Update app.py
Browse files
app.py
CHANGED
|
@@ -1,94 +1,35 @@
|
|
|
|
|
| 1 |
import hashlib
|
| 2 |
import requests
|
| 3 |
-
import tkinter as tk
|
| 4 |
-
from tkinter import filedialog, messagebox, ttk
|
| 5 |
|
| 6 |
-
|
| 7 |
-
MD5_HASHES_URL = "https://virusshare.com/hashfiles/VirusShare_00000.md5"
|
| 8 |
|
| 9 |
-
def
|
| 10 |
-
"""Вычисляет хеш файла (по умолчанию MD5)."""
|
| 11 |
-
hasher = hashlib.new(algorithm)
|
| 12 |
-
with open(filepath, 'rb') as file:
|
| 13 |
-
while True:
|
| 14 |
-
chunk = file.read(4096)
|
| 15 |
-
if not chunk:
|
| 16 |
-
break
|
| 17 |
-
hasher.update(chunk)
|
| 18 |
-
return hasher.hexdigest()
|
| 19 |
-
|
| 20 |
-
def load_virus_hashes_from_url(url):
|
| 21 |
-
"""Загружает хеши вирусов из файла по URL."""
|
| 22 |
try:
|
| 23 |
-
|
|
|
|
| 24 |
response.raise_for_status() # Проверка на ошибки HTTP
|
| 25 |
-
|
| 26 |
-
for line in response.text.splitlines():
|
| 27 |
-
hashes.add(line.strip().split()[0].lower()) # Берем только MD5 хеш и приводим к нижнему регистру
|
| 28 |
-
return hashes
|
| 29 |
-
except requests.exceptions.RequestException as e:
|
| 30 |
-
messagebox.showerror("Ошибка", f"Ошибка при загрузке хешей: {e}")
|
| 31 |
-
return set()
|
| 32 |
-
|
| 33 |
-
def scan_file(filepath, virus_hashes):
|
| 34 |
-
"""Сканирует файл, сравнивая его хеш с хешами в базе данных."""
|
| 35 |
-
file_hash = calculate_file_hash(filepath).lower() # Приводим к нижнему регистру для сравнения
|
| 36 |
-
if file_hash in virus_hashes:
|
| 37 |
-
return f"Угроза обнаружена! Файл: {filepath}\nMD5 хеш совпадает с известным вирусом."
|
| 38 |
-
else:
|
| 39 |
-
return f"Файл чист: {filepath}"
|
| 40 |
|
| 41 |
-
|
| 42 |
-
|
| 43 |
-
filepath = filedialog.askopenfilename()
|
| 44 |
-
if filepath:
|
| 45 |
-
file_entry.delete(0, tk.END)
|
| 46 |
-
file_entry.insert(0, filepath)
|
| 47 |
|
| 48 |
-
|
| 49 |
-
|
| 50 |
-
filepath = file_entry.get()
|
| 51 |
-
if filepath:
|
| 52 |
-
result = scan_file(filepath, virus_hashes)
|
| 53 |
-
result_text.config(state=tk.NORMAL)
|
| 54 |
-
result_text.delete(1.0, tk.END)
|
| 55 |
-
result_text.insert(tk.END, result)
|
| 56 |
-
result_text.config(state=tk.DISABLED)
|
| 57 |
-
|
| 58 |
-
if "Угроза обнаружена" in result:
|
| 59 |
-
messagebox.showwarning("Внимание!", result)
|
| 60 |
else:
|
| 61 |
-
|
| 62 |
-
else:
|
| 63 |
-
messagebox.showerror("Ошибка", "Выберите файл для сканирования.")
|
| 64 |
-
|
| 65 |
-
# Загрузка хешей вирусов
|
| 66 |
-
virus_hashes = load_virus_hashes_from_url(MD5_HASHES_URL)
|
| 67 |
-
if not virus_hashes:
|
| 68 |
-
messagebox.showerror("Ошибка", "Не удалось загрузить хеши вирусов. Программа будет закрыта.")
|
| 69 |
-
root.quit()
|
| 70 |
-
exit()
|
| 71 |
-
|
| 72 |
-
# Создание главного окна
|
| 73 |
-
root = tk.Tk()
|
| 74 |
-
root.title("Мини-антивирус")
|
| 75 |
|
| 76 |
-
|
| 77 |
-
|
| 78 |
-
|
| 79 |
-
|
| 80 |
-
|
| 81 |
-
|
| 82 |
-
|
| 83 |
-
|
| 84 |
-
|
| 85 |
-
|
| 86 |
-
|
| 87 |
-
|
| 88 |
-
|
| 89 |
-
|
| 90 |
-
result_text.grid(row=2, column=0, columnspan=3, padx=5, pady=5)
|
| 91 |
-
result_text.config(state=tk.DISABLED)
|
| 92 |
-
|
| 93 |
-
# Запуск главного цикла
|
| 94 |
-
root.mainloop()
|
|
|
|
| 1 |
+
import gradio as gr
|
| 2 |
import hashlib
|
| 3 |
import requests
|
|
|
|
|
|
|
| 4 |
|
| 5 |
+
VIRUSSHARE_URL = "https://virusshare.com/hashfiles/VirusShare_00000.md5"
|
|
|
|
| 6 |
|
| 7 |
+
def check_file_hash(file):
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 8 |
try:
|
| 9 |
+
# Загрузка хешей из VirusShare
|
| 10 |
+
response = requests.get(VIRUSSHARE_URL)
|
| 11 |
response.raise_for_status() # Проверка на ошибки HTTP
|
| 12 |
+
known_bad_hashes = {line.strip().split()[0] for line in response.text.splitlines()}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 13 |
|
| 14 |
+
file_content = file.read()
|
| 15 |
+
md5_hash = hashlib.md5(file_content).hexdigest()
|
|
|
|
|
|
|
|
|
|
|
|
|
| 16 |
|
| 17 |
+
if md5_hash in known_bad_hashes:
|
| 18 |
+
return f"File matches a known malicious hash! ({md5_hash})"
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 19 |
else:
|
| 20 |
+
return "File hash not found in the database."
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 21 |
|
| 22 |
+
except requests.exceptions.RequestException as e:
|
| 23 |
+
return f"Error downloading hash database: {e}"
|
| 24 |
+
except Exception as e:
|
| 25 |
+
return f"Error: {e}"
|
| 26 |
+
|
| 27 |
+
iface = gr.Interface(
|
| 28 |
+
fn=check_file_hash,
|
| 29 |
+
inputs=gr.File(label="Upload a file"),
|
| 30 |
+
outputs="text",
|
| 31 |
+
title="Simple MD5 Hash Checker (VirusShare)",
|
| 32 |
+
description="Checks file hash against the VirusShare database. This is NOT a replacement for a real antivirus!"
|
| 33 |
+
)
|
| 34 |
+
|
| 35 |
+
iface.launch()
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|