ΒΆΒΆ Info DNS System Website Check Info Create Tools Check Ip / Location
#dns #ip #nmap. /testing π€¦ββ
https://github.com/Hackermrlinkerrorsystem/InfoSystem
cd InfoSystem
ls
python2 Info.py
[1]> DNS LookUP
[2]> Whois LookUP
[3]> GeoIP LookUP
[4]> nmap portscanner
[5]> ReverseIP
[6]> DomainToIpConverter
[7]> DNS Host Search
[0]> Exit
root@kalilinux ~#
#dns #ip #nmap. /testing π€¦ββ
https://github.com/Hackermrlinkerrorsystem/InfoSystem
cd InfoSystem
ls
python2 Info.py
[1]> DNS LookUP
[2]> Whois LookUP
[3]> GeoIP LookUP
[4]> nmap portscanner
[5]> ReverseIP
[6]> DomainToIpConverter
[7]> DNS Host Search
[0]> Exit
root@kalilinux ~#
π1
ΒΆΒΆ AMFTOOLS
Termux and Kali Linux
ΒΆΒΆ you can download #Sql #metasploit #nmap #ddos
πapt update && apt upgrade
πapt install git
πapt install python
πgit clone https://github.com/amfhacker/AMFTOOLS
πcd AMFTOOLS
πchmod + x *
πpython AMFTOOLSHACK.py
β£Ώ1.Install SQLMap
β£Ώ2.Install Metasploit
β£Ώ3.Install Nmap
β£Ώ4.Install AMF1
β£Ώ5.Install DDos-Anonymous
β£Ώ6.Hash-Buster-MD5
β£Ώ.7ALIENS.HaCK.Camera
β£Ώ99.exit
Termux and Kali Linux
ΒΆΒΆ you can download #Sql #metasploit #nmap #ddos
πapt update && apt upgrade
πapt install git
πapt install python
πgit clone https://github.com/amfhacker/AMFTOOLS
πcd AMFTOOLS
πchmod + x *
πpython AMFTOOLSHACK.py
β£Ώ1.Install SQLMap
β£Ώ2.Install Metasploit
β£Ώ3.Install Nmap
β£Ώ4.Install AMF1
β£Ώ5.Install DDos-Anonymous
β£Ώ6.Hash-Buster-MD5
β£Ώ.7ALIENS.HaCK.Camera
β£Ώ99.exit
ΒΆΒΆ Amer /virus-4
#metasploit #virus #virus4 #ngrok #facebook #bruteforce #wordlist #viruslinux #viruspayload
#ngroktcp #ngrokthttp #nmap #root #nonroot #termuxtheme #termuxstyle #termuxfont
#ddos #adminpanelfinder #dorkgoogle #sql
πgit clone https://github.com/Amerlaceset/Amer
πcd Amer
πls
πsh Amer.sh
ΒΆΒΆ
{Ctrl C} exit
[1] Download Virus4 versions {4.6.8}
[2] Download Virus4 versions {5.0.0}
ΒΆΒΆ number------->2
|---{ my ip }---| (y) or (n) n
was canceled
ΒΆΒΆ { 5.0.0 } Virus4 > πbanner
|--------------------------------|
[1] metasploit
[2]Download
[3] Account
[4] virus
[5] ngrok
[6] nmap
[7] Games
[8] Termux
[9] WEBsite
[00] Exit
[90] help
[99] update
|--------------------------------|
#metasploit #virus #virus4 #ngrok #facebook #bruteforce #wordlist #viruslinux #viruspayload
#ngroktcp #ngrokthttp #nmap #root #nonroot #termuxtheme #termuxstyle #termuxfont
#ddos #adminpanelfinder #dorkgoogle #sql
πgit clone https://github.com/Amerlaceset/Amer
πcd Amer
πls
πsh Amer.sh
ΒΆΒΆ
{Ctrl C} exit
[1] Download Virus4 versions {4.6.8}
[2] Download Virus4 versions {5.0.0}
ΒΆΒΆ number------->2
|---{ my ip }---| (y) or (n) n
was canceled
ΒΆΒΆ { 5.0.0 } Virus4 > πbanner
|--------------------------------|
[1] metasploit
[2]Download
[3] Account
[4] virus
[5] ngrok
[6] nmap
[7] Games
[8] Termux
[9] WEBsite
[00] Exit
[90] help
[99] update
|--------------------------------|
ΒΆΒΆ DarkNess / 17-Tools
#TermuxToolx #ubuntu18 #ubuntu19 #debian #kalilinux #nmap #redhack #ipgeo #osif #sqlmap #msf #exiftool
πapt install python
πpip install requests
πgit clone https://github.com/AquaCodeOfficial/DarkNess
πcd DarkNess
πpython darkness.py
Author : AquaCode
01. installer tools ( 13 tool )
02. installer proot ( 4 proot )
03. Install package ( rekomendasi )
04. info
99. exit
AquaCode ~type 3 install packages && after that install tool
01. Ubuntu 18.04
02. Ubuntu 19.04
03. Kali Linux --
04. Debian
99. kembali ke menu
AquaCode ~
#TermuxToolx #ubuntu18 #ubuntu19 #debian #kalilinux #nmap #redhack #ipgeo #osif #sqlmap #msf #exiftool
πapt install python
πpip install requests
πgit clone https://github.com/AquaCodeOfficial/DarkNess
πcd DarkNess
πpython darkness.py
Author : AquaCode
01. installer tools ( 13 tool )
02. installer proot ( 4 proot )
03. Install package ( rekomendasi )
04. info
99. exit
AquaCode ~type 3 install packages && after that install tool
01. Ubuntu 18.04
02. Ubuntu 19.04
03. Kali Linux --
04. Debian
99. kembali ke menu
AquaCode ~
ΒΆΒΆ Super-Inspector
scanning tool designed to fast port scanning using multy types of tools with a better result
#nmap #network Scan
πgit clone https://github.com/0xBlackBunnies/Super-Inspector
πcd Super-Inspector
πls
πpython theinspector.py
[1] Network Scanning & Enumeration
[2] HASH/PASSWORD Cracking Tools
[+] What Do You Want The Inspector To Do? (1/2)
scanning tool designed to fast port scanning using multy types of tools with a better result
#nmap #network Scan
πgit clone https://github.com/0xBlackBunnies/Super-Inspector
πcd Super-Inspector
πls
πpython theinspector.py
[1] Network Scanning & Enumeration
[2] HASH/PASSWORD Cracking Tools
[+] What Do You Want The Inspector To Do? (1/2)
π1
ΒΆΒΆ Nmap
#nmap Scanning
ΒΆΒΆ Network Scanning using NMAP (Beginner Guide)
https://www.hackingarticles.in/network-scanning-using-nmap-beginner-guide/
-------------------------
ΒΆΒΆ Understanding Guide to Nmap Firewall Scan (Part 1)
https://www.hackingarticles.in/understanding-guide-nmap-firewall-scan-part-1/
-------------------------
ΒΆΒΆ Understanding Guide to Nmap Firewall Scan (Part 2)
https://www.hackingarticles.in/understanding-guide-nmap-firewall-scan-part-2/
------------------------
ΒΆΒΆ Nmap Scans using Hex Value of Flags
https://www.hackingarticles.in/nmap-scans-using-hex-value-flags/
-----------------------
ΒΆΒΆ Nmap for Pentester: Output Format Scan
https://www.hackingarticles.in/nmap-for-pentester-output-format-scan/
#nmap Scanning
ΒΆΒΆ Network Scanning using NMAP (Beginner Guide)
https://www.hackingarticles.in/network-scanning-using-nmap-beginner-guide/
-------------------------
ΒΆΒΆ Understanding Guide to Nmap Firewall Scan (Part 1)
https://www.hackingarticles.in/understanding-guide-nmap-firewall-scan-part-1/
-------------------------
ΒΆΒΆ Understanding Guide to Nmap Firewall Scan (Part 2)
https://www.hackingarticles.in/understanding-guide-nmap-firewall-scan-part-2/
------------------------
ΒΆΒΆ Nmap Scans using Hex Value of Flags
https://www.hackingarticles.in/nmap-scans-using-hex-value-flags/
-----------------------
ΒΆΒΆ Nmap for Pentester: Output Format Scan
https://www.hackingarticles.in/nmap-for-pentester-output-format-scan/
ΒΆΒΆ TOOLS-INSTALLER
TOOLS-INSTALLER VERSION 2.0
#termuxtools #nmap #sql #ngrok #weeman #cupp #wordlist
πpkg update && pkg upgrade
πapt update && apt upgrade
πpkg install python && pkg install python2
