Scilla : Information Gathering Tool (DNS/Subdomain/Port Enumeration)

Scilla is a information gathering tool (DNS/Subdomain/Port Enumeration).

Installation

  • First of all, clone the repo locally

git clone https://github.com/edoardottt/scilla.git

  • Scilla has external dependencies, so they need to be pulled in:

go get

  • Linux (Requires high perms, run with sudo)

make linux
make unlinux

  • Windows (executable works only in scilla folder. Alias?)

make windows
make unwindows
make fmt run the golang formatter.
make update Update.
make remod Remod.
make test runs the tests.

Get Started

scilla help prints the help in the command line.

usage: scilla [subcommand] { options }

Available subcommands:
– dns { -target REQUIRED}
– subdomain { [-w wordlist] -target REQUIRED}
– port { [-p ] -target REQUIRED}
– dir { [-w wordlist] -target REQUIRED}
– report { [-p ] -target REQUIRED}
– help

Examples

  • DNS enumeration:

scilla dns -target target.domain

  • Subdomains enumeration:

scilla subdomain -target target.domain
scilla subdomain -w wordlist.txt -target target.domain

  • Directories enumeration:

scilla dir -target target.domain
scilla dir -w wordlist.txt -target target.domain

  • Ports enumeration:
    • Default (all ports, so 1-65635) scilla port -target target.domain
    • Specifying ports range scilla port -p 20-90 -target target.domain
    • Specifying starting port (until the last one) scilla port -p 20- -target target.domain
    • Specifying ending port (from the first one) scilla port -p -90 -target target.domain
    • Specifying single port scilla port -p 80 -target target.domain
  • Full report:
    • Default (all ports, so 1-65635) scilla report -target target.domain
    • Specifying ports range scilla report -p 20-90 -target target.domain
    • Specifying starting port (until the last one) scilla report -p 20- -target target.domain
    • Specifying ending port (from the first one) scilla report -p -90 -target target.domain
    • Specifying single port scilla report -p 80 -target target.domain
    • Specifying wordlist scilla report -w wordlist.txt -target target.domain
R K

Recent Posts

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

13 hours ago

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…

13 hours ago

My Awesome List : Tools And Their Functions

"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…

13 hours ago

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…

13 hours ago

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…

14 hours ago

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

16 hours ago