ptp
ptp copied to clipboard
Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and assign an automated ranking for each finding.
Ideally if arachni parser didn't find the xml parser in the report folder then it should automatically move to search for json file. Previously it was working as shown in...
Would be nice to create at least one tests for Hoppy newly implemented parser. What I would be looking for is to create a sample report from Hoppy like the...
Although ptp handles precise exceptions but it doesn't show that e.g. `ptp=PTP('w3af')` `ptp.parse('some/random/non-existing/directory')` Below error is shown `Traceback (most recent call last): File "testing.py", line 3, in c = ptp.parse('/root/Desktop/w3af_repo')...
@DoomTaper has implemented new HTTP parsers (via 713a8fba1a402203de6ca5c02bd5e14e892ba2c3), where PTP now supports new tool reports that embed the HTTP requests sent to the target. However, the HTTP requests are being...
I see that (in Wapiti code) if you choose to generate a HTML report, it will automatically generate a JSON report with it. Maybe PTP can be changed to parse...
The snmp_enumshares signature is `' - '` in order to match the enumeration of the shares. But when the module fails because the connection is refused, this signature also matches:...
Only the scanner ones are written for now. It could be nice to complete the unit tests in order to cover every metasploit supported modules.