Skip to content

Latest commit

 

History

History
58 lines (58 loc) · 2.15 KB

readme.md

File metadata and controls

58 lines (58 loc) · 2.15 KB

General

Details

• Arch: x86_64
• Size: 1.2M
• Vers: v01.01.01

Weblinks

• IPTables: https://www.netfilter.org/projects/iptables
• OpenVPN: https://openvpn.net
• Proxychains: https://proxychains.sourceforge.net
• Tor: https://www.torproject.org
• UFW: https://launchpad.net/ufw
• WireGuard: https://www.wireguard.com

Description

Scuttle is a shell program for Linux designed to simplify the use and management of various command line networking utilities. Scuttle acts as a wrapper for UFW, IPTables, Proxychains, Tor, OpenVPN, and WireGuard. Its expansive functionality makes managing network tools more efficient and accessible. Please do not attempt installing this program if the running kernel isnt using systemd as an init system.

Installation

Depends

• bat: Clone of cat with syntax highlighting
• firefox: Free and open source web browser
• highlight: Universal syntax highlighter
• iptables: Administration tool for packet filtering and NAT
• nmap: Network exploration tool and port scanner
• proxychains(-ng): Redirect TCP traffic of running programs
• tor: Free software for enabling anonymous communication
• ufw: Uncomplicated Firewall
• wget: The non interactive network downloader

Mac & Linux

Open a terminal and clone this repo:

git clone 'https://github.com/c0rNCh1p/scuttle.git' ||
git clone 'https://gitlab.com/c0rNCh1p/scuttle.git'

Change to the build directory, make sure the script is executable and run it:

cd 'scuttle'
chmod 764 'install.sh'
./'install.sh'
Windows

To use Scuttle on Windows, its recommended to utilize the Windows Subsystem for Linux (WSL) or a Linux VM. If only using Git Bash, download it if not already installed from 'https://git-scm.com/download/win.' Once ready, open Git Bash and follow the steps for MacOS and Linux.

Notes

Legality Concerns

If any of the dependencies for this wrapper arent available for legal reasons its strongly recommended consider further measures such as using an isolated VM, container or live environment of some kind with its own public IP address.