https://github.com/1modm/petereport
PeTeReport is an open-source application vulnerability reporting tool.
https://github.com/1modm/petereport
Last synced: 4 months ago
JSON representation
PeTeReport is an open-source application vulnerability reporting tool.
- Host: GitHub
- URL: https://github.com/1modm/petereport
- Owner: 1modm
- License: bsd-3-clause
- Created: 2021-08-18T13:46:42.000Z (about 4 years ago)
- Default Branch: main
- Last Pushed: 2024-06-10T11:23:50.000Z (over 1 year ago)
- Last Synced: 2024-08-05T17:38:00.414Z (over 1 year ago)
- Language: JavaScript
- Homepage: https://1modm.github.io/petereport/
- Size: 56.6 MB
- Stars: 452
- Watchers: 14
- Forks: 130
- Open Issues: 18
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- License: LICENSE
- Security: SECURITY.md
Awesome Lists containing this project
- awesome-hacking-lists - 1modm/petereport - PeTeReport is an open-source application vulnerability reporting tool. (JavaScript)
README
# PeTeReport
PeTeReport (**Pe**n**Te**st **Report**) is an open-source application vulnerability reporting tool designed to assist pentesting/redteaming efforts, by simplifying the task of writting and generation of reports.
Focused in product security, the tool help security researchers and pentesters to provide detailed findings, appendix, attack paths and manage a finding template database to avoid wasting time spent in the reporting phase.
PeTeReport (**Pe**n**Te**st **Report**) is written in Django and Python 3 with the aim to help pentesters and security researchers to manage a finding repository, write reports (in Markdown) and generate reports in different formats (HTML, CSV, PDF, Jupyter and Markdown).
Pentesting content management and reporting tool
## Documentation
[Documentation](https://1modm.github.io/petereport/)
[Installation and deployment](https://1modm.github.io/petereport/docker/)
## Features
- [x] Customizable reports output
- [x] Customizable reports templates thanks to [Eisvogel](https://github.com/Wandmalfarbe/pandoc-latex-template)
- [x] Findings template database
- [x] Possibility to add appendix to findings
- [x] Possibility to add [Attack Flow](https://github.com/center-for-threat-informed-defense/attack-flow) to findings. This project is created and maintained by the MITRE Engenuity Center for Threat-Informed Defense
- [x] HTML Output format
- [x] CSV Output format
- [x] PDF Output format
- [x] Jupyter Notebook Output format
- [x] Markdown Output format
- [x] CVSS 4 Score
- [x] Docker installation
- [x] DefectDojo integration
- [x] User management
- [x] Custom fields
- [x] CWE custom list
- [x] Multilingual UI Lang files
## TODO
- [ ] More Output formats
- [ ] API
- [ ] Multilingual Report templates
## Demo
[Demo](https://petereport.mpsec.eu/) **admin/P3t3r3p0rt**
## Sample Reports
- [PDF Sample](https://github.com/1modm/petereport/raw/main/sample_reports/PEN-PDF_Offensive_Security_network.pdf "PDF Sample")
- [HTML Sample](https://github.com/1modm/petereport/raw/main/sample_reports/PEN-HTML_Offensive_Security_network.html "HTML Sample")
- [MD Sample](https://github.com/1modm/petereport/raw/main/sample_reports/PEN-MD_Offensive_Security_network.md "MD Sample")
- [CSV Sample](https://github.com/1modm/petereport/raw/main/sample_reports/PEN-CSV_Offensive_Security_network.csv "CSV Sample")
- [Jupyter Sample](https://github.com/1modm/petereport/raw/main/sample_reports/PEN-JUPYTER_Offensive_Security_network.ipynb "Jupyter Sample")