Cyber security

Jin – Your Hacking CLI Toolkit

Jin is a hacking command-line tools designed to make your scan port, gathering urls, check vulnerability and sending DDOS attack to your target.

This tools is made for ethical and education purpose. I recommend you not to use this tools for harmfull action.

Current Tools:

  • scan: This tool scans a target host for open ports, providing valuable information for network analysis and troubleshooting.
  • attack: This command is used to send DDOS target to target.
  • version: This command will show the current version of this cli tool.
  • map: Mapping and gathering the related urls in the target website.
  • check: Check website vulnerability.

Installation:

  • Clone the repository:
git clone https://github.com/aliftech/jin.git

Navigate to the project directory:

cd jin

Create Virtual env

py -m venv env
.\env\Scripts\activate

Install dependencies:

pip install -r requirements.txt

Usage:

  • Run the script with the desired command:
python main.py <command> [options]
  • Replace with the specific tool you want to use.

How To Use

Port Scanning

The port scanning is used to scanning the open port of the targeted website. This function is called using the following command:

python main.py scan example.com
  • The example.com above mean the targeted website domain.

DDOS Attack

To launch a ddos attack to the targeted website, you can use the following command:

python main.py attack example.com 80 [option] --threads 100
  • The example.com above mean the targeted website domain.
  • The 80 is the port number of targeted website. To gathering information about the opening port, you need to run the port scanning function to your targeted website.
  • [option] --threads 100 is the optional parameter, the number of threads to use for processing.

Mapping Related URL

This function is designed to mapping all the related urls of the target. Here is the command to call this function:

python main.py map https://www.example.com

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

WID_LoadLibrary : The Intricacies Of DLL Management In Windows

WID_LoadLibrary is a custom implementation inspired by the Windows API function LoadLibrary, which is used…

58 minutes ago

Locksmith : A Tool For Securing Active Directory Certificate Services

Locksmith is a specialized tool designed to identify and remediate vulnerabilities in Active Directory Certificate…

58 minutes ago

Uscrapper Vanta : A Cutting-Edge OSINT Tool For Advanced Data Extraction

Uscrapper Vanta is a powerful open-source intelligence (OSINT) tool designed to revolutionize web scraping and…

58 minutes ago

Pake : Transforming Webpages Into Desktop Applications

Pake is an innovative tool designed to convert any webpage into a desktop application with…

6 hours ago

Bevy : Exploring The Frontier Of Game Development With Rust

Bevy is an open-source, data-driven game engine built in Rust, designed to simplify game development…

6 hours ago

AppFlowy Cloud : Enhancing Collaboration With Secure Cloud Infrastructure

AppFlowy Cloud is a robust component of the AppFlowy ecosystem, designed to provide secure user…

1 day ago