-
Notifications
You must be signed in to change notification settings - Fork 202
/
Copy pathREADME.txt
35 lines (28 loc) · 1.11 KB
/
README.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
Hacker information collection, used to collect information about the target.
Direct operation of specific usage.
Example:
python3 Hacker Tool set.py
python3 Hacker information collection.py
python3 translate.py
python3 arp.py
Please modify the SMTP. Login and SMTP. Sendmail () parameters before calling the mailbox forge script.
Ddos.py is the user I wrote with python2.7 please
Self modify the attack target inside
Defense ddos
Defense ddos: please first execute install. Py =>fyddos.
Then the defense ddos script starts. If you are attacked by ddos, execute.
Netstat -ntu | awk '{print $5}' | cut -d: -f1 | sort | uniq-c | sort -n.
Command to view your IP. Detailed article: http://www.cnblogs.com/haq5201314/p/8351960.html
python shell.py -h
-a asp Trojan horse
-j jsap Trojan horse
-p php Trojan horse
-v Edition
python3 Sqllinject.py
python3 WebmasterTools.py
Usage: [-z Subdomain mining][-p Side of the station inquiries][-x http status query]
Options:
-h, --help show this help message and exit
-z SUBDOMAIN Subdomain mining
-p SIDE Side of the station inquiries
-x HTTP http status query