Cyber security

Jin – Your Hacking CLI Toolkit

Jin is a hacking command-line tools designed to make your scan port, gathering urls, check vulnerability and sending DDOS attack to your target.

This tools is made for ethical and education purpose. I recommend you not to use this tools for harmfull action.

Current Tools:

  • scan: This tool scans a target host for open ports, providing valuable information for network analysis and troubleshooting.
  • attack: This command is used to send DDOS target to target.
  • version: This command will show the current version of this cli tool.
  • map: Mapping and gathering the related urls in the target website.
  • check: Check website vulnerability.

Installation:

  • Clone the repository:
git clone https://github.com/aliftech/jin.git

Navigate to the project directory:

cd jin

Create Virtual env

py -m venv env
.\env\Scripts\activate

Install dependencies:

pip install -r requirements.txt

Usage:

  • Run the script with the desired command:
python main.py <command> [options]
  • Replace with the specific tool you want to use.

How To Use

Port Scanning

The port scanning is used to scanning the open port of the targeted website. This function is called using the following command:

python main.py scan example.com
  • The example.com above mean the targeted website domain.

DDOS Attack

To launch a ddos attack to the targeted website, you can use the following command:

python main.py attack example.com 80 [option] --threads 100
  • The example.com above mean the targeted website domain.
  • The 80 is the port number of targeted website. To gathering information about the opening port, you need to run the port scanning function to your targeted website.
  • [option] --threads 100 is the optional parameter, the number of threads to use for processing.

Mapping Related URL

This function is designed to mapping all the related urls of the target. Here is the command to call this function:

python main.py map https://www.example.com

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How Web Application Firewalls (WAFs) Work

General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…

1 day ago

How to Send POST Requests Using curl in Linux

How to Send POST Requests Using curl in Linux If you work with APIs, servers,…

1 day ago

What Does chmod 777 Mean in Linux

If you are a Linux user, you have probably seen commands like chmod 777 while…

1 day ago

How to Undo and Redo in Vim or Vi

Vim and Vi are among the most powerful text editors in the Linux world. They…

1 day ago

How to Unzip and Extract Files in Linux

Working with compressed files is a common task for any Linux user. Whether you are…

1 day ago

Free Email Lookup Tools and Reverse Email Search Resources

In the digital era, an email address can reveal much more than just a contact…

1 day ago