Skip to content

Latest commit

 

History

History
339 lines (266 loc) · 10.8 KB

File metadata and controls

339 lines (266 loc) · 10.8 KB

Example Output

This document shows what the Repository Mapper generates.

Installation Output

                 ██████████
                █▓       ░██
                █▒        ██ T H E   P I N A C L E  O F  H A K C I N G   Q U A L I T Y
    █████████████░        █████████████████ ████████████ ████████████      ████████████
   ██         ███░        ███▓▒▒▒▒▒▒▒▒▒▒▒██ █▒▒▒▒▒▒▒▒▓████        █████████▓          ▒█
   ██         ███         ███▒▒▒▒▒▒▒▒▒▒▒▒▓██████████████▓        ███▓▒      ▒▓░       ▒█
   ██         ███        ░██▓▒▒▒▒▒▒▒▒▒▒▒▒▒▓██▓▒▒▒▒▒▒▒▒█▓        ███░       ░██░       ▒█
   ██         ███        ▒██▓▒▒▒▒▒▒▒▒▒▒▒▒▒▒██▓▒▒▒▒▒▒▒▓▒        ██  ▓        ██░       ▓█
   ██         ██▓        ███▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒█▓▒▒▒▒▒▒▒▓▒       ██   █        ██░       ▓
   ██         ██▒        ██▓▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▓▓▒▒▒▒▒▒▒▓▒      ██    █        ▓█████████
   ██                    ██▒▒▒▒▒▒▒▒█▓▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▓▒   ▒███████ █░       ░▓        █
   ██         ░░         ██▒▒▒▒▒▒▒▒██▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▓█ ▓        ░█ ▓       ░▒       ░█
   ██         ██░       ░█▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▓█ █░        ▒ █                ░█
   ██         ██        ▓█▒▒▒▒▒▒▒▒▒██▓▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▓█ █░        ▒ █░               ▒█
    ██████████  ███████████▓██▓▓█▓█  █▓▒▒▒▒▒▒▒▒▒▓██▓██   █▓▓▓▓▓▓▓█    █▓▓▓▓▓▓▓▓▓▓▓▓▓▓██
  .:/====================█▓██▓██=========████▓█▓█ ███======> [ P R E S E N T S ] ====\:.
                           ██▓██           █▓▓▓██ ██  ▄▄▄▄ ▄▄ ▄▄▄▄▄▄ ██▄  ▄██ ▄████▄ █████▄
                             █▓█             ██▓██   ██ ▄▄ ██   ██   ██ ▀▀ ██ ██▄▄██ ██▄▄█▀
                              ██               ███   ▀███▀ ██   ██   ██    ██ ██  ██ ██

=== Repository Mapper Installation ===

[1/6] Checking prerequisites...
  ✓ Python 3.11 found
  ✓ GitHub CLI 2.40.1 found
  ✓ GitHub CLI authenticated
  ✓ ANTHROPIC_API_KEY is set

[2/6] Creating virtual environment...
  ✓ Virtual environment created at: /path/to/repo_map/venv

[3/6] Upgrading pip...
  ✓ pip upgraded

[4/6] Creating requirements.txt...
  ✓ requirements.txt created

[5/6] Installing Python dependencies...
  ✓ Dependencies installed

[6/6] Setting up scripts...
  ✓ Scripts are now executable

=== Installation Complete! ===

Quick Start:
  1. Set your API key:
     export ANTHROPIC_API_KEY='your-api-key'

  2. Run the complete pipeline:
     ./run.sh

Or run steps individually:
  1. Activate environment: source activate.sh
  2. Fetch repos: ./repo_mapper.sh
  3. Analyze: python3 analyze_repos.py
  4. Visualize: python3 generate_xmind.py

For weekly automation:
  Add to crontab: crontab -e
  Add line: 0 9 * * 1 cd /path/to/repo_map && ./run.sh

Happy mapping!

Repository Discovery Output

=== GitHub Repository Mapper ===
Starting repository discovery and analysis...

[1/5] Fetching organizations...
  Found 3 organizations

[2/5] Fetching repositories...
  - Fetching personal repositories for username...
  - Fetching repositories for organization: org1...
  - Fetching repositories for organization: org2...
  - Fetching repositories for organization: org3...

[3/5] Combining repository data...
  Found 127 repositories

[4/5] Fetching README files...
  - Fetching: username/awesome-tool
  - Cached: username/old-project
  - Fetching: org1/security-scanner
  - Fetching: org1/pentest-framework
  - Cached: org2/web-app
  ...

[5/5] Repository data collection complete!

Next: Run the analysis script to categorize repositories
  python3 analyze_repos.py

Analysis Output

                 ██████████
                █▓       ░██
                █▒        ██ T H E   P I N A C L E  O F  H A K C I N G   Q U A L I T Y
    █████████████░        █████████████████ ████████████ ████████████      ████████████
   ██         ███░        ███▓▒▒▒▒▒▒▒▒▒▒▒██ █▒▒▒▒▒▒▒▒▓████        █████████▓          ▒█
   ...

=== Repository Analysis ===
Loading repository data...
Found 127 repositories to analyze

[1/127] Analyzing: username/awesome-tool
  → security_tools / Automation (high confidence)

[2/127] Analyzing: username/web-scanner
  → application_security / SAST/DAST (high confidence)

[3/127] Skipping org1/old-tool (analyzed 3 days ago)

[4/127] Analyzing: org1/security-scanner
  → vulnerability_management / Vulnerability Scanning (high confidence)

[5/127] Analyzing: org1/pentest-framework
  → offensive_security / Penetration Testing (high confidence)

[6/127] Analyzing: org2/encryption-lib
  → cryptography / Encryption (medium confidence)

[7/127] Analyzing: org2/web-app
  → general_development / Web Development (high confidence)

...

[127/127] Analyzing: org3/ml-project
  → data_science / Machine Learning (high confidence)

Analysis complete! Results saved to: output/repo_analysis.json

Next: Generate visualization
  python3 generate_xmind.py

Visualization Output

                 ██████████
                █▓       ░██
                █▒        ██ T H E   P I N A C L E  O F  H A K C I N G   Q U A L I T Y
    ...

=== XMind Map Generation ===
Loading analysis data...
Loaded 127 repositories

Generating XMind JSON format...
  ✓ Saved: output/repo_map.xmind.json

Generating Markdown tree...
  ✓ Saved: output/repo_map.md

Generating statistics...
  ✓ Saved: output/repo_statistics.json

=== Summary ===
Total Repositories: 127
Public: 89 | Private: 38

Top Categories:
  - security_tools: 24
  - offensive_security: 18
  - application_security: 15
  - general_development: 14
  - defensive_security: 12

Cybersecurity Relevance:
  - direct: 87
  - indirect: 23
  - none: 17

=== Files Generated ===
  1. XMind JSON: output/repo_map.xmind.json
  2. Markdown: output/repo_map.md
  3. Statistics: output/repo_statistics.json

=== To Import into XMind ===
  1. Open XMind application
  2. File → Import → Select repo_map.xmind.json
  3. Alternatively, view the markdown file for a text-based view

Example Statistics JSON

{
  "total_repos": 127,
  "by_category": {
    "security_tools": 24,
    "offensive_security": 18,
    "application_security": 15,
    "general_development": 14,
    "defensive_security": 12,
    "network_security": 9,
    "cryptography": 8,
    "cloud_security": 7,
    "vulnerability_management": 6,
    "data_science": 5,
    "malware_analysis": 4,
    "security_operations": 3,
    "infrastructure": 2
  },
  "by_language": {
    "Python": 45,
    "JavaScript": 28,
    "Go": 18,
    "Rust": 12,
    "C": 8,
    "Shell": 7,
    "TypeScript": 5,
    "Ruby": 4
  },
  "by_relevance": {
    "direct": 87,
    "indirect": 23,
    "none": 17
  },
  "by_confidence": {
    "high": 102,
    "medium": 19,
    "low": 6
  },
  "private_repos": 38,
  "public_repos": 89
}

Example Markdown Tree (Excerpt)

# GitHub Repository Map

Generated: 2024-12-09 16:30:45
Total Repositories: 127

## Offensive Security (18 repos)

### Penetration Testing (12 repos)

- **[pentest-framework](https://github.com/org1/pentest-framework)**
  - Comprehensive penetration testing framework for security assessments
  - Language: Python
  - Relevance: direct
  - Tags: pentesting, security, automation

- **[exploit-db](https://github.com/org1/exploit-db)**
  - Exploit database and vulnerability research tools
  - Language: Python
  - Relevance: direct
  - Tags: exploits, vulnerabilities, research

### Red Teaming (6 repos)

- **[c2-framework](https://github.com/org2/c2-framework)**
  - Command and control framework for red team operations
  - Language: Go
  - Relevance: direct
  - Tags: c2, red-team, post-exploitation

## Application Security (15 repos)

### SAST/DAST (10 repos)

- **[code-scanner](https://github.com/username/code-scanner)**
  - Static code analysis tool for security vulnerabilities
  - Language: Python
  - Relevance: direct
  - Tags: sast, code-analysis, security

### API Security (5 repos)

- **[api-fuzzer](https://github.com/org3/api-fuzzer)**
  - Automated API security testing and fuzzing tool
  - Language: Go
  - Relevance: direct
  - Tags: api, fuzzing, security

## General Development (14 repos)

### Web Development (10 repos)

- **[web-app](https://github.com/org2/web-app)**
  - Full-stack web application with modern tech stack
  - Language: TypeScript
  - Relevance: indirect
  - Tags: web, full-stack, react

Example XMind Structure

The XMind JSON creates a hierarchical mind map:

My Repositories (127)
├── Offensive Security (18)
│   ├── Penetration Testing (12)
│   │   ├── pentest-framework
│   │   ├── exploit-db
│   │   └── ...
│   ├── Red Teaming (6)
│   │   ├── c2-framework
│   │   └── ...
│   └── Exploit Development (0)
├── Defensive Security (12)
│   ├── Blue Teaming (5)
│   ├── Incident Response (4)
│   └── Threat Hunting (3)
├── Application Security (15)
│   ├── SAST/DAST (10)
│   ├── Code Review (3)
│   └── API Security (5)
├── Security Tools & Utilities (24)
│   ├── Automation (15)
│   ├── Frameworks (6)
│   └── Libraries (3)
└── General Development (14)
    ├── Web Development (10)
    ├── Backend (2)
    └── Frontend (2)

Note: This is example output. Your actual results will depend on your repositories and their READMEs.