updated template to include OWASP 2021
1 parent e21bef9 commit 9aacc92d71905cfd9af97af2f5bb69f4d7232da5
root authored on 12 Jan 2022
Showing 9 changed files
View
ReportToolz/bp2json.php 100644 → 100755
File mode changed
View
7
ReportToolz/config.php
// path to scripts repgen, vdp, floss etc..
$vdbPath = "/opt/RossMarks/DirtyScripts/ReportToolz/";
 
// repgen templates
$template = "templates/odt/blank_template_v1.2.odt";
//$template = "/mnt/hgfs/PentestOS/Misc/repgen_test/test_04/blank_template_v2.0.odt";
$template = "templates/odt/blank_template_v2.0.odt";
//$CHECKtemplate = "templates/odt/blank_template_check_v0.4.odt";
$vulnTemplate = "templates/odt/vuln_template_v0.2.xml";
?>
View
10
ReportToolz/rep2.php
$vulnPlace = 0;
$switch = 0;
$sub2 = 0;
$sub3 = 1;
echo "[=] Template $templateVer used\n";
if(number_format($templateVer, 2) >= number_format(1.0, 2)){
echo "[=] Template $templateVer used\n";
for ($i=$start; $i <= $end ; $i++) {
// change state (action to take)
/***
* ~states~
$first_desc = explode("Description", $vuln[0]['desc']);
 
$vuln[0]['desc'] = $first_desc[sizeof($first_desc)-1];
}else{ // old template or Dave's format
echo "[!] Daves Template\n";
for ($i=$start; $i <= $end ; $i++) {
// change state (action to take)
/***
* ~states~
$vuln[$i]['desc'] = $jsonIssue['summary_issue'];
$vuln[$i]['fix'] = $jsonIssue['summary_solution'];
}
}
}
 
}
}
 
//print_r($vuln); // DEBUG
echo "[+] vulnerabilities identified\n";
View
ReportToolz/templates/odt/blank_template_v2.0.odt 0 → 100755
Not supported
View
17
ReportToolz/update.php 0 → 100644
<?php
 
/***
* - check connection
* - check API key
* - create folder if not exist
* - get md5 of folder
* - get md5 of remote
* - if different download and extract new
* - git pull scripts
***/
 
 
 
 
 
?>
View
eicar/<img src=x onError=alert(1)>.jpg 0 → 100644
View
eicar/eicar.jpg 0 → 100644
View
2
■■■
eicar/eicar.pdf 0 → 100644
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
View
2
■■■
search_dump.sh
echo Creating: /mnt/$RNDNO
mkdir /mnt/$RNDNO
 
echo Mounting NAS
mount -t cifs //192.168.0.13/NAS /mnt/$RNDNO -o username=[redacted],password=[redacted],vers=1.0
mount -t cifs //192.168.0.13/NAS /mnt/$RNDNO -o username=nanoymaster,password=***REMOVED***,vers=1.0
cd /mnt/$RNDNO/DB_Dumps/bigDB
 
echo Searching for $TERM in $PWD \(Est. 1hr\)...
rg "$TERM"
Buy Me A Coffee