You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: README.md
+68-68
Original file line number
Diff line number
Diff line change
@@ -8,23 +8,37 @@ soc-faker is used to generate fake data for use by Security Operation Centers, I
8
8
9
9
At the time of writing this document, `soc-faker` has the ability to fake data for the following main categories. You can find specific details for each category by selecting the links below:
The following libraries are required and installed by soc-faker
46
60
47
61
```
48
-
requests
49
-
pendulum
50
-
ipaddress
51
-
Pillow
52
-
networkx
53
-
matplotlib
54
-
PyGithub
55
-
PyYAML
56
-
Faker
62
+
requests==2.23.0
63
+
pendulum==1.2.5
64
+
ipaddress==1.0.23
65
+
networkx==2.4
66
+
matplotlib==3.3.0rc1
67
+
Faker==4.1.1
68
+
bs4==0.0.1
69
+
lxml==4.5.1
70
+
xmltodict==0.12.0
71
+
netaddr==0.7.20
72
+
fire==0.3.1
57
73
```
58
74
59
-
### GitHub PAT
75
+
##Usage
60
76
61
-
In addition, you must provide a GitHub Personal Access Token to utilize specific features that rely on data from public github repositories.
77
+
`soc-faker` is a Python package that can be imported or be used via the command line utility to generate fake data related to security tools, products, and general data related to security.
62
78
63
-
Please follow this guide to get a personal access token [https://help.github.com/en/github/authenticating-to-github/creating-a-personal-access-token-for-the-command-line](https://help.github.com/en/github/authenticating-to-github/creating-a-personal-access-token-for-the-command-line)
79
+
### Importing soc-faker
64
80
65
-
Once you have a PAT you can provide this token during initialization of the the `SocFaker` object:
81
+
After you have installed `soc-faker` from source or using `pip`you can import and instantiate it by doing the following:
66
82
67
-
```
83
+
```python
68
84
from socfaker import SocFaker
69
85
70
-
sf = SocFaker(github_token='YOUR PERSONAL ACCESS TOKEN')
86
+
sc = SocFaker()
87
+
```
88
+
89
+
Once you have instantiated an instance of `soc-faker` you can then access any of the [different properties and methods](docs/source/index.md) avaialble based on your needs. If you would like to see soc-faker in action, then please see the [bin/test.py](bin/test.py) script in the repository under the `bin` folder for an example of all avaialble properties and methods.
90
+
91
+
Additionally, please read the [documentation](docs/source/index.md) for more details about each avaialble property and method.
92
+
93
+
### Command-Line Usage
94
+
95
+
When `soc-faker` is installed, it automatically creates a command-line utility for your use. This utility can be accessed by simply typing `soc-faker` in your shell of choice.
96
+
97
+
To see `soc-faker` help type:
98
+
99
+
```bash
100
+
soc-faker
101
+
# or
102
+
soc-faker --help
103
+
```
104
+
105
+
You can access each property just like you can from the library, the only difference is you replace a `.` between properties with a space. For example, if you wanted to get some randomly generated `hashes` quickly you can run:
If you run into any issues, just type what you think is correct and the built-in help will guide you through all available groups, commands, etc. for each data point within `soc-faker`.
121
+
73
122
### Development
74
123
75
124
You can use the provided [Dockerfile](Dockerfile) to get a development and testing environment up and running for `soc-faker`.
@@ -129,52 +178,3 @@ This project is licensed under the MIT License - see the [LICENSE](LICENSE.md) f
129
178
## Acknowledgments
130
179
131
180
* This project utilizes data from the OSSEM project by [hunters-forge](https://github.com/hunters-forge/OSSEM)
0 commit comments