IRCat/modules/botnet_protect.py

38 lines
1.7 KiB
Python
Raw Normal View History

2025-01-10 23:43:23 -08:00
import threading
__ircat_type__ = "allsocket"
2025-01-11 00:08:29 -08:00
__ircat_requires__ = ["ban-provider"]
__ircat_giveme__ = ["sql"] # Only command and allsocket have these.
__ircat_fakechannels__ = {"#IRCATSUCKS": "WHATEVER YOU DO, DO NOT JOIN IF YOU ARE HUMAN"}
2025-01-10 23:43:23 -08:00
class IRCatModule:
sus_strings = [
2025-01-11 00:08:29 -08:00
" .''." # Latest Supernets spambot!
2025-01-10 23:43:23 -08:00
]
memory = {} # {nick: {channel: trustlevel}} one can also be {nick: True} if it is whitelisted for the session.
2025-01-11 00:08:29 -08:00
def __init__(self, ban_provider, sql):
self.ban_provider = ban_provider
if ban_provider == "sql":
self.useSQLengine = True
self.SQLengine = sql
def ban(self, ip):
if self.useSQLengine:
cur = self.SQLengine.conn.cursor()
else:
open(self.ban_provider, "a").write(f"\n{ip} Botnet detected!")
raise Exception("Botnet detected!")
2025-01-10 23:43:23 -08:00
def onSocket(self, ip, socket, value, cachedNick=None, validated=False):
if validated:
2025-01-11 00:50:26 -08:00
if cachedNick + "|" + ip in self.memory and self.memory[cachedNick + "|" + ip] != 0:
2025-01-11 00:51:24 -08:00
print(value)
2025-01-10 23:43:23 -08:00
if "JOIN" in value:
target = value.split(" ")[1]
2025-01-11 00:50:26 -08:00
self.memory[ip] = 1 # 1: Just joined the channel, continue observing.
2025-01-11 00:43:26 -08:00
if target == "#IRCATSUCKS":
2025-01-11 00:08:29 -08:00
self.ban(ip)
2025-01-10 23:43:23 -08:00
elif "PRIVMSG" in value:
target = value.split(" ")[1]
content = " ".join(value.split(" ")[2:])[1:]
2025-01-11 00:50:26 -08:00
print([content])
if content in sus_strings and self.memory[ip] == 1:
2025-01-11 00:08:29 -08:00
self.ban(ip)
2025-01-10 23:43:23 -08:00
else:
2025-01-11 00:50:26 -08:00
self.memory[ip] = 0 # 0: Trust the connection :3