XCTR Hacking Tools 2020

XCTR Hacking Tools initially, you need to create a project where you will save everything. All of the collected information is saved as “project-name” in results directory.

You can update user agent and proxy information in the settings section and also update url, proxy, project name, wordlist, thread numbers.

Features

This tool include:

  • Dork Finder
  • Admin Panel Finder
  • Cms Finder
  • Ip History
  • Reverse Ip
  • Page Viewer
  • Proxy Finder

Installation

  • Installation with requirements.txt

git clone https://github.com/capture0x/XCTR-Hacking-Tools/
cd xctr-hacking-tools
pip3 install -r requirements.txt

Also Read – Xencrypt : A PowerShell Script Anti-Virus Evasion Tool

Usage

python3 xctr.py

All results save in results/project-name.

  • Dork Finder

The dork finder have 2 section. Bing and yandex.

e.g:

*.php?id=

  • Admin Panel Finder
  • In this section, firstly need choose a wordlist for scanning.
  • Press 2 to change wordlist and login.
  • Url should be https://targetsite.com/ (http or s and / symbol at the end of the url.)
  • If scanning is slow you will update the proxies.(Press 3 to update)

CMS Finder

You’ll find cms version from meta name.

IP History

This tool displays and save the ip history of the domain.

e.g usage:

targetsite.com

Reverse IP

With this tool, you can find domains on server.

e.g usage:

212.57.147.54

Page Viewer

You can increase the number of page views of the target site.

e.g usage:

https://targetsite.com

Proxy Finder

This tool, find proxies on free-proxy-list.net and updates proxy.txt on main directory.

Screenshot

Credit: Hulya Karabag

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago