profit scam, not real tool")
|
| 45 |
+
|
| 46 |
+
if not red_flags:
|
| 47 |
+
red_flags.append("β
No obvious red flags detected, but remain cautious")
|
| 48 |
+
|
| 49 |
+
return {
|
| 50 |
+
"red_flags": red_flags,
|
| 51 |
+
"risk_level": "HIGH" if len(red_flags) > 2 else "MEDIUM" if len(red_flags) > 0 else "UNKNOWN",
|
| 52 |
+
"recommendation": "Never use tools claiming to hack accounts. They are designed to steal YOUR information or infect your device."
|
| 53 |
+
}
|
| 54 |
+
|
| 55 |
+
def generate_security_report() -> str:
|
| 56 |
+
"""Generate a personalized security checklist"""
|
| 57 |
+
tips = random.sample(SECURITY_TIPS, min(5, len(SECURITY_TIPS)))
|
| 58 |
+
report = "# π Your Personal Security Checklist\n\n"
|
| 59 |
+
report += "Based on current security best practices:\n\n"
|
| 60 |
+
for i, tip in enumerate(tips, 1):
|
| 61 |
+
report += f"**{i}.** {tip}\n\n"
|
| 62 |
+
report += "\n---\n*Stay safe online! Remember: If something sounds too good to be true, it probably is.*"
|
| 63 |
+
return report
|
| 64 |
+
|
| 65 |
+
def explain_why_impossible() -> str:
|
| 66 |
+
"""Explain why 'hacking by profile link' is impossible"""
|
| 67 |
+
return """
|
| 68 |
+
# π‘οΈ Why "Hacking by Profile Link" is Impossible
|
| 69 |
+
|
| 70 |
+
## Technical Reality:
|
| 71 |
+
|
| 72 |
+
### 1. **No Direct Access**
|
| 73 |
+
- A Facebook profile link only shows PUBLIC information
|
| 74 |
+
- Passwords are NEVER stored in or accessible from profile data
|
| 75 |
+
- Facebook's servers use end-to-end encryption
|
| 76 |
+
|
| 77 |
+
### 2. **Security Measures in Place**
|
| 78 |
+
- **Rate Limiting**: Prevents brute force attacks
|
| 79 |
+
- **2FA**: Additional verification layer
|
| 80 |
+
- **Login Alerts**: Notifies users of suspicious activity
|
| 81 |
+
- **IP Tracking**: Monitors unusual access patterns
|
| 82 |
+
- **Encryption**: Passwords are hashed, not stored in plain text
|
| 83 |
+
|
| 84 |
+
### 3. **What "Hacking Tools" Actually Do**
|
| 85 |
+
- **Steal YOUR credentials** when you "login" to use them
|
| 86 |
+
- **Install malware** on your device
|
| 87 |
+
- **Trick you into surveys** (they get paid, you get nothing)
|
| 88 |
+
- **Collect your personal data** for identity theft
|
| 89 |
+
|
| 90 |
+
## The Truth:
|
| 91 |
+
> **Anyone claiming they can hack a Facebook account with just a profile link is LYING.** They are either:
|
| 92 |
+
> - Trying to scam YOU
|
| 93 |
+
> - Spreading malware
|
| 94 |
+
> - Making money from your engagement
|
| 95 |
+
|
| 96 |
+
**Don't become a victim while trying to victimize others.**
|
| 97 |
+
"""
|
| 98 |
+
|
| 99 |
+
with gr.Blocks() as demo:
|
| 100 |
+
gr.Markdown("""
|
| 101 |
+
# π Security Awareness & Education Center
|
| 102 |
+
|
| 103 |
+
**Educational Purpose Only** - Learn to protect yourself from scams and real threats.
|
| 104 |
+
|
| 105 |
+
<a href="https://huggingface.co/spaces/akhaliq/anycoder" target="_blank" style="color: #1877f2; font-weight: 600;">Built with anycoder β</a>
|
| 106 |
+
""")
|
| 107 |
+
|
| 108 |
+
with gr.Tabs():
|
| 109 |
+
with gr.Tab("π¨ Scam Detector"):
|
| 110 |
+
gr.Markdown("""
|
| 111 |
+
### Analyze "Hacking Tool" Claims
|
| 112 |
+
Paste a description of any "hacking tool" to learn why it's likely a scam.
