The AppScan parser tool has been made to facilitate faster reporting during penetration testing exercises. This helps the pentesters focus more on the testing aspect of their projects and reduces the cumbersome and repetitive task of making customized client reports.
This python script simply takes two command line arguments:
- XML report
- Scan log file
- Vulnerability Name
- Vulnerability Description
- Recommendations
- Affected URLs
- Visited URLs
- Skipped URLs
- Vulnerabilities found (the affected URL and the vulnerable parameter)
- Login endpoints
- Logout endpoints
The tool runs on python 3.7.x installation.
Required Module: xlsxwriter
The same can be installed by using pip:
pip install xlsxwriter
If both python 2.x and 3.x are installed, then:
pip3 install xlsxwriter
Tool expects the command in the following order:
python AppScan_parser.py <xml file name> <log file name>
If both python 2.x and 3.x are installed:
python3 AppScan_parser.py <xml file name> <log file name>
The below screenshot shows a sample output.