πgit clone https://github.com/maskprivate1457/TOOLS-INSTALLER
πcd TOOLS-INSTALLER
πpython TOOLS.py
1.Install Nmap
2. Install Hydra
3. Install SQLMap
4. Install Metasploit
5. Install ngrok
6. Install Kali Nethunter
7. Install angryFuzzer
8. Install Red_Hawk
9. Install Weeman
10. Install IPGeoLocation
11. Install Cupp
12. Instagram Bruteforcer (instahack)
13. Twitter Bruteforcer
14. Install Ubuntu
15. Install Fedora
16. Install viSQL
17. Install Hash-Buster
18. Install D-TECT
19. Install routersploit
20. Grup Whatsapp
TOOLS-INSTALLER VERSION 2.0
#termuxtools #nmap #sql #ngrok #weeman #cupp #wordlist
πpkg update && pkg upgrade
πapt update && apt upgrade
πpkg install python && pkg install python2
πgit clone https://github.com/maskprivate1457/TOOLS-INSTALLER
πcd TOOLS-INSTALLER
πpython TOOLS.py
1.Install Nmap
2. Install Hydra
3. Install SQLMap
4. Install Metasploit
5. Install ngrok
6. Install Kali Nethunter
7. Install angryFuzzer
8. Install Red_Hawk
9. Install Weeman
10. Install IPGeoLocation
11. Install Cupp
12. Instagram Bruteforcer (instahack)
13. Twitter Bruteforcer
14. Install Ubuntu
15. Install Fedora
16. Install viSQL
17. Install Hash-Buster
18. Install D-TECT
19. Install routersploit
20. Grup Whatsapp
π4
π¨βπ» Now, I'm sharing my code and notes to help You!!π―
π Check out
#nmap
==-Nmap====
nmap -p- -sT -sV -A $IP
nmap -p- -sC -sV $IP --0pen
nmap -p- --script=vuln $IP
###HTTP-Methods
nmap --script http-methods --script-args
http-methods. url-path='/webs ite '
###
sed IPs:
grep -oE '((1? [0-9] [0-9]? |2[0-4] [0-
9] |25[0-5])\.){3} (1? [0-9] [0-9]? |2 [0-4]
[0-9] |25 [0-5] ) ' FILE
--Script smb-enum-shares
=EE=======
=E==EE====E============E==
EEE=E==E==:
=========:
==
WPScan & SSL
wpscan--url $URL --disable-tls-checks -
-enumerate p --enumerate t --enumerate u
===WPScan Brute Forceing:
wpscan --url $URL --disable-t ls-checks -
U users -P
/usr/share/wordlists/ rockyou. txt
==Aggressive Plugin Detection:
wpscan --url $URL
plugins-detection aggressive
--enumerate p
========================================
c==Nikto with SSL and Evasion
nikto --host $IP -ssl -evasion 1
SEE EVASION MODALITIES.
E===================================
==dns_recon
dnsrecon -d yourdomain. com
==
===9obuster directory
gobuster dir -u $URL -W
/opt/SecLists/Dis covery/Web-
Content/ raft-medium-directories. txt -k -
t 30
===gobuster files
gobuster dir -u $URL -W
/opt/SecLists/Dis covery/Web-
Content/raft-medium-files. txt -k -t 30
==00buster for SubDoma in brute forcing:
gobuster dns -d doma in.org -w
/opt/SecLists/Discovery/DNS/subdomains-
toplmillion-110000. txt -t 30
"just make sure any DNS name you find
resolves to an in-scope address before
you test it!
====E=======:
=H==E====E====E===E====
==Extract IPs from a text file.
grep -o '[0-9]\{1, 3\}\. [0-9]\{1,3\}\. [0-
9]\{1,3\}\. [0-9]\{1, 3\}' nmapfile. txt
===Wfuzz XSS
Fuzzing===:
wfuzz -C -Z
file, /opt/SecLists/Fuzzing/XSS,/XSS-
BruteLogic. txt "$URL"
wfuzz -C -Z
file, /opt/SecLists/ Fuzzing/XSS,/XSS-
JhaddiX. txt "$URL"
===C0MMAND INJECTION WITH POST DATA
wfuzz -C -Z
file, /opt/SecLists/Fuzzing/command-
injection-commix. txt -d "doi=FUZZ"
"$URL"
===Test for Paramter Existence!
wfuzz -C -Z
file, /opt/SecLists/Dis covery /Web-
Content/burp-parameter-names. txt "$URL"
===AUTHENTICATED FUZZING DIRECTORIES:
wfuzz -C -Z
file, /opt/SecLists/Dis cove ry/Web-
Content/ raft-medium-directories . txt --hc
404 -d "SESSIONID=value" "$URL"
=AUTHENTICATED FILE FUZZING:
wfuzz -C -Z
file, /opt/SecLists/Discove ry/Web-
Content/ raft-med ium-files . txt --hc 404 -
d "SESSIONID=value" "$URL"
===FUZZ Directories :
wfuzz -C -Z
file, /opt/SecLists/Dis covery/Web-
Content/ raft-la rge-d irectories. txt --hc
404 "$URL"
===FUZZ FILES:
wfuzz -C -Z
file, /opt/SecLists/Dis covery/Web-
Content/ raft-la rge-files . txt --hc 404
"$URL"
π Learn, practice, and let's achieve OSCP success together! πͺπ
#OSCP #Cybersecurity #EthicalHacking #TwisterMachine #InfoSec #GitHub #LearnToHack @SaveToNotion @threadreaderapp
π Searching for sensitive files on the web? Here's a Google dork to find filenames that might contain sensitive information. Use it responsibly! #InfoSec #Security #GoogleDork #bugbountytips @SaveToNotion @threadreaderapp
πGoogle dork for searching these filenames on Google:
intext:"filename:config.php" OR
intext:"filename:config.inc.php" OR
intext:"filename:prod.secret.exs" OR
intext:"filename:configuration.php" OR
intext:"filename:.sh_history" OR
intext:"filename:shadow" OR
intext:"filename:proftpdpasswd" OR
intext:"filename:.psafe3" OR
intext:"filename:.pgpass" OR
intext:"filename:manifest.xml" OR
intext:"filename:travis.yml" OR
intext:"filename:vim_settings.xml" OR
intext:"filename:database" OR
intext:"filename:prod.exs" OR
intext:"filename:prod.secret.exs" OR
intext:"filename:.npmrc _auth" OR
intext:"filename:.dockercfg" OR
intext:"filename:WebServers.xml" OR
intext:"filename:.bash_history" OR
intext:"filename:sftp-config.json" OR
intext:"filename:sftp.json" OR
intext:"filename:secrets.yml" OR
intext:"filename:.esmtprc" OR
https://twitter.com/TheMsterDoctor1/status/1754409763914354705?s=19
π Check out
#nmap
==-Nmap====
nmap -p- -sT -sV -A $IP
nmap -p- -sC -sV $IP --0pen
nmap -p- --script=vuln $IP
###HTTP-Methods
nmap --script http-methods --script-args
http-methods. url-path='/webs ite '
###
sed IPs:
grep -oE '((1? [0-9] [0-9]? |2[0-4] [0-
9] |25[0-5])\.){3} (1? [0-9] [0-9]? |2 [0-4]
[0-9] |25 [0-5] ) ' FILE
--Script smb-enum-shares
=EE=======
=E==EE====E============E==
EEE=E==E==:
=========:
==
WPScan & SSL
wpscan--url $URL --disable-tls-checks -
-enumerate p --enumerate t --enumerate u
===WPScan Brute Forceing:
wpscan --url $URL --disable-t ls-checks -
U users -P
/usr/share/wordlists/ rockyou. txt
==Aggressive Plugin Detection:
wpscan --url $URL
plugins-detection aggressive
--enumerate p
========================================
c==Nikto with SSL and Evasion
nikto --host $IP -ssl -evasion 1
SEE EVASION MODALITIES.
E===================================
==dns_recon
dnsrecon -d yourdomain. com
==
===9obuster directory
gobuster dir -u $URL -W
/opt/SecLists/Dis covery/Web-
Content/ raft-medium-directories. txt -k -
t 30
===gobuster files
gobuster dir -u $URL -W
/opt/SecLists/Dis covery/Web-
Content/raft-medium-files. txt -k -t 30
==00buster for SubDoma in brute forcing:
gobuster dns -d doma in.org -w
/opt/SecLists/Discovery/DNS/subdomains-
toplmillion-110000. txt -t 30
"just make sure any DNS name you find
resolves to an in-scope address before
you test it!
