Cyber security

Jin – Your Hacking CLI Toolkit

Jin is a hacking command-line tools designed to make your scan port, gathering urls, check vulnerability and sending DDOS attack to your target.

This tools is made for ethical and education purpose. I recommend you not to use this tools for harmfull action.

Current Tools:

  • scan: This tool scans a target host for open ports, providing valuable information for network analysis and troubleshooting.
  • attack: This command is used to send DDOS target to target.
  • version: This command will show the current version of this cli tool.
  • map: Mapping and gathering the related urls in the target website.
  • check: Check website vulnerability.

Installation:

  • Clone the repository:
git clone https://github.com/aliftech/jin.git

Navigate to the project directory:

cd jin

Create Virtual env

py -m venv env
.\env\Scripts\activate

Install dependencies:

pip install -r requirements.txt

Usage:

  • Run the script with the desired command:
python main.py <command> [options]
  • Replace with the specific tool you want to use.

How To Use

Port Scanning

The port scanning is used to scanning the open port of the targeted website. This function is called using the following command:

python main.py scan example.com
  • The example.com above mean the targeted website domain.

DDOS Attack

To launch a ddos attack to the targeted website, you can use the following command:

python main.py attack example.com 80 [option] --threads 100
  • The example.com above mean the targeted website domain.
  • The 80 is the port number of targeted website. To gathering information about the opening port, you need to run the port scanning function to your targeted website.
  • [option] --threads 100 is the optional parameter, the number of threads to use for processing.

Mapping Related URL

This function is designed to mapping all the related urls of the target. Here is the command to call this function:

python main.py map https://www.example.com

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

cp Command: Copy Files and Directories in Linux

The cp command, short for "copy," is the main Linux utility for duplicating files and directories. Whether…

7 days ago

Image OSINT

Introduction In digital investigations, images often hold more information than meets the eye. With the…

7 days ago

cat Command: Read and Combine File Contents in Linux

The cat command short for concatenate, It is a fast and versatile tool for viewing and merging…

1 week ago

Port In Networking

What is a Port? A port in networking acts like a gateway that directs data…

1 week ago

ls Command: List Directory Contents in Linux

The ls command is fundamental for anyone working with Linux. It’s used to display the files and…

1 week ago

pwd Command: Find Your Location in Linux

The pwd (Print Working Directory) command is essential for navigating the Linux filesystem. It instantly shows your…

1 week ago