Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/redcode-labs/Citadel
Collection of pentesting scripts
https://github.com/redcode-labs/Citadel
pentest-scripts pentesting
Last synced: 2 months ago
JSON representation
Collection of pentesting scripts
- Host: GitHub
- URL: https://github.com/redcode-labs/Citadel
- Owner: redcode-labs
- License: mit
- Archived: true
- Created: 2020-07-10T20:23:54.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2022-02-21T17:44:45.000Z (almost 3 years ago)
- Last Synced: 2024-08-02T01:17:43.723Z (6 months ago)
- Topics: pentest-scripts, pentesting
- Language: Shell
- Homepage:
- Size: 707 KB
- Stars: 427
- Watchers: 26
- Forks: 64
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-rainmana - redcode-labs/Citadel - Collection of pentesting scripts (Shell)
- awesome-hacking-lists - redcode-labs/Citadel - Collection of pentesting scripts (Shell)
README
![Language](https://img.shields.io/badge/Language-Python-blue.svg?longCache=true&style=flat-square) ![Language](https://img.shields.io/badge/Language-Bash-magenta.svg?longCache=true&style=flat-square)
![License](https://img.shields.io/badge/License-MIT-purple.svg?longCache=true&style=flat-square)## Introduction
Citadel is a collection of various scripts for pentest-related tasks.## List of scripts included
- [vars.zsh](#vars.zsh)
- [msf\_resource\_scripts](#msf_resource_scripts)
- [dnsdump.py](#dnsdump.py)
- [fileinfo.zsh](#fileinfo.zsh)
- [fileserver.py](#fileserver.py)
- [opcodes.zsh](#opcodes.zsh)
- [stackpush.zsh](#stackpush.zsh)
- [ssl_convert.zsh](#ssl_convert.zsh)
- [gitdownload.zsh](#gitdownload.zsh)
- [cardmon.zsh](#cardmon.zsh)
- [powershell\_cmd\_stager.py](#powershell_cmd_stager.py)
- [sf_parser.py](#sf_parser.py)
- [xml\_to_json.py](#xml_to_json.py)
- [enum_forms.py](#enum_forms.py)
- [linker.sh](#linker.sh)
- [init_commit.sh](#init_commit.sh)
- [shellstorm.py](#shellstorm.py)## vars.zsh
Exports useful networking variables that can be used directly in terminal.## msf\_resource\_scripts
This directory contains a few `.rc` files for Metasploit Framework Console that automate certain tasks in the CLI. In order for them to work properly, put all scripts from this directory into your default path containing resource scripts for the framework, then load the main file: `msf5> resource main.rc`.## sf_parser.py
Pretty-print results of a SpiderFoot scan## dnsdump.py
Downloads an image representation of DNS graph from [dnsdump.com](http://dnsdump.com).
## fileinfo.zsh
Presents basic information about selected file.
## fileserver.py
Simple file server that exposes a local directory.
## opcodes.zsh
Extracts opcodes from a binary, and prints them to STDOUT. Useful in shellcode development.## stackpush.zsh
Generates assembly instructions that push desired string onto the stack.## ssl_convert.zsh
Performs common OpenSSL file conversions.## gitdownload.zsh
Downloads a single file from a Github repository.## cardmon.zsh
Quickly switch between modes of a network interface.## powershell\_cmd_stager.py
Creates a command stager that will execute provided Powershell script## xml\_to_json.py
Converts a .xml file to JSON## enum_forms.py
Scrapes forms from URL## linker.sh
Creates symbolic links under '.' for all executables found in given directory## init_commit.sh
Creates a .git repository and pushes all files to remote## shellstorm.py
Searches for shellcodes using Shellstorm API. You can extract raw bytes of the shellcode and write it to a file## License
This software is under [MIT License](https://en.wikipedia.org/wiki/MIT_License)