All Projects → owtf → ptp

owtf / ptp

Licence: BSD-3-Clause license
Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and assign an automated ranking for each finding.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to ptp

wafbypasser
No description or website provided.
Stars: ✭ 73 (+160.71%)
Mutual labels:  owasp, owtf
owtf-docker
Docker repository for OWTF (64-bit Kali)
Stars: ✭ 32 (+14.29%)
Mutual labels:  owasp, owtf
Owtf
Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient http://owtf.org https://twitter.com/owtfp
Stars: ✭ 1,516 (+5314.29%)
Mutual labels:  owasp, owtf
cwe-tool
A command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.
Stars: ✭ 40 (+42.86%)
Mutual labels:  owasp
cyclonedx-cli
CycloneDX CLI tool for SBOM analysis, merging, diffs and format conversions.
Stars: ✭ 154 (+450%)
Mutual labels:  owasp
zap-sonar-plugin
Integrates OWASP Zed Attack Proxy reports into SonarQube
Stars: ✭ 66 (+135.71%)
Mutual labels:  owasp
coraza-caddy
OWASP Coraza middleware for Caddy. It provides Web Application Firewall capabilities
Stars: ✭ 75 (+167.86%)
Mutual labels:  owasp
Insider
Static Application Security Testing (SAST) engine focused on covering the OWASP Top 10, to make source code analysis to find vulnerabilities right in the source code, focused on a agile and easy to implement software inside your DevOps pipeline. Support the following technologies: Java (Maven and Android), Kotlin (Android), Swift (iOS), .NET Full Framework, C#, and Javascript (Node.js).
Stars: ✭ 216 (+671.43%)
Mutual labels:  owasp
www-project-zap
OWASP Zed Attack Proxy project landing page.
Stars: ✭ 52 (+85.71%)
Mutual labels:  owasp
tutorials
Additional Resources For Securing The Stack Tutorials
Stars: ✭ 36 (+28.57%)
Mutual labels:  owasp
crAPI
completely ridiculous API (crAPI)
Stars: ✭ 549 (+1860.71%)
Mutual labels:  owasp
Slides
The repo contains all the slide deck that was used during my presentation at various webinars, conferences, and meetups.
Stars: ✭ 56 (+100%)
Mutual labels:  owasp
mod csrfprotector
apache 2.x.x module, for CSRF mitigation
Stars: ✭ 20 (-28.57%)
Mutual labels:  owasp
headers
An application to catch, search and analyze HTTP secure headers.
Stars: ✭ 59 (+110.71%)
Mutual labels:  owasp
Secure-Coding-Handbook
Web Application Secure Coding Handbook resource.
Stars: ✭ 328 (+1071.43%)
Mutual labels:  owasp
Juice Shop Ctf
Capture-the-Flag (CTF) environment setup tools for OWASP Juice Shop
Stars: ✭ 238 (+750%)
Mutual labels:  owasp
waf-brain
Machine Learning WAF Based
Stars: ✭ 74 (+164.29%)
Mutual labels:  owasp
www-project-code-review-guide
OWASP Code Review Guide Web Repository
Stars: ✭ 74 (+164.29%)
Mutual labels:  owasp
multi-juicer
Run Capture the Flags and Security Trainings with OWASP Juice Shop
Stars: ✭ 179 (+539.29%)
Mutual labels:  owasp
juice-shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 7,533 (+26803.57%)
Mutual labels:  owasp

What is PTP?

https://travis-ci.org/owtf/ptp.svg?branch=develop

The primary goal of ptp (Pentester's Tools Parser) is to enhance OWASP - OWTF project in order to provide an automated ranking for each plugin. This will allow the user to focus attention on the most likely weak areas of a web application or network first, which will be valuable to efficiently use the remaining time in a penetration assessment.

Instead of evaluating every plugins run by OWASP - OWTF and defining the rankings for each of them, thanks to ptp, the user will be able to focus on the ones that have been ranked with the highest risks. The user is then able to confirm or override the automated rankings since we estimate that she/he is the only one that can accurately detect the false positives.

When developing the automated ranking system, ptp's main goal was joined with a secondary one.

Apart from its main feature which is ranking the results from security tools reports, it also provides an unified way to reuse these reports directly in your python code, without having to deal with complex parsing.

Installation

Using pip

The ptp library is available on PyPI at the following address: https://pypi.python.org/pypi/ptp.

The easiest way to install it is using pip.

$ pip install ptp

Note: If an error occurs during the installation process, check your permissions. It might be required to run pip as root.

From scratch

It is also possible to install the library from its repository. You will then be able to use the latest possible version or even try the develop branch.

The first step is to clone the repository of the project:

$ git clone https://github.com/owtf/ptp.git

Then use the Makefile command:

$ make install

Usage

from __future__ import print_function
from ptp import PTP


if __name__ == '__main__':
    ptp = PTP()
    ptp.parse('path/to/the/report/directory')
    print('Highest severity:', ptp.highest_ranking)

Documentation

The documentation is available online at the following address: https://owtf.github.io/ptp/.

It explains how to use the library and even how to contribute. Plus it contains the technical documentation of the project.

Current support

  • arachni (0.4.x to 1.x) (XML and JSON report)
  • burpsuite (1.x.x) (XML report)
  • dirbuster (1.0-RC1)
  • hoppy (1.x.x)
  • metasploit
  • owasp
  • robots.txt
  • skipfish (2.10b)
  • w3af (1.x.x) (XML report)
  • wapiti (2.x.x) (XML report)

Warning: Since v0.4, PTP relies on the fact that the supported tools are following semantic version (except observed otherwise). In other words, as long as the tool doesn't update its MAJOR version, PTP will assume that it can parse its report, reducing the maintenance cost on our side.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].