Skip to content
This repository has been archived by the owner on Nov 7, 2021. It is now read-only.
/ Platypus Public archive

🐧 The browser extension that shows you what CVEs the website you're viewing is vulnerable to

License

MIT, GPL-3.0 licenses found

Licenses found

MIT
LICENSE
GPL-3.0
LICENSE-Secondary
Notifications You must be signed in to change notification settings

gideontong/Platypus

Repository files navigation

Platypus

Platypus Logo

Platypus is a browser extension that shows you what CVEs the website you're viewing is vulnerable to.

Usage

You'll need Python 3, Git, and Docker on your system. This will allow you to install and run the development environment for Platypus.

Clone the Platypus app from GitHub and execute ./run.sh in your favorite shell.

git clone https://www.github.com/gideontong/SLO-Hacks-2020.git
cd SLO-Hacks-2020
./run.sh

Then, install the Python dependencies in the server folder.

cd server
pip install -r requirements.txt
python server.py

The Python server is now running, so you can start the Chrome extension by unpacking the developer version of the extension in Chrome.

./run.sh build 5.9.24
cd build
unzip extension.zip

Documentation

If you'd like to read more about Platypus, you can visit the docs at the website here. However, if for some reason the documentation is offline or you yourself are offline, you can click this link as well to view an offline/local copy. This project was also posted to Devpost, and you can view the one-page Devpost version of the documentation here, or here if you are offline.

License

Platypus is licensed under the MIT License. However, it is based off of an application called Wappalyzer, and code from this repository is licensed under the GPL.