Skip to content
Snippets Groups Projects
Commit b6e141e1 authored by matevzerzen's avatar matevzerzen
Browse files

Added missing license headers

parent 68bce473
No related branches found
No related tags found
No related merge requests found
Pipeline #96403 failed
#!/bin/bash
# SPDX-License-Identifier: Apache-2.0
set -e
......
#!/bin/bash
# SPDX-License-Identifier: Apache-2.0
set -e
rm -r /tmp/*
#!/bin/bash
# SPDX-License-Identifier: Apache-2.0
set -e
......
# SPDX-License-Identifier: Apache-2.0
from urllib import urlencode
import w3af.core.controllers.output_manager as om
......
#!/bin/bash
# SPDX-License-Identifier: Apache-2.0
set -e
......@@ -39,4 +40,3 @@ patch /service/w3af/w3af/core/ui/api/utils/scans.py /tmp/w3af-scans.py.patch
#additional profiles and plugins
cp /tmp/extended_generic.py /service/w3af/w3af/plugins/auth/
cp /tmp/auth_scan.template /service/w3af/profiles/
#!/bin/bash
# SPDX-License-Identifier: Apache-2.0
set -e
pip3 install -r /service/wiser-wcs-reports/requirements.txt
#!/bin/bash
# SPDX-License-Identifier: Apache-2.0
set -e
......
# SPDX-License-Identifier: Apache-2.0
from xmljson import badgerfish
from xml.etree.ElementTree import fromstring
from os import listdir
......@@ -8,14 +10,12 @@ import w3af
import zap
import nmap
class Options(object):
"""
Dummy class
"""
pass
def parse_config_file(filename):
"""
Parse the config file.
......@@ -27,7 +27,6 @@ def parse_config_file(filename):
config.read(filename)
return config
def reports_json(dir):
"""
Iterate through directory.
......@@ -43,7 +42,6 @@ def reports_json(dir):
reports[f] = out
return reports
def list_vulnerabilities(reports):
"""
List all vulnerabilities based on the reports given.
......
# SPDX-License-Identifier: Apache-2.0
from wiser import WiserReport, WiserVulnerability
from collections import OrderedDict
import re
def _safe_get(ordered_dict, key):
try:
return ordered_dict[key]
except KeyError:
return ""
class WiserNmapVulnerability(WiserVulnerability):
def __init__(self):
......@@ -43,7 +43,6 @@ class WiserNmapVulnerability(WiserVulnerability):
vuln.target = address
return vuln
class WiserNmapReport(WiserReport):
def __init__(self, report):
......
# SPDX-License-Identifier: Apache-2.0
from wiser import WiserReport, WiserVulnerability
import re
from collections import OrderedDict
from urllib.parse import urlparse
class WiserW3afVulnerability(WiserVulnerability):
def __init__(self, alert):
......@@ -38,7 +39,6 @@ class WiserW3afVulnerability(WiserVulnerability):
except:
pass
def set_wiser_risk_level(self):
if self.risk_level == "Information":
self.w_risk_level = 25
......@@ -49,7 +49,6 @@ class WiserW3afVulnerability(WiserVulnerability):
if self.risk_level == "High":
self.w_risk_level = 100
class WiserW3afReport(WiserReport):
def __init__(self, report):
......
import json
# SPDX-License-Identifier: Apache-2.0
import json
class IterMixin(object):
def __iter__(self):
for attr, value in self.__dict__.iteritems():
yield attr, value
class WiserVulnerability(IterMixin):
"""
Super class of WISER vulnerabilities.
......@@ -43,7 +43,6 @@ class WiserVulnerability(IterMixin):
def __str__(self):
return json.dumps(self.__dict__)
class WiserReport(IterMixin):
report = list()
......
# SPDX-License-Identifier: Apache-2.0
from wiser import WiserReport, WiserVulnerability
import re
from urllib.parse import urlparse
class WiserZapVulnerability(WiserVulnerability):
def __init__(self, alert):
......@@ -54,7 +55,6 @@ class WiserZapVulnerability(WiserVulnerability):
if self.risk_level == "High (High)":
self.w_risk_level = 100
class WiserZapReport(WiserReport):
def __init__(self, report):
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment