Skip to main content

Parser to push OWASP ZAP report data to MySQL and generate delta report

Project description

owasp-zap-historic-parser

PyPI version run-tests Downloads PRs Welcome Maintenance Open Source Love png1 HitCount Coverage Status


Installation

  • Install owasp-zap-historic-parser

    pip install owasp-zap-historic-parser
    

Usage

The OWASP ZAP Historic application requires the following information, and users must pass respective info while using parser

-s --> mysql hosted machine ip address (default: localhost)
-t --> mysql port (default: 3306)
-u --> mysql user name (default: superuser)
-p --> mysql password (default: passw0rd)
-n --> project name in owasp zap historic
-e --> environment name (default: Not Provided)
-i --> type of scan (active, passive, etc) (default: Not Provided)
-l --> URL for published ZAP report (default: Not Provided)
-v --> version of application tested by ZAP (default: Not Provided)
-f --> filepath & report.html produced by ZAP
  • Use owasp-zap-historic-parser to parse report.html and return a delta report

    > owaspzaphistoricparser
     -s --> localhost
     -t --> 3306
     -u --> 'superuser'
     -p --> passw0rd
     -n --> testname
     -e --> QA
     -i --> Active
     -l --> "https://www.google.com"
     -v --> "v0.1.0 build 2"
     -f --> "c:\\temp\\report_230_.html"
    

Note: Here if MySQL hosted in:

  • local machine then use localhost Ex: -s localhost
  • other machine then use ipaddress:3306 Ex: -s 10.30.2.150:3306

Example:

> owaspzaphistoricparser
 -s localhost
 -t 3306
 -u 'superuser'
 -p passw0rd
 -n testname
 -e QA
 -i Active
 -l "https://www.google.com"
 -v "v0.1.0 build 2"
 -f "c:\\temp\\report_230_.html"

For more info refer to owasp-zap-historic

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

owasp-zap-historic-parser-0.1.13.tar.gz (23.1 kB view details)

Uploaded Source

Built Distribution

owasp_zap_historic_parser-0.1.13-py3-none-any.whl (24.3 kB view details)

Uploaded Python 3

File details

Details for the file owasp-zap-historic-parser-0.1.13.tar.gz.

File metadata

  • Download URL: owasp-zap-historic-parser-0.1.13.tar.gz
  • Upload date:
  • Size: 23.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.1 importlib_metadata/3.10.1 pkginfo/1.7.0 requests/2.25.1 requests-toolbelt/0.9.1 tqdm/4.60.0 CPython/3.9.4

File hashes

Hashes for owasp-zap-historic-parser-0.1.13.tar.gz
Algorithm Hash digest
SHA256 040c65deb53dfcce64f881e35da31a6f57f42695e8f1980b3580190f09a0cd91
MD5 1989976c81120b529e784d8098e54ad7
BLAKE2b-256 83136b7092a60e10b6457732778dce1ced583e9f35a951bf717a774b4647db22

See more details on using hashes here.

File details

Details for the file owasp_zap_historic_parser-0.1.13-py3-none-any.whl.

File metadata

  • Download URL: owasp_zap_historic_parser-0.1.13-py3-none-any.whl
  • Upload date:
  • Size: 24.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.4.1 importlib_metadata/3.10.1 pkginfo/1.7.0 requests/2.25.1 requests-toolbelt/0.9.1 tqdm/4.60.0 CPython/3.9.4

File hashes

Hashes for owasp_zap_historic_parser-0.1.13-py3-none-any.whl
Algorithm Hash digest
SHA256 0a59c2e9780f108b782b130a0068110ebb410f8cca8fe13898c920ad80d2a89d
MD5 d4904bca983dcac77a079a5311bda0b1
BLAKE2b-256 c4219be1747014b224795dcc637d603d323567e659f31264e2c767f53b49e8f7

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page