The Wayback Machine - http://web.archive.org/web/20201130163449/https://github.com/redcode-labs/Citadel
Skip to content
master
Go to file
Code

Files

Permalink
Failed to load latest commit information.

README.md


Netenum

Language Language License

Introduction

Citadel is a collection of various scripts for pentest-related tasks.

List of scripts included

vars.zsh

Exports useful networking variables that can be used directly in terminal.

msf_resource_scripts

This directory contains a few `.rc` files for Metasploit Framework Console that automate certain tasks in the CLI. In order for them to work properly, put all scripts from this directory into your default path containing resource scripts for the framework, then load the main file: `msf5> resource main.rc`.

sf_parser.py

Pretty-print results of a SpiderFoot scan

dnsdump.py

Downloads an image representation of DNS graph from dnsdump.com.

fileinfo.zsh

Presents basic information about selected file.

fileserver.py

Simple file server that exposes a local directory.

opcodes.zsh

Extracts opcodes from a binary, and prints them to STDOUT. Useful in shellcode development.

stackpush.zsh

Generates assembly instructions that push desired string onto the stack.

ssl_convert.zsh

Performs common OpenSSL file conversions.

gitdownload.zsh

Downloads a single file from a Github repository.

cardmon.zsh

Quickly switch between modes of a network interface.

powershell_cmd_stager.py

Creates a command stager that will execute provided Powershell script

xml_to_json.py

Converts a .xml file to JSON

enum_forms.py

Scrapes forms from URL

License

This software is under MIT License

About

Collection of pentesting scripts

Topics

Resources

License

Releases

No releases published

Packages

No packages published
You can’t perform that action at this time.