Advertisement
AnonyAussie

Intel Gathering And Ddos Guide - AnonyAussie

Nov 17th, 2015
6,856
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.07 KB | None | 0 0
  1. Intel Gathering And Ddos Guide
  2. By AnonyAussie
  3. www.twitter.com/AnonyAussie
  4. @AnonyAussie
  5.  
  6.  
  7.  
  8. Welcome to my Intel Gathering and Ddos Guide for newbloods, below you'll find useful information to get started.
  9. This guide is to educate people who want to help stop ISIS so they have the knowledge to do so.
  10.  
  11. ------------------------------------------------------------
  12.  
  13. YOU MUST BEGIN HERE: https://newblood.anonops.com/ MAKE SURE YOU READ THIS FIRST!
  14.  
  15. ------------------------------------------------------------
  16.  
  17. Intel Resources & Tools
  18. ⦁ Language Translator: Easy to find just google search for one
  19. ⦁ Twitter Advanced Search: https://twitter.com/search-advanced?lang=en
  20. ⦁ IP Address Tools and More: http://whatismyipaddress.com/
  21. ⦁ Reverse Image Search: https://www.tineye.com/
  22. ⦁ Link Checker: http://www.urlvoid.com/
  23. ⦁ Get a Twitter user's ID: http://mytwitterid.com/
  24. ⦁ Check Host: http://check-host.net/
  25. ⦁ Tor: https: www.torproject.org/
  26. ⦁ Tor Search engines: http://hss3uro2hsxfogfq.onion/ and http://xmh57jrzrnw6insl.onion/
  27. ⦁ Vulnerability search engine: https://www.punkspider.org/
  28. ⦁ DNS Leak Test: https://dnsleaktest.com/
  29. ⦁ Their are many more tools these are just the basics, use google to learn more.
  30. ⦁ Hashtags on Twitter
  31. #USAccomplice
  32. https://twitter.com/hashtag/USAccomplice?src=hash
  33. #muslimssalvagey
  34. https://twitter.com/hashtag/muslimssalvageyourselves?f=tweets&vertical=default&src=hash
  35. #truefaceofamerica
  36. https://twitter.com/hashtag/truefaceofamerica?f=tweets&vertical=default&src=hash
  37. #WilayatNinawa
  38. https://twitter.com/hashtag/WilayatNinawa?src=hash
  39. #SatanicCoalition
  40. https://twitter.com/hashtag/sataniccoalition?f=tweets&vertical=default&src=hash
  41. #MuslimArmies
  42. https://twitter.com/hashtag/muslimarmies?f=tweets&vertical=default&src=hash
  43. #Kuffar
  44. https://twitter.com/search?f=tweets&vertical=default&q=%23kuffar&src=typd
  45. You can also search 'JustPaste.It' on Twitter
  46.  
  47. ------------------------------------------------------------
  48.  
  49. Authorities
  50. CIA - https://www.cia.gov/contact-cia/report-threats.html
  51. FBI - https://tips.fbi.gov/
  52. NCIS - http://www.ncis.navy.mil/ContactUs/Pages/ReportaCrime.aspx
  53.  
  54. ------------------------------------------------------------
  55.  
  56. FBI Most Wanted Terrorists - https://www.fbi.gov/wanted/wanted_terrorists
  57.  
  58. ------------------------------------------------------------
  59.  
  60. Hunting Locations
  61. ⦁ Social Media -Twitter, Facebook, Telegram, YouTub, Archive.Org
  62. ⦁ Jihadist Forums
  63. ⦁ Jihadist Websites
  64. ⦁ Darknet - Use Tor to access
  65.  
  66. Almost 1,000 ISIS twitter accounts:
  67. https://ghostbin.com/paste/r22mn
  68.  
  69. If you find anything useful message me on twitter at www.twitter.com/AnonyAussie
  70.  
  71.  
  72.  
  73.  
  74.  
  75. Ddos Programs
  76.  
  77. ------------------------------------------------------------
  78.  
  79. hoic - High-speed multi-threaded HTTP Flood, Flood up to 256 sites at once, Use of Boosters to increase DoS output, and more.
  80.  
  81. DO NOT USE
  82.  
  83. ------------------------------------------------------------
  84.  
  85. Hping - is a packet generator and analyzer for the TCP/IP protocol. Features: Supports TCP, UDP, ICMP and RAW-IP protocols.
  86. For the hping3 API check docs/API.txt
  87. You can find documentation about hping3 specific functions
  88. at http://wiki.hping.org
  89. Make sure to check the page at http://wiki.hping.org/34
  90.  
  91. Windows:http://www.hping.org/
  92.  
  93. Mac:https://github.com/antirez/hping
  94.  
  95. Linux:https://github.com/antirez/hping
  96.  
  97. ------------------------------------------------------------
  98.  
  99. Pyloris - PyLoris is said to be a testing tool for servers. It can be used to perform DOS attacks on a service. This tool can utilize SOCKS proxies and SSL connections to perform a DOS attack on a server. It can target various protocols, including HTTP, FTP, SMTP, IMAP, and Telnet.
  100.  
  101. Windows:http://sourceforge.net/projects/pyloris/
  102.  
  103. Mac:http://sourceforge.net/projects/pyloris/
  104.  
  105. Linux:http://sourceforge.net/projects/pyloris/
  106.  
  107. ------------------------------------------------------------
  108.  
  109. Slowloris - holds connections open by sending partial HTTP requests.
  110.  
  111. Windows:https://sourceforge.net/projects/slolorisgui/
  112.  
  113. Mac:https://cyberwar4iran.blogspot.com/
  114.  
  115. Linux:https://download.pureftpd.org/misc/slowloris.pl
  116.  
  117. ------------------------------------------------------------
  118.  
  119. Thc-ssl - Exploits asymmetric property by overloading the server and knocking it off the Internet. The tool departs from traditional DDoS tools: It does not require any bandwidth and just a single attack computer.
  120.  
  121. Windows: thc-ssl-dos-1.4-win-bin.zip
  122.  
  123. Mac:N/A
  124.  
  125. Linux:thc-ssl-dos-1.4.tar.gz
  126.  
  127. ------------------------------------------------------------
  128.  
  129. Torshammer - It is a slow post tool written in Python. This tool has an extra advantage: It can be run through a TOR network to be anonymous while performing the attack. It is an effective tool that can kill Apache or IIS servers in few seconds.
  130.  
  131. Windows:http://sourceforge.net/projects/torshammer/
  132.  
  133. Mac:N/A
  134.  
  135. Linux:http://sourceforge.net/projects/torshammer/
  136.  
  137. Over 100 ISIS websites:
  138. https://ghostbin.com/paste/22djn
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement