YuvalMil

HTML parser for PEAS output with additional features

123
13
100% credibility
Found Feb 02, 2026 at 82 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

ParsingPeas is an automation tool that simplifies running privilege escalation scanners on remote Linux or Windows targets in CTF and penetration testing scenarios by serving scripts, collecting outputs, and generating interactive HTML reports.

How It Works

1
🔍 Discover the tool

You hear about a handy helper that makes security checks on test machines quick and visual during practice hacking sessions.

2
💻 Prepare your main computer

You download the files and run a simple setup to get ready for collecting scan results from test targets.

3
🚀 Start result collector

With one easy launch, your computer begins listening for scan reports from anywhere on the network.

4
Run scan on test machine
🐧
On Linux-like system

Use a quick web fetch command to start the full system check and ship the output home.

🪟
On Windows system

Paste a PowerShell one-liner to download, execute the checker, and upload findings effortlessly.

5
📨 Results arrive

Your main computer receives the full scan output and turns it into a neat, organized view.

📊 Explore colorful report

Open the web page to see highlighted issues grouped by type, with critical spots glowing for easy spotting.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 82 to 123 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is ParsingPeas?

ParsingPeas is a Python tool that automates privilege escalation scans using LinPEAS and WinPEAS in CTF or pentest environments. Start a receiver server on your Kali box with one command, then run a simple curl or PowerShell one-liner on the target—it fetches the right PEAS script, runs it, uploads the output, and spits out an interactive HTML report at http://your-ip:8000. No manual transfers needed; targets stay offline, and reports categorize findings with color-coded criticals and highs for quick scanning.

Why is it gaining traction?

It beats dumping raw PEAS text into viewers or hacking together html parser python beautifulsoup scripts—delivers browser-ready HTML github pages with searchable sections, stats badges, and terminal-style coloring preserved. Additional features like multi-session support, non-interactive sudo to avoid hangs, and chunked loading for huge outputs make workflows smooth. Stands out over html parser js/nodejs or rust alternatives by focusing on PEAS-specific parsing for instant value.

Who should use this?

Red teamers and CTF players triaging priv-esc enum on compromised Linux or Windows hosts, especially with flaky reverse shells. Pentest ops teams wanting automated HTML github project reports without vim tail-f gymnastics. Not for general html parser online needs, but perfect if you're chaining PEAS into engagement playbooks.

Verdict

Grab it for PEAS-heavy hunts—107 stars and solid docs make setup trivial, though 1.0% credibility score flags low tests/maintainer activity. Productionize with hardening; early gem worth starring for the html github preview flow.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.