Intel Gathering & Ddos Guide - AnonyAussie


SUBMITTED BY: nitafiscus

DATE: Nov. 27, 2015, 1:36 a.m.

FORMAT: Text only

SIZE: 5.2 kB

HITS: 1426

  1. Intel Gathering And Ddos Guide - AnIntel Gathering And Ddos Guide
  2. By AnonyAussie
  3. www.twitter.com/AnonyAussie
  4. @AnonyAussie
  5. Welcome to my Intel Gathering and Ddos Guide for newbloods, below you'll find useful information to get started.
  6. This guide is to educate people who want to help stop ISIS so they have the knowledge to do so.
  7. ------------------------------------------------------------
  8. YOU MUST BEGIN HERE: https://newblood.anonops.com/ MAKE SURE YOU READ THIS FIRST!
  9. ------------------------------------------------------------
  10. Intel Resources & Tools
  11. ⦁ Language Translator: Easy to find just google search for one
  12. ⦁ Twitter Advanced Search: https://twitter.com/search-advanced?lang=en
  13. ⦁ IP Address Tools and More: http://whatismyipaddress.com/
  14. ⦁ Reverse Image Search: https://www.tineye.com/
  15. ⦁ Link Checker: http://www.urlvoid.com/
  16. ⦁ Get a Twitter user's ID: http://mytwitterid.com/
  17. ⦁ Check Host: http://check-host.net/
  18. ⦁ Tor: https: www.torproject.org/
  19. ⦁ Tor Search engines: http://hss3uro2hsxfogfq.onion/ and http://xmh57jrzrnw6insl.onion/
  20. ⦁ Vulnerability search engine: https://www.punkspider.org/
  21. ⦁ DNS Leak Test: https://dnsleaktest.com/
  22. ⦁ Their are many more tools these are just the basics, use google to learn more.
  23. ⦁ Hashtags on Twitter
  24. #USAccomplice
  25. https://twitter.com/hashtag/USAccomplice?src=hash
  26. #muslimssalvagey
  27. https://twitter.com/hashtag/muslimssalvageyourselves?f=tweets&vertical=default&src=hash
  28. #truefaceofamerica
  29. https://twitter.com/hashtag/truefaceofamerica?f=tweets&vertical=default&src=hash
  30. #WilayatNinawa
  31. https://twitter.com/hashtag/WilayatNinawa?src=hash
  32. #SatanicCoalition
  33. https://twitter.com/hashtag/sataniccoalition?f=tweets&vertical=default&src=hash
  34. #MuslimArmies
  35. https://twitter.com/hashtag/muslimarmies?f=tweets&vertical=default&src=hash
  36. #Kuffar
  37. https://twitter.com/search?f=tweets&vertical=default&q=%23kuffar&src=typd
  38. You can also search 'JustPaste.It' on Twitter
  39. ------------------------------------------------------------
  40. Authorities
  41. CIA - https://www.cia.gov/contact-cia/report-threats.html
  42. FBI - https://tips.fbi.gov/
  43. NCIS - http://www.ncis.navy.mil/ContactUs/Pages/ReportaCrime.aspx
  44. ------------------------------------------------------------
  45. FBI Most Wanted Terrorists - https://www.fbi.gov/wanted/wanted_terrorists
  46. ------------------------------------------------------------
  47. Hunting Locations
  48. ⦁ Social Media -Twitter, Facebook, Telegram, YouTub, Archive.Org
  49. ⦁ Jihadist Forums
  50. ⦁ Jihadist Websites
  51. ⦁ Darknet - Use Tor to access
  52. Almost 1,000 ISIS twitter accounts:
  53. https://ghostbin.com/paste/r22mn
  54. If you find anything useful message me on twitter at www.twitter.com/AnonyAussie
  55. Ddos Programs
  56. ------------------------------------------------------------
  57. hoic - High-speed multi-threaded HTTP Flood, Flood up to 256 sites at once, Use of Boosters to increase DoS output, and more.
  58. DO NOT USE
  59. ------------------------------------------------------------
  60. Hping - is a packet generator and analyzer for the TCP/IP protocol. Features: Supports TCP, UDP, ICMP and RAW-IP protocols.
  61. For the hping3 API check docs/API.txt
  62. You can find documentation about hping3 specific functions
  63. at http://wiki.hping.org
  64. Make sure to check the page at http://wiki.hping.org/34
  65. Windows:http://www.hping.org/
  66. Mac:https://github.com/antirez/hping
  67. Linux:https://github.com/antirez/hping
  68. ------------------------------------------------------------
  69. Pyloris - PyLoris is said to be a testing tool for servers. It can be used to perform DOS attacks on a service. This tool can utilize SOCKS proxies and SSL connections to perform a DOS attack on a server. It can target various protocols, including HTTP, FTP, SMTP, IMAP, and Telnet.
  70. Windows:http://sourceforge.net/projects/pyloris/
  71. Mac:http://sourceforge.net/projects/pyloris/
  72. Linux:http://sourceforge.net/projects/pyloris/
  73. ------------------------------------------------------------
  74. Slowloris - holds connections open by sending partial HTTP requests.
  75. Windows:https://sourceforge.net/projects/slolorisgui/
  76. Mac:https://cyberwar4iran.blogspot.com/
  77. Linux:https://download.pureftpd.org/misc/slowloris.pl
  78. ------------------------------------------------------------
  79. Thc-ssl - Exploits asymmetric property by overloading the server and knocking it off the Internet. The tool departs from traditional DDoS tools: It does not require any bandwidth and just a single attack computer.
  80. Windows: thc-ssl-dos-1.4-win-bin.zip
  81. Mac:N/A
  82. Linux:thc-ssl-dos-1.4.tar.gz
  83. ------------------------------------------------------------
  84. Torshammer - It is a slow post tool written in Python. This tool has an extra advantage: It can be run through a TOR network to be anonymous while performing the attack. It is an effective tool that can kill Apache or IIS servers in few seconds.
  85. Windows:http://sourