APTRS (Automated Penetration Testing Reporting System) is an automated reporting tool in Python and Django. The tool allows Penetration testers to create a report directly without using the Traditional Docx file. It also provides an approach to keeping track of the projects and vulnerabilities.
Read Documentation here.
Prerequisites
- Python 3.8 and above (https://www.python.org/downloads/release/python-3810/)
- wkhtmltopdf 0.12.6 and above (https://wkhtmltopdf.org/downloads.html)
Installation
The tool has been tested using Python 3.8.10 on Kali Linux 2022.2/3, Ubuntu 20.04.5 LTS, Windows 10/11.
Windows Installation
git clone https://github.com/Anof-cyber/APTRS.git
cd APTRS
install.bat
Linux Installation
git clone https://github.com/Anof-cyber/APTRS.git
cd APTRS
install.sh
Running
Windows
run.bat
Linux
run.sh
Features
- Demo Report
- Managing Vulnerabilities
- Manage All Projects in one place
- Create a Vulnerability Database and avoid writing the same description and recommendations again
- Easily Create PDF Reprot
- Dynamically add POC, Description and Recommendations
- Manage Customers and Comapany
Screenshots
Project
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgV4To9Da7l9CXcCmZF9ubNnSZtZuLi_WwkoJcC-3oXfYEYlQz2F0TbScm_6BQM8q9S8xX9MmV4NL1TkWpCtc2dDDnd_dmGkKSa2757a0pyRcMMTKaqwYGLiRwq_Z_0UHOAnnMUZAz84NLjdxZrE-XsV7pCkBRuwd7ZDqlYPRdkuubJ_0ADxqLohOPR/s16000/Project1.png)
View Project
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiv9NiKopK3KeDHfRF-djjrTW2DXvZ73mGxdlnJ2XVBT1-DAfvQ6CWFSo-Za_RgCsAJVDAW9CQgMayJ8JRTs_Meid7RV3aYmndF4G7qgcqQ6ZEWMPX8q-vy9MvcbD_Sx_5dmIbRn_3w4YKvrUyT5DDy-l4MOBCp_KHTqqm0xdr_gCUrZ6pwusZ4Qy-i/s16000/View%20Project.png)
Project Vulnerability
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvd_GZFsSistdYOKzgPkxUI1JYLX6NGltEFCopGYh_xbEmj3BhyCvZxQi63YNMhnME2VnWssLQBuUYRRFRQWpTn6XLU5iIUksIEH6slNKDWcSiE-K6pzEvlqhOC76oZWGZ0JdIXsi44myYtTN941oBl3VtwEnfrLV_WK2asuQhKa2WKJDe7yPgCe9u/s1258/Project%20Vulnerability.png)
Project Report
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZP0uvLVAUXD5B8i1BY5ljSDM3TEw1lzd-fJFBLjRuV8n6nTA7_AgQHTlWk6WkxTjQKo48dvfKPm2gge5vpjJIBq7D5fVrYocV-Q2DGWDrwnKJigGebUkl65_YuOKNGsWbrI1hFJIiKW2cPLac6FYSpeaEB2gpxVzkp2tE2hAEQ_s3V50rPqmq-E5P/s1269/Project%20Report.png)
Project Add Vulnerability
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7bojkA8AlaXwfS-Lqud_wocjRIaFfWiLAI39yTfIidosJ9Hf_l1kttmvMQxFWxau50DVCGpw4YqAmjmAGgfn_1q6gs7D9cRGFAqy-6FSPS4EhSu1R7m9XxUkBks00aZCa4IybK7jHioq6UXq8KvwImTTgRUxDtb8uI1lF6qsGFtXiYxha3GRz0S1g/s1261/Project%20New%20Vulnerability.png)
Roadmap
- Improving Report Quality
- Bulk Instance Upload
- Pentest Mapper Burp Suite Extension Integration
- Allowing Multiple Project Scope
- Improving Code, Error handling and Security
- Docker Support
- Implementing Rest API
- Project and Project Retest Handler
- Access Control and Authorization
- Support Nessus Parsing
Authors
- Sourav Kalal