Citadel Save Abandoned

Collection of pentesting scripts

Project README


Netenum

Language Language License

Introduction

Citadel is a collection of various scripts for pentest-related tasks.

List of scripts included

vars.zsh

Exports useful networking variables that can be used directly in terminal.

msf_resource_scripts

This directory contains a few `.rc` files for Metasploit Framework Console that automate certain tasks in the CLI. In order for them to work properly, put all scripts from this directory into your default path containing resource scripts for the framework, then load the main file: `msf5> resource main.rc`.

sf_parser.py

Pretty-print results of a SpiderFoot scan

dnsdump.py

Downloads an image representation of DNS graph from dnsdump.com.

fileinfo.zsh

Presents basic information about selected file.

fileserver.py

Simple file server that exposes a local directory.

opcodes.zsh

Extracts opcodes from a binary, and prints them to STDOUT. Useful in shellcode development.

stackpush.zsh

Generates assembly instructions that push desired string onto the stack.

ssl_convert.zsh

Performs common OpenSSL file conversions.

gitdownload.zsh

Downloads a single file from a Github repository.

cardmon.zsh

Quickly switch between modes of a network interface.

powershell_cmd_stager.py

Creates a command stager that will execute provided Powershell script

xml_to_json.py

Converts a .xml file to JSON

enum_forms.py

Scrapes forms from URL

linker.sh

Creates symbolic links under '.' for all executables found in given directory

init_commit.sh

Creates a .git repository and pushes all files to remote

shellstorm.py

Searches for shellcodes using Shellstorm API. You can extract raw bytes of the shellcode and write it to a file

License

This software is under MIT License

Open Source Agenda is not affiliated with "Citadel" Project. README Source: redcode-labs/Citadel
Stars
400
Open Issues
0
Last Commit
2 years ago
License
MIT

Open Source Agenda Badge

Open Source Agenda Rating