Jin is a hacking command-line tools designed to make your scan port, gathering urls, check vulnerability and sending DDOS attack to your target.

This tools is made for ethical and education purpose. I recommend you not to use this tools for harmfull action.

Current Tools:

  • scan: This tool scans a target host for open ports, providing valuable information for network analysis and troubleshooting.
  • attack: This command is used to send DDOS target to target.
  • version: This command will show the current version of this cli tool.
  • map: Mapping and gathering the related urls in the target website.
  • check: Check website vulnerability.

Installation:

  • Clone the repository:
git clone https://github.com/aliftech/jin.git

Navigate to the project directory:

cd jin

Create Virtual env

py -m venv env
.\env\Scripts\activate

Install dependencies:

pip install -r requirements.txt

Usage:

  • Run the script with the desired command:
python main.py <command> [options]
  • Replace with the specific tool you want to use.

How To Use

Port Scanning

The port scanning is used to scanning the open port of the targeted website. This function is called using the following command:

python main.py scan example.com
  • The example.com above mean the targeted website domain.

DDOS Attack

To launch a ddos attack to the targeted website, you can use the following command:

python main.py attack example.com 80 [option] --threads 100
  • The example.com above mean the targeted website domain.
  • The 80 is the port number of targeted website. To gathering information about the opening port, you need to run the port scanning function to your targeted website.
  • [option] --threads 100 is the optional parameter, the number of threads to use for processing.

Mapping Related URL

This function is designed to mapping all the related urls of the target. Here is the command to call this function:

python main.py map https://www.example.com

For more information click here.

Published by Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Leave a comment

Your email address will not be published. Required fields are marked *