v0.2.44
Pre-release
Pre-release
Changelog | v0.2.44
Quick overview of the commands available in this first beta release:
start_server: Start a Rust server
scan_ports: Scan for open local ports
search_exploit: Search ExploitDB for an available exploit to review
set_module: Set one of Catherine's modules
set_decode: Decode an encoded message using one of our provided methods
view_modules: Currently installed modules
sys_info: Print local system information
set_windows_module: Allows you to use a module created for Windows
help: Help menu
version: Version info for the Catherine framework
exit: Exit the Catherine framework
Available external modules to use in Catherine:
1 | NetScan - Collects public network information about a host
2 | Web Parser - Parses web content to locate links and collect web information about a host
3 | Mercy Extension - Extra methods for encoding, decoding, and encrypting
4 | Hex - Custom hex dumping and reverse engineering module
5 | Database Analysis - Module for in-shell database analysis
6 | Executable Dump - Multi-format parser built to export various data points from executables
There is also one special Windows module built-in (not in the modules.json, may be added in the future) for Windows-only devices:
Dawn - Dumps Windows adapter information
Catherine is stable, but still in a heavy beta state. This means while an executable is available and all of the commands have been tested across multiple operating systems, problems can still occur.
A complete list of features and information about the project is available here: https://catherine-docs.hifumi1337.io/