|
|
- __author__ = 'DarkWeb'
-
- # Here, we are importing the auxiliary functions to clean or convert data
- from MarketPlaces.Utilities.utilities import *
-
- # Here, we are importing BeautifulSoup to search through the HTML tree
- from bs4 import BeautifulSoup
-
-
- # This is the method to parse the Description Pages (one page to each Product in the Listing Pages)
- def kerberos_description_parser(soup):
-
- # Fields to be parsed
-
- name = "-1" # 0 Product_Name y
- describe = "-1" # 1 Product_Description y
- lastSeen = "-1" # 2 Product_LastViewDate
- rules = "-1" # 3 NOT USED ...
- CVE = "-1" # 4 Product_CVE_Classification (Common Vulnerabilities and Exposures)
- MS = "-1" # 5 Product_MS_Classification (Microsoft Security)
- review = "-1" # 6 Product_Number_Of_Reviews
- category = "-1" # 7 Product_Category
- shipFrom = "-1" # 8 Product_ShippedFrom
- shipTo = "-1" # 9 Product_ShippedTo
- left = "-1" # 10 Product_QuantityLeft y
- escrow = "-1" # 11 Vendor_Warranty y
- terms = "-1" # 12 Vendor_TermsAndConditions
- vendor = "-1" # 13 Vendor_Name y
- sold = "-1" # 14 Product_QuantitySold y
- addDate = "-1" # 15 Product_AddedDate
- available = "-1" # 16 NOT USED ...
- endDate = "-1" # 17 NOT USED ...
- BTC = "-1" # 18 Product_BTC_SellingPrice y
- USD = "-1" # 19 Product_USD_SellingPrice y
- rating = "-1" # 20 Vendor_Rating
- success = "-1" # 21 Vendor_Successful_Transactions
- EURO = "-1" # 22 Product_EURO_SellingPrice
-
- bae = soup.find('div', {'class': "col-9"})
-
- # Finding Product Name
- name = bae.find('h2').text
- name = name.replace('\n', ' ')
- name = name.replace(",", "")
- name = name.strip()
-
- mb = bae.findAll('div', {"class": "mb-1"})
-
- # Finding Vendor
- vendor = mb[0].text
- vendor = vendor.replace(",", "")
- vendor = vendor.replace("Sold by:", "")
- vendor = vendor.strip()
-
- # # Finding Vendor Rating
- # full_stars = bae[2].find_all('i', {'class': "fas fa-star"})
- # half_star = bae[2].find('i', {'class': "fas fa-star-half-alt"})
- # rating = len(full_stars) + (0.5 if half_star is not None else 0)
-
- # Finding Warranty
- escrow = mb[2].text
- escrow = escrow.replace("Payment:", "")
- escrow = escrow.strip()
-
- # Finding Quantity Sold and Left
- temp = mb[4].text.split(',')
-
- sold = temp[0].replace("sold", "")
- sold = sold.strip()
-
- left = temp[1].replace("in stock", "")
- left = left.strip()
-
- # Finding USD
- USD = bae.find('div', {"class": "h3 text-secondary"}).text
- USD = USD.replace("$", "")
- USD = USD.strip()
-
- # Finding BTC
- temp = bae.find('div', {"class": "small"}).text.split("BTC")
-
- BTC = temp[0].strip()
-
- # shipping_info = bae[4].text
- # if "Digital" not in shipping_info:
- # shipping_info = shipping_info.split(" ")
- #
- # # Finding Shipment Information (Origin)
- # shipFrom = shipping_info[0].strip()
- #
- # # Finding Shipment Information (Destination)
- # shipTo = shipping_info[1].strip()
-
- # Finding the Product description
- describe = bae.find('div', {"class": "card border-top-0"}).text
- describe = describe.replace("\n", " ")
- describe = describe.replace("\r", " ")
- describe = describe.strip()
-
- # Searching for CVE and MS categories
- cve = soup.findAll(text=re.compile('CVE-\d{4}-\d{4}'))
- if cve:
- CVE = " "
- for idx in cve:
- CVE += (idx)
- CVE += " "
- CVE = CVE.replace(',', ' ')
- CVE = CVE.replace('\n', '')
- ms = soup.findAll(text=re.compile('MS\d{2}-\d{3}'))
- if ms:
- MS = " "
- for im in ms:
- MS += (im)
- MS += " "
- MS = MS.replace(',', ' ')
- MS = MS.replace('\n', '')
-
- # Populating the final variable (this should be a list with all fields scraped)
- row = (name, describe, lastSeen, rules, CVE, MS, review, category, shipFrom, shipTo, left, escrow, terms, vendor,
- sold, addDate, available, endDate, BTC, USD, rating, success, EURO)
-
- # Sending the results
- return row
-
-
- # This is the method to parse the Listing Pages
- def kerberos_listing_parser(soup):
-
- # Fields to be parsed
- nm = 0 # Total_Products (Should be Integer)
- mktName = "Kerberos" # 0 Marketplace_Name
- name = [] # 1 Product_Name y
- CVE = [] # 2 Product_CVE_Classification (Common Vulnerabilities and Exposures)
- MS = [] # 3 Product_MS_Classification (Microsoft Security)
- category = [] # 4 Product_Category y
- describe = [] # 5 Product_Description
- escrow = [] # 6 Vendor_Warranty
- views = [] # 7 Product_Number_Of_Views
- reviews = [] # 8 Product_Number_Of_Reviews y
- addDate = [] # 9 Product_AddDate
- lastSeen = [] # 10 Product_LastViewDate
- BTC = [] # 11 Product_BTC_SellingPrice
- USD = [] # 12 Product_USD_SellingPrice y
- EURO = [] # 13 Product_EURO_SellingPrice
- sold = [] # 14 Product_QuantitySold
- qLeft =[] # 15 Product_QuantityLeft
- shipFrom = [] # 16 Product_ShippedFrom
- shipTo = [] # 17 Product_ShippedTo
- vendor = [] # 18 Vendor y
- rating = [] # 19 Vendor_Rating
- success = [] # 20 Vendor_Successful_Transactions
- href = [] # 24 Product_Links (Urls)
-
- listing = soup.findAll('div', {"class": "card product-card mb-3"})
-
- # Populating the Number of Products
- nm = len(listing)
-
- # Finding Category
- cat = soup.find("div", {"class": "col-9"})
- cat = cat.find("h2").text
- cat = cat.replace("Category: ", "")
- cat = cat.replace(",", "")
- cat = cat.strip()
-
- for card in listing:
- category.append(cat)
-
- bae = card.findAll('a')
-
- # Adding the url to the list of urls
- link = bae[0].get('href')
- link = cleanLink(link)
- href.append(link)
-
- # Finding Product Name
- product = bae[1].text
- product = product.replace('\n', ' ')
- product = product.replace(",", "")
- product = product.strip()
- name.append(product)
-
- # Finding Vendor
- vendor_name = bae[2].text
- vendor_name = vendor_name.replace(",", "")
- vendor_name = vendor_name.strip()
- vendor.append(vendor_name)
-
- # Finding USD
- usd = card.find('div', {"class": "mb-1"}).text
- usd = usd.replace("$", "")
- usd = usd.strip()
- USD.append(usd)
-
- # Finding Reviews
- num = card.find("span", {"class": "rate-count"}).text
- num = num.replace("(", "")
- num = num.replace("review)", "")
- num = num.replace("reviews)", "")
- num = num.strip()
- reviews.append(num)
-
- # Searching for CVE and MS categories
- cve = card.findAll(text=re.compile('CVE-\d{4}-\d{4}'))
- if not cve:
- cveValue="-1"
- else:
- cee = " "
- for idx in cve:
- cee += (idx)
- cee += " "
- cee = cee.replace(',', ' ')
- cee = cee.replace('\n', '')
- cveValue=cee
- CVE.append(cveValue)
-
- ms = card.findAll(text=re.compile('MS\d{2}-\d{3}'))
- if not ms:
- MSValue="-1"
- else:
- me = " "
- for im in ms:
- me += (im)
- me += " "
- me = me.replace(',', ' ')
- me = me.replace('\n', '')
- MSValue=me
- MS.append(MSValue)
-
- # Populate the final variable (this should be a list with all fields scraped)
- return organizeProducts(mktName, nm, name, CVE, MS, category, describe, escrow, views, reviews, addDate, lastSeen,
- BTC, USD, EURO, qLeft, shipFrom, shipTo, vendor, rating, success, sold, href)
-
-
- def kerberos_links_parser(soup):
-
- # Returning all links that should be visited by the Crawler
- href = []
-
- content = soup.find('div', {"id": "content-pos"})
- listing = content.findAll('div', {"class": "item-block"})
-
- for div in listing:
-
- ae = div.find('div', {"ae zx300"})
- links = ae.findAll('a')
- href.append(links[1]['href'])
-
- return href
|