SkillAgentSearch skills...

Sitadel

Web Application Security Scanner

Install / Use

/learn @shenril/Sitadel
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

Sitadel - Web Application Security Scanner

   _   _   _         _____ _                 _       _
  | |_| |_| |      / _____|_)  _            | |     | |
  |         |     ( (____  _ _| |_ _____  __| |_____| |
  |    _    |      \____ \| (_   _|____ |/ _  | ___ | |
  |   |_|   |      _____) ) | | |_/ ___ ( (_| | ____| |
  |         |     (______/|_|  \__)_____|\____|_____)\_) 

python3 Build Status license

Sitadel is basically an update for WAScan making it compatible for python >= 3.4 It allows more flexibility for you to write new modules and implement new features :

  • Frontend framework detection
  • Content Delivery Network detection
  • Define Risk Level to allow for scans
  • Plugin system
  • Docker image available to build and run

Table of Contents

Requirement Warning

This project ONLY supports python >= 3.4. There will be no backport to 2.7

Installation

git clone https://github.com/shenril/Sitadel.git
cd Sitadel
pip3 install .
python sitadel.py --help

Features

  • Fingerprints

    • Server
    • Web Frameworks (CakePHP,CherryPy,...)
    • Frontend Frameworks (AngularJS,MeteorJS,VueJS,...)
    • Web Application Firewall (Waf)
    • Content Management System (CMS)
    • Operating System (Linux,Unix,..)
    • Language (PHP,Ruby,...)
    • Cookie Security
    • Content Delivery Networks (CDN)
  • Attacks:

    • Bruteforce

      • Admin Interface
      • Common Backdoors
      • Common Backup Directory
      • Common Backup File
      • Common Directory
      • Common File
      • Log File
    • Injection

      • HTML Injection
      • SQL Injection
      • LDAP Injection
      • XPath Injection
      • Cross Site Scripting (XSS)
      • Remote File Inclusion (RFI)
      • PHP Code Injection
    • Other

      • HTTP Allow Methods
      • HTML Object
      • Multiple Index
      • Robots Paths
      • Web Dav
      • Cross Site Tracing (XST)
      • PHPINFO
      • .Listing
    • Vulnerabilities

      • ShellShock
      • Anonymous Cipher (CVE-2007-1858)
      • Crime (SPDY) (CVE-2012-4929)
      • Struts-Shock

Usage

sitadel.py [-h] [-r {0,1,2}] [-ua USER_AGENT] [--redirect]
           [--no-redirect] [-t TIMEOUT] [-c COOKIE] [-p PROXY]
           [-f FINGERPRINT [MODULE ...]] [-a ATTACK [MODULE ...]]
           [--config CONFIG] [-v] [--version]
           TARGET_URL

| ARGUMENT | DESCRIPTION | | ---------------------- | ----------------------------------------------------------------------------------------- | | -h, --help | Display help | | -r, --risk {0,1,2} | Decide the risk level you want Sitadel to run (some attacks won't be executed) | | -ua, --user-agent | User agent used for the HTTP request of the attacks | | --redirect | Indicates to Sitadel to follow the 302 request for page redirection | | --no-redirect | Indicates to Sitadel NOT to follow the 302 request for page redirection | | -t, --timeout | Specify the timeout for the HTTP requests to the website | | -c, --cookie | Allows to specify the cookie to send with the attack requests | | -p, --proxy | Allows to specify a proxy to perform the HTTP requests | | -f, --fingerprint | Specify the fingerprint modules to activate to scan the website {cdn,cms,framework,frontend,header,lang,server,system,waf} | | -a, --attack | Specify the attack modules to activate to scan the website {bruteforce, injection, vulns, other} | | -c, --config | Specify the config file for Sitadel scan, default one is in config/config.yml | | -v, --verbosity | Increase the default verbosity of the logs, for instance: -v , -vv, -vvv | | --version | Show Sitadel version |

Modules list

| FINGERPRINT | MODULE DESCRIPTION | | ------------- | ----------------------------------------------------------------------------------------- | | cdn | Try to guess if the target uses Content Delivery Network (fastly, akamai,cloudflare...) | | cms | Try to guess if the target uses a Content Management System (drupal,wordpress,magento...) | | framework | Try to guess if the target uses a backend framework (cakephp, rails, symfony...) | | frontend | Try to guess if the target uses a frontend framework (angularjs, jquery, vuejs...) | | header | Inspect the headers exchanged with the target | | lang | Try to guess the server language used by the target (asp, python, php...) | | server | Try to guess the server technology used by the target (nginx,apache...) | | system | Try to guess the Operation System used by the target (linux,windows...) | | waf | Try to guess if the target uses a Web Application Firewall (barracuda, bigip,paloalto...)

| ATTACK | MODULE DESCRIPTION | | ------------- | ----------------------------------------------------------------------------------------- | | bruteforce | Try to bruteforce the location of multiple files (backup files, admin consoles...) | | injection | Try to perform injection on various language (SQL,html,ldap, javascript...) | | vulns | Try to test for some known vulnerabilities (crime,shellshock) | | other | Try to probe for various interesting resources (DAV, htmlobjects,phpinfo,robots.txt...) |

Examples

Simple run

python3 sitadel http://website.com

Run with risk level at DANGEROUS and do not follow redirections

python3 sitadel http://website.com -r 2 --no-redirect

Run specifics modules only and full verbosity

python3 sitadel http://website.com -a bruteforce -f header server -v

Run with docker

docker build -t sitadel .

docker run sitadel http://example.com

View on GitHub
GitHub Stars612
CategoryDevelopment
Updated1mo ago
Forks115

Languages

Python

Security Score

100/100

Audited on Jan 31, 2026

No findings