https://github.com/dtakken/openvas-edxml
EDXML transcoder that takes OpenVAS XML reports as input and outputs EDXML data
https://github.com/dtakken/openvas-edxml
artificial-intelligence edxml openvas openvas-reports security
Last synced: about 2 months ago
JSON representation
EDXML transcoder that takes OpenVAS XML reports as input and outputs EDXML data
- Host: GitHub
- URL: https://github.com/dtakken/openvas-edxml
- Owner: dtakken
- License: mit
- Created: 2021-08-16T14:39:33.000Z (about 4 years ago)
- Default Branch: master
- Last Pushed: 2023-05-16T15:05:40.000Z (over 2 years ago)
- Last Synced: 2025-06-27T09:05:21.800Z (4 months ago)
- Topics: artificial-intelligence, edxml, openvas, openvas-reports, security
- Language: Python
- Homepage:
- Size: 174 KB
- Stars: 0
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.rst
- License: LICENSE.rst
Awesome Lists containing this project
README
OPENVAS EDXML TRANSCODER
========================|license| |tests| |pyversion|
.. |license| image:: https://img.shields.io/badge/License-MIT-blue.svg
.. |tests| image:: https://github.com/dtakken/openvas-edxml/workflows/tests/badge.svg
.. |pyversion| image:: https://img.shields.io/badge/python-3.6%20%7C%203.7%20%7C%203.8%20%7C%203.9%20%7C%203.10-blueThis is an EDXML_ transcoder that takes OpenVAS_ XML reports as input and outputs EDXML data.
The resulting EDXML data enables machines to learn a lot about a networking environment, automatically correlate
vulnerability data with other security data and reason about it. Details can be found in `this document `_,
which contains a description of the transcoder generated by the transcoder itself.The transcoder was developed at Northwave_ to process vulnerability data at its Security Operations Center.
As such, it has been used to process scans for a wide range of organizations, both large and small ones.INSTALLING
----------You can install this transcoder using pip::
pip install openvas-edxml
BASIC USAGE INSTRUCTIONS
------------------------Transcoding an OpenVAS report is done using a command similar to::
openvas-edxml -f /path/to/openvas-report.xml
Running this command will generate EDXML data on standard output. In case that does not yield
anything (no events) it might be that your OpenVAS report is wrapped in a ````
tag. In that case, use the ``--have-response-tag`` command line flag. Full command line options can be
obtained by running::openvas-edxml -h
.. _EDXML: http://edxml.org/
.. _OpenVAS: https://www.openvas.org/
.. _Northwave: https://northwave-security.com/