Jin is a hacking command-line tools designed to make your scan port, gathering urls, check vulnerability and sending DDOS attack to your target.
This tools is made for ethical and education purpose. I recommend you not to use this tools for harmfull action.
git clone https://github.com/aliftech/jin.git
Navigate to the project directory:
cd jin
Create Virtual env
py -m venv env
.\env\Scripts\activate
Install dependencies:
pip install -r requirements.txt
python main.py <command> [options]
The port scanning is used to scanning the open port of the targeted website. This function is called using the following command:
python main.py scan example.com
example.com
above mean the targeted website domain.To launch a ddos attack to the targeted website, you can use the following command:
python main.py attack example.com 80 [option] --threads 100
example.com
above mean the targeted website domain.80
is the port number of targeted website. To gathering information about the opening port, you need to run the port scanning function to your targeted website.[option] --threads 100
is the optional parameter, the number of threads to use for processing.This function is designed to mapping all the related urls of the target. Here is the command to call this function:
python main.py map https://www.example.com
For more information click here.
bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…
Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…