mirror of
https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite.git
synced 2026-02-11 23:26:36 +00:00
html and pdf
This commit is contained in:
79
parsers/README.md
Normal file
79
parsers/README.md
Normal file
@@ -0,0 +1,79 @@
|
||||
# Privilege Escalation Awesome Scripts Parsers
|
||||
|
||||
These scripts allows you to transform the output of linpeas/macpeas/winpeas to JSON and then to PDF and HTML.
|
||||
|
||||
```python3
|
||||
python3 peass2json.py </path/to/executed_peass.out> </path/to/peass.json>
|
||||
python3 json2pdf.py </path/to/peass.json> </path/to/peass.pdf>
|
||||
python3 json2html.py </path/to/peass.json> </path/to/peass.html>
|
||||
```
|
||||
|
||||
|
||||
## JSON Format
|
||||
Basically, **each section has**:
|
||||
- Infos (URLs or info about the section)
|
||||
- Text lines (the real text info found in the section, colors included)
|
||||
- More sections
|
||||
|
||||
There is a **maximun of 3 levels of sections**.
|
||||
|
||||
```json
|
||||
{
|
||||
"<Main Section Name>": {
|
||||
"sections": {
|
||||
"<Secondary Section Name>": {
|
||||
"sections": {},
|
||||
"lines": [
|
||||
{
|
||||
"raw_text": "\u001b[0m\u001b[1;33m[+] \u001b[1;32mnmap\u001b[1;34m is available for network discover & port scanning, you should use it yourself",
|
||||
"clean_text": "[+] is available for network discover & port scanning, you should use it yourself",
|
||||
"colors": {
|
||||
"GREEN": [
|
||||
"nmap"
|
||||
],
|
||||
"YELLOW": [
|
||||
"[+]"
|
||||
]
|
||||
}
|
||||
}
|
||||
],
|
||||
"infos": [
|
||||
"https://book.hacktricks.xyz/linux-unix/privilege-escalation#kernel-exploits"
|
||||
]
|
||||
},
|
||||
"infos": []
|
||||
```
|
||||
|
||||
```json
|
||||
{
|
||||
"System Information": {
|
||||
"sections": {
|
||||
"Operative system": {
|
||||
"sections": {},
|
||||
"lines": [
|
||||
{
|
||||
"raw_text": "\u001b[0m\u001b[1;33m[+] \u001b[1;32mnmap\u001b[1;34m is available for network discover & port scanning, you should use it yourself",
|
||||
"clean_text": "[+] is available for network discover & port scanning, you should use it yourself",
|
||||
"colors": {
|
||||
"GREEN": [
|
||||
"nmap"
|
||||
],
|
||||
"YELLOW": [
|
||||
"[+]"
|
||||
]
|
||||
}
|
||||
}
|
||||
],
|
||||
"infos": [
|
||||
"https://book.hacktricks.xyz/linux-unix/privilege-escalation#kernel-exploits"
|
||||
]
|
||||
},
|
||||
"infos": []
|
||||
```
|
||||
|
||||
|
||||
There can also be a `<Third level Section Name>`
|
||||
|
||||
# TODO:
|
||||
|
||||
- **PRs improving the code and the aspect of the final PDFs and HTMLs are always welcome!**
|
||||
Reference in New Issue
Block a user