Dradis
Official Documentation: https://dradis.com/¶
Cheat Sheet: Dradis Commands¶
Purpose¶
Dradis is a collaboration and reporting platform for security assessments. It centralizes findings from scans and manual testing, lets teams share notes, and generates consistent reports (HTML/PDF).
Scenarios¶
- CTF: Keep track of discovered vulnerabilities, PoCs, and flags when working in a team.
- Real world: Consolidate outputs from Nmap, Burp, Nikto, etc., assign issues to teammates, and produce professional reports for clients.
All needed info to run¶
- Installation: available as package/docker or via source (
apt
, Docker imagedradis/dradis-ce
). - Basic workflow:
- Start server (e.g.,
docker run -p 3000:3000 dradis/dradis-ce
) or system service. - Login via web UI (default port 3000).
- Create a project/case, import findings (CSV, XML, JSON, Nessus, Nmap), or add manual notes.
- Organize issues, set severity, add remediation text, and assign owners.
- Export templates: HTML, PDF, Markdown.
- Integrations: many scanners (Nessus, Burp, Nikto), plugins for automation.
- Permissions: set user roles (admin, contributor, viewer).
Example commands & outputs¶
# Quick Docker run (community edition)
$ docker run --rm -p 3000:3000 dradis/dradis-ce
# Output:
# Listening on http://0.0.0.0:3000
# Visit http://localhost:3000 to login and create a project
# Import an Nmap XML from the UI: Project -> Import -> Nmap (upload file)
# Add manual note in the web UI: Findings -> Add Finding -> set severity/notes
# Export: Project -> Export -> choose template (HTML/PDF)
Dradis Basics
- Dradis is web/UI-first — run the server (Docker or package) and use the browser to manage projects.
- Import scanner outputs (Nmap, Nessus, Burp) to avoid manual re-entry.
- Use report templates to standardize client deliverables.
- Set user roles and backups for team work; never run production data without access controls.