XCTR Hacking Tools 2020

XCTR Hacking Tools initially, you need to create a project where you will save everything. All of the collected information is saved as “project-name” in results directory.

You can update user agent and proxy information in the settings section and also update url, proxy, project name, wordlist, thread numbers.

Features

This tool include:

  • Dork Finder
  • Admin Panel Finder
  • Cms Finder
  • Ip History
  • Reverse Ip
  • Page Viewer
  • Proxy Finder

Installation

  • Installation with requirements.txt

git clone https://github.com/capture0x/XCTR-Hacking-Tools/
cd xctr-hacking-tools
pip3 install -r requirements.txt

Also Read – Xencrypt : A PowerShell Script Anti-Virus Evasion Tool

Usage

python3 xctr.py

All results save in results/project-name.

  • Dork Finder

The dork finder have 2 section. Bing and yandex.

e.g:

*.php?id=

  • Admin Panel Finder
  • In this section, firstly need choose a wordlist for scanning.
  • Press 2 to change wordlist and login.
  • Url should be https://targetsite.com/ (http or s and / symbol at the end of the url.)
  • If scanning is slow you will update the proxies.(Press 3 to update)

CMS Finder

You’ll find cms version from meta name.

IP History

This tool displays and save the ip history of the domain.

e.g usage:

targetsite.com

Reverse IP

With this tool, you can find domains on server.

e.g usage:

212.57.147.54

Page Viewer

You can increase the number of page views of the target site.

e.g usage:

https://targetsite.com

Proxy Finder

This tool, find proxies on free-proxy-list.net and updates proxy.txt on main directory.

Screenshot

Credit: Hulya Karabag

R K

Recent Posts

How to Install Docker on Ubuntu (Step-by-Step Guide)

Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…

12 hours ago

Uninstall Docker on Ubuntu

Docker is one of the most widely used containerization platforms. But there may come a…

12 hours ago

Admin Panel Dorks : A Complete List of Google Dorks

Introduction Google Dorking is a technique where advanced search operators are used to uncover information…

2 days ago

Log Analysis Fundamentals

Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…

3 days ago

Networking Devices 101: Understanding Routers, Switches, Hubs, and More

What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…

3 days ago

Sock Puppets in OSINT: How to Build and Use Research Accounts

Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…

3 days ago