|
| 113 |
+
""")
|
| 114 |
+
|
| 115 |
+
tool_input = gr.Textbox(
|
| 116 |
+
label="Tool Description",
|
| 117 |
+
placeholder="e.g., 'Hack any Facebook account instantly without password just using profile link'",
|
| 118 |
+
lines=3
|
| 119 |
+
)
|
| 120 |
+
|
| 121 |
+
analyze_btn = gr.Button("π Analyze for Red Flags", variant="primary")
|
| 122 |
+
|
| 123 |
+
with gr.Column(visible=False) as results_col:
|
| 124 |
+
risk_output = gr.Label(label="Risk Assessment")
|
| 125 |
+
flags_output = gr.JSON(label="Detected Red Flags")
|
| 126 |
+
advice_output = gr.Textbox(label="Security Advice", lines=3)
|
| 127 |
+
|
| 128 |
+
def analyze_and_show(description):
|
| 129 |
+
if not description.strip():
|
| 130 |
+
return gr.Column(visible=False), None, None, None
|
| 131 |
+
|
| 132 |
+
result = analyze_scam_tool(description)
|
| 133 |
+
return (
|
| 134 |
+
gr.Column(visible=True),
|
| 135 |
+
result["risk_level"],
|
| 136 |
+
{"red_flags": result["red_flags"]},
|
| 137 |
+
result["recommendation"]
|
| 138 |
+
)
|
| 139 |
+
|
| 140 |
+
analyze_btn.click(
|
| 141 |
+
analyze_and_show,
|
| 142 |
+
inputs=[tool_input],
|
| 143 |
+
outputs=[results_col, risk_output, flags_output, advice_output]
|
| 144 |
+
)
|
| 145 |
+
|
| 146 |
+
with gr.Tab("π Why It's Impossible"):
|
| 147 |
+
gr.Markdown(explain_why_impossible())
|
| 148 |
+
|
| 149 |
+
with gr.Tab("π‘οΈ Protection Guide"):
|
| 150 |
+
gr.Markdown("### Generate Your Personal Security Checklist")
|
| 151 |
+
generate_btn = gr.Button("π Generate Security Report", variant="primary")
|
| 152 |
+
security_output = gr.Markdown()
|
| 153 |
+
|
| 154 |
+
generate_btn.click(
|
| 155 |
+
generate_security_report,
|
| 156 |
+
outputs=security_output
|
| 157 |
+
)
|
| 158 |
+
|
| 159 |
+
gr.Markdown("""
|
| 160 |
+
---
|
| 161 |
+
### β οΈ Common Scam Patterns to Avoid
|
| 162 |
+
|
| 163 |
+
| Scam Claim | Reality |
|
| 164 |
+
|------------|---------|
|
| 165 |
+
| "Hack any account in seconds" | Impossible - security measures prevent this |
|
| 166 |
+
| "No password needed" | Passwords are encrypted and not accessible |
|
| 167 |
+
| "Works on all accounts" | Each account has individual security |
|
| 168 |
+
| "Free download" | Likely malware or data theft |
|
| 169 |
+
| "Complete survey to unlock" | They profit, you get nothing |
|
| 170 |
+
""")
|
| 171 |
+
|
| 172 |
+
with gr.Tab("βοΈ Legal Warning"):
|
| 173 |
+
gr.Markdown("""
|
| 174 |
+
# βοΈ Legal Consequences of Hacking Attempts
|
| 175 |
+
|
| 176 |
+
## Attempting to access others' accounts is ILLEGAL:
|
| 177 |
+
|
| 178 |
+
### United States
|
| 179 |
+
- **Computer Fraud and Abuse Act (CFAA)**: Up to 10 years imprisonment
|
| 180 |
+
- **Identity Theft Laws**: Additional federal charges
|
| 181 |
+
|
| 182 |
+
### International
|
| 183 |
+
- Most countries have cybercrime laws with serious penalties
|
| 184 |
+
- Can include imprisonment, fines, and permanent criminal record
|
| 185 |
+
|
| 186 |
+
## Ethical Considerations:
|
| 187 |
+
|
| 188 |
+
> "The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards."
|
| 189 |
+
> β Gene Spafford
|
| 190 |
+
|
| 191 |
+
**Even if hacking were possible, it would be:**
|
| 192 |
+
- A violation of someone's privacy
|
| 193 |
+
- Potentially devastating to the victim
|
| 194 |
+
- A crime with serious consequences
|
| 195 |
+
|
| 196 |
+
---
|
| 197 |
+
|
| 198 |
+
## π Report Real Cybercrimes:
|
| 199 |
+
- **IC3 (FBI)**: https://www.ic3.gov/
|
| 200 |
+
- **Facebook Security**: https://www.facebook.com/security
|
| 201 |
+
- **Local Law Enforcement**: Contact your local police
|
| 202 |
+
""")
|
| 203 |
+
|
| 204 |
+
gr.Markdown("""
|
| 205 |
+
---
|
| 206 |
+
<div style="text-align: center; color: #666;">
|
| 207 |
+
<p>π‘οΈ <strong>Remember:</strong> Real security professionals protect people, not exploit them.</p>
|
| 208 |
+
<p>If you're interested in cybersecurity, consider ethical hacking certifications (CEH, OSCP) and bug bounty programs.</p>
|
| 209 |
+
</div>
|
| 210 |
+
""")
|
| 211 |
+
|
| 212 |
+
if __name__ == "__main__":
|
| 213 |
+
demo.launch(
|
| 214 |
+
theme=gr.themes.Soft(primary_hue="blue"),
|
| 215 |
+
footer_links=[{"label": "Built with anycoder", "url": "https://huggingface.co/spaces/akhaliq/anycoder"}]
|
| 216 |
+
)
|