Skip to content
This repository has been archived by the owner on Oct 20, 2022. It is now read-only.

redcode-labs/Citadel

Repository files navigation


Netenum

Language Language License

Introduction

Citadel is a collection of various scripts for pentest-related tasks.

List of scripts included

vars.zsh

Exports useful networking variables that can be used directly in terminal.

msf_resource_scripts

This directory contains a few `.rc` files for Metasploit Framework Console that automate certain tasks in the CLI. In order for them to work properly, put all scripts from this directory into your default path containing resource scripts for the framework, then load the main file: `msf5> resource main.rc`.

sf_parser.py

Pretty-print results of a SpiderFoot scan

dnsdump.py

Downloads an image representation of DNS graph from dnsdump.com.

fileinfo.zsh

Presents basic information about selected file.

fileserver.py

Simple file server that exposes a local directory.

opcodes.zsh

Extracts opcodes from a binary, and prints them to STDOUT. Useful in shellcode development.

stackpush.zsh

Generates assembly instructions that push desired string onto the stack.

ssl_convert.zsh

Performs common OpenSSL file conversions.

gitdownload.zsh

Downloads a single file from a Github repository.

cardmon.zsh

Quickly switch between modes of a network interface.

powershell_cmd_stager.py

Creates a command stager that will execute provided Powershell script

xml_to_json.py

Converts a .xml file to JSON

enum_forms.py

Scrapes forms from URL

linker.sh

Creates symbolic links under '.' for all executables found in given directory

init_commit.sh

Creates a .git repository and pushes all files to remote

shellstorm.py

Searches for shellcodes using Shellstorm API. You can extract raw bytes of the shellcode and write it to a file

License

This software is under MIT License