Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Intel Gathering And Ddos Guide
- By AnonyAussie
- www.twitter.com/AnonyAussie
- @AnonyAussie
- Welcome to my Intel Gathering and Ddos Guide for newbloods, below you'll find useful information to get started.
- This guide is to educate people who want to help stop ISIS so they have the knowledge to do so.
- ------------------------------------------------------------
- YOU MUST BEGIN HERE: https://newblood.anonops.com/ MAKE SURE YOU READ THIS FIRST!
- ------------------------------------------------------------
- Intel Resources & Tools
- ⦁ Language Translator: Easy to find just google search for one
- ⦁ Twitter Advanced Search: https://twitter.com/search-advanced?lang=en
- ⦁ IP Address Tools and More: http://whatismyipaddress.com/
- ⦁ Reverse Image Search: https://www.tineye.com/
- ⦁ Link Checker: http://www.urlvoid.com/
- ⦁ Get a Twitter user's ID: http://mytwitterid.com/
- ⦁ Check Host: http://check-host.net/
- ⦁ Tor: https: www.torproject.org/
- ⦁ Tor Search engines: http://hss3uro2hsxfogfq.onion/ and http://xmh57jrzrnw6insl.onion/
- ⦁ Vulnerability search engine: https://www.punkspider.org/
- ⦁ DNS Leak Test: https://dnsleaktest.com/
- ⦁ Their are many more tools these are just the basics, use google to learn more.
- ⦁ Hashtags on Twitter
- #USAccomplice
- https://twitter.com/hashtag/USAccomplice?src=hash
- #muslimssalvagey
- https://twitter.com/hashtag/muslimssalvageyourselves?f=tweets&vertical=default&src=hash
- #truefaceofamerica
- https://twitter.com/hashtag/truefaceofamerica?f=tweets&vertical=default&src=hash
- #WilayatNinawa
- https://twitter.com/hashtag/WilayatNinawa?src=hash
- #SatanicCoalition
- https://twitter.com/hashtag/sataniccoalition?f=tweets&vertical=default&src=hash
- #MuslimArmies
- https://twitter.com/hashtag/muslimarmies?f=tweets&vertical=default&src=hash
- #Kuffar
- https://twitter.com/search?f=tweets&vertical=default&q=%23kuffar&src=typd
- You can also search 'JustPaste.It' on Twitter
- ------------------------------------------------------------
- Authorities
- CIA - https://www.cia.gov/contact-cia/report-threats.html
- FBI - https://tips.fbi.gov/
- NCIS - http://www.ncis.navy.mil/ContactUs/Pages/ReportaCrime.aspx
- ------------------------------------------------------------
- FBI Most Wanted Terrorists - https://www.fbi.gov/wanted/wanted_terrorists
- ------------------------------------------------------------
- Hunting Locations
- ⦁ Social Media -Twitter, Facebook, Telegram, YouTub, Archive.Org
- ⦁ Jihadist Forums
- ⦁ Jihadist Websites
- ⦁ Darknet - Use Tor to access
- Almost 1,000 ISIS twitter accounts:
- https://ghostbin.com/paste/r22mn
- If you find anything useful message me on twitter at www.twitter.com/AnonyAussie
- Ddos Programs
- ------------------------------------------------------------
- hoic - High-speed multi-threaded HTTP Flood, Flood up to 256 sites at once, Use of Boosters to increase DoS output, and more.
- DO NOT USE
- ------------------------------------------------------------
- Hping - is a packet generator and analyzer for the TCP/IP protocol. Features: Supports TCP, UDP, ICMP and RAW-IP protocols.
- For the hping3 API check docs/API.txt
- You can find documentation about hping3 specific functions
- at http://wiki.hping.org
- Make sure to check the page at http://wiki.hping.org/34
- Windows:http://www.hping.org/
- Mac:https://github.com/antirez/hping
- Linux:https://github.com/antirez/hping
- ------------------------------------------------------------
- Pyloris - PyLoris is said to be a testing tool for servers. It can be used to perform DOS attacks on a service. This tool can utilize SOCKS proxies and SSL connections to perform a DOS attack on a server. It can target various protocols, including HTTP, FTP, SMTP, IMAP, and Telnet.
- Windows:http://sourceforge.net/projects/pyloris/
- Mac:http://sourceforge.net/projects/pyloris/
- Linux:http://sourceforge.net/projects/pyloris/
- ------------------------------------------------------------
- Slowloris - holds connections open by sending partial HTTP requests.
- Windows:https://sourceforge.net/projects/slolorisgui/
- Mac:https://cyberwar4iran.blogspot.com/
- Linux:https://download.pureftpd.org/misc/slowloris.pl
- ------------------------------------------------------------
- Thc-ssl - Exploits asymmetric property by overloading the server and knocking it off the Internet. The tool departs from traditional DDoS tools: It does not require any bandwidth and just a single attack computer.
- Windows: thc-ssl-dos-1.4-win-bin.zip
- Mac:N/A
- Linux:thc-ssl-dos-1.4.tar.gz
- ------------------------------------------------------------
- Torshammer - It is a slow post tool written in Python. This tool has an extra advantage: It can be run through a TOR network to be anonymous while performing the attack. It is an effective tool that can kill Apache or IIS servers in few seconds.
- Windows:http://sourceforge.net/projects/torshammer/
- Mac:N/A
- Linux:http://sourceforge.net/projects/torshammer/
- Over 100 ISIS websites:
- https://ghostbin.com/paste/22djn
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement