Example Usage
ACEshark.py [-h] [-s SERVER_ADDRESS] [-p PORT] [-c CERTFILE] [-k KEYFILE] [-f FILE_INPUT] [-i] [-g] [-a] [-x CUSTOM_MODE] [-lg] [-gs] [-e] [-z CONFIG_FILENAME] [-d DELIMITER] [-q] [-v]

ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminating the need for tools like accesschk.exe or other non-native binaries.

options:
  -h, --help            show this help message and exit

BASIC OPTIONS:
  -s SERVER_ADDRESS, --server-address SERVER_ADDRESS
                        Your server IP or domain name. This option cannot be used with -f.
  -p PORT, --port PORT  HTTP / HTTPS server port (default: 80 / 443).
  -c CERTFILE, --certfile CERTFILE
                        Optional: Path to the TLS certificate for enabling HTTPS.
  -k KEYFILE, --keyfile KEYFILE
                        Optional: Path to the private key for the TLS certificate.
  -f FILE_INPUT, --file-input FILE_INPUT
                        ACEshark creates log files every time you run the extractor script on a machine (stored in ~/.ACEshark). Use this option to regenerate a services config analysis from a log file. This
                        option