owasp-zap-historic-parser

Parser to push OWASP ZAP report data to MySQL and generate delta report


Keywords
owasp, zap, historical, report, parser, owasp-zap, owaspzaphistoric, reporting, reporting-tool, reports
License
GPL-3.0
Install
pip install owasp-zap-historic-parser==0.1.9

Documentation

owasp-zap-historic-parser

PyPI version run-tests Downloads PRs Welcome Maintenance Open Source Love png1 HitCount Coverage Status BCH compliance


Installation

  • Install owasp-zap-historic-parser

    pip install owasp-zap-historic-parser
    

Usage

The OWASP ZAP Historic application requires the following information, and users must pass respective info while using parser

-s --> mysql hosted machine ip address (default: localhost)
-t --> mysql port (default: 3306)
-u --> mysql user name (default: superuser)
-p --> mysql password (default: passw0rd)
-n --> project name in owasp zap historic
-e --> environment name (default: Not Provided)
-i --> type of scan (active, passive, etc) (default: Not Provided)
-l --> URL for published ZAP report (default: Not Provided)
-v --> version of application tested by ZAP (default: Not Provided)
-f --> filepath & report.html produced by ZAP
  • Use owasp-zap-historic-parser to parse report.html and return a delta report

    > owaspzaphistoricparser
     -s --> localhost
     -t --> 3306
     -u --> 'superuser'
     -p --> passw0rd
     -n --> testname
     -e --> QA
     -i --> Active
     -l --> "https://www.google.com"
     -v --> "v0.1.0 build 2"
     -f --> "c:\\temp\\report_230_.html"
    

Note: Here if MySQL hosted in:

  • local machine then use localhost Ex: -s localhost
  • other machine then use ipaddress:3306 Ex: -s 10.30.2.150:3306

Example:

> owaspzaphistoricparser
 -s localhost
 -t 3306
 -u 'superuser'
 -p passw0rd
 -n testname
 -e QA
 -i Active
 -l "https://www.google.com"
 -v "v0.1.0 build 2"
 -f "c:\\temp\\report_230_.html"

For more info refer to owasp-zap-historic