====E=======:
=H==E====E====E===E====
==Extract IPs from a text file.
grep -o '[0-9]\{1, 3\}\. [0-9]\{1,3\}\. [0-
9]\{1,3\}\. [0-9]\{1, 3\}' nmapfile. txt
===Wfuzz XSS
Fuzzing===:
wfuzz -C -Z
file, /opt/SecLists/Fuzzing/XSS,/XSS-
BruteLogic. txt "$URL"
wfuzz -C -Z
file, /opt/SecLists/ Fuzzing/XSS,/XSS-
JhaddiX. txt "$URL"
===C0MMAND INJECTION WITH POST DATA
wfuzz -C -Z
file, /opt/SecLists/Fuzzing/command-
injection-commix. txt -d "doi=FUZZ"
"$URL"
===Test for Paramter Existence!
wfuzz -C -Z
file, /opt/SecLists/Dis covery /Web-
Content/burp-parameter-names. txt "$URL"
===AUTHENTICATED FUZZING DIRECTORIES:
wfuzz -C -Z
file, /opt/SecLists/Dis cove ry/Web-
Content/ raft-medium-directories . txt --hc
404 -d "SESSIONID=value" "$URL"
=AUTHENTICATED FILE FUZZING:
wfuzz -C -Z
file, /opt/SecLists/Discove ry/Web-
Content/ raft-med ium-files . txt --hc 404 -
d "SESSIONID=value" "$URL"
===FUZZ Directories :
wfuzz -C -Z
file, /opt/SecLists/Dis covery/Web-
Content/ raft-la rge-d irectories. txt --hc
404 "$URL"
===FUZZ FILES:
wfuzz -C -Z
file, /opt/SecLists/Dis covery/Web-
Content/ raft-la rge-files . txt --hc 404
"$URL"
π Learn, practice, and let's achieve OSCP success together! πͺπ
#OSCP #Cybersecurity #EthicalHacking #TwisterMachine #InfoSec #GitHub #LearnToHack @SaveToNotion @threadreaderapp
π Searching for sensitive files on the web? Here's a Google dork to find filenames that might contain sensitive information. Use it responsibly! #InfoSec #Security #GoogleDork #bugbountytips @SaveToNotion @threadreaderapp
πGoogle dork for searching these filenames on Google:
intext:"filename:config.php" OR
intext:"filename:config.inc.php" OR
intext:"filename:prod.secret.exs" OR
intext:"filename:configuration.php" OR
intext:"filename:.sh_history" OR
intext:"filename:shadow" OR
intext:"filename:proftpdpasswd" OR
intext:"filename:.psafe3" OR
intext:"filename:.pgpass" OR
intext:"filename:manifest.xml" OR
intext:"filename:travis.yml" OR
intext:"filename:vim_settings.xml" OR
intext:"filename:database" OR
intext:"filename:prod.exs" OR
intext:"filename:prod.secret.exs" OR
intext:"filename:.npmrc _auth" OR
intext:"filename:.dockercfg" OR
intext:"filename:WebServers.xml" OR
intext:"filename:.bash_history" OR
intext:"filename:sftp-config.json" OR
intext:"filename:sftp.json" OR
intext:"filename:secrets.yml" OR
intext:"filename:.esmtprc" OR
https://twitter.com/TheMsterDoctor1/status/1754409763914354705?s=19
X (formerly Twitter)
X (@TheMsterDoctor1) on X
π Exciting News! π I've just conquered the Twister machine in my OSCP journey!
#Day7π΅οΈββοΈπ»
π¨βπ» Now, I'm sharing my code and notes to help You!!π―
π Check out
==-Nmap====
nmap -p- -sT -sV -A $IP
nmap -p- -sC -sV $IP --0pen
nmap -p- --script=vuln $IP
###HTTPβ¦
#Day7π΅οΈββοΈπ»
π¨βπ» Now, I'm sharing my code and notes to help You!!π―
π Check out
==-Nmap====
nmap -p- -sT -sV -A $IP
nmap -p- -sC -sV $IP --0pen
nmap -p- --script=vuln $IP
###HTTPβ¦
π8β€6