SARF CLI. A security assesment tool that serves as a glue between security
Project description
SARF CLI
Add the output of a tool to SARF
The output of any console tool can be redirected to sarf. It doesn't matter if
these are in plain text or binary.
In order for sarf to prepare to receive the output of a tool, the --ingest
flag must be added to it.
nmap 192.168.1.0/24 | sarf --ingest --tags nmap,network:192.168.1.0 --report lbk
--tags
flag is optional. It adds tags to the received data that can be
very useful to interconnect with other tools.
The received data must be associated with a report.
The chosen report will be obtained from the environment variable SARF_REPORT.
The chosen report can also be provided explicitly with the --report
flag.
This is all for now. SARF is at a very early stage of its development. Give it a star on github to find out all its progress.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file sarf-0.3.0.tar.gz
.
File metadata
- Download URL: sarf-0.3.0.tar.gz
- Upload date:
- Size: 12.1 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.1 CPython/3.8.10
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 63425f2755c46333eee3c9b290a7d8e05b589c99da235fd71699aa8f56b2c89e |
|
MD5 | 4a9d247628db01ca3ab21f597e59ca78 |
|
BLAKE2b-256 | a6e72b96fdb0007a5088cddb73e17ce5feb7385fbe580da7c5b798c6d0648b3f |