项目作者: redcode-labs

项目描述 :
Collection of pentesting scripts
高级语言: Shell
项目地址: git://github.com/redcode-labs/Citadel.git
创建时间: 2020-07-10T20:23:54Z
项目社区:https://github.com/redcode-labs/Citadel

开源协议:MIT License

下载





Netenum

Language Language
License

Introduction

Citadel is a collection of various scripts for pentest-related tasks.

List of scripts included

vars.zsh






Exports useful networking variables that can be used directly in terminal.


## msf_resource_scripts






This directory contains a few .rc files for Metasploit Framework Console that automate certain tasks in the CLI. In order for them to work properly, put all scripts from this directory into your default path containing resource scripts for the framework, then load the main file: msf5> resource main.rc.

## sf_parser.py






Pretty-print results of a SpiderFoot scan

## dnsdump.py





Downloads an image representation of DNS graph from dnsdump.com.

fileinfo.zsh





Presents basic information about selected file.

fileserver.py





Simple file server that exposes a local directory.

opcodes.zsh






Extracts opcodes from a binary, and prints them to STDOUT. Useful in shellcode development.

stackpush.zsh






Generates assembly instructions that push desired string onto the stack.

ssl_convert.zsh






Performs common OpenSSL file conversions.

gitdownload.zsh






Downloads a single file from a Github repository.

cardmon.zsh






Quickly switch between modes of a network interface.

powershell_cmd_stager.py






Creates a command stager that will execute provided Powershell script

xml_to_json.py






Converts a .xml file to JSON

enum_forms.py






Scrapes forms from URL

linker.sh

Creates symbolic links under ‘.’ for all executables found in given directory

init_commit.sh

Creates a .git repository and pushes all files to remote

shellstorm.py






Searches for shellcodes using Shellstorm API. You can extract raw bytes of the shellcode and write it to a file

License

This software is under MIT License