Skip to content

masquerad3r/Appscan2Excel

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 

Repository files navigation

AppScan_Parser

Overview

The AppScan parser tool has been made to facilitate faster reporting during penetration testing exercises. This helps the pentesters focus more on the testing aspect of their projects and reduces the cumbersome and repetitive task of making customized client reports.

This python script simply takes two command line arguments:

Information Extracted

From XML Report

  • Vulnerability Name
  • Vulnerability Description
  • Recommendations
  • Affected URLs

From Log File

  • Visited URLs
  • Skipped URLs
  • Vulnerabilities found (the affected URL and the vulnerable parameter)
  • Login endpoints
  • Logout endpoints

Running the tool

Prerequisites

The tool runs on python 3.7.x installation.

Required Module: xlsxwriter

The same can be installed by using pip:

pip install xlsxwriter

If both python 2.x and 3.x are installed, then:

pip3 install xlsxwriter

Command

Tool expects the command in the following order:

python AppScan_parser.py <xml file name> <log file name>

If both python 2.x and 3.x are installed:

python3 AppScan_parser.py <xml file name> <log file name>

Screenshot

The below screenshot shows a sample output.

About

AppScan XML report and log parser to easily extract essential information and produce a ready to serve DAST report.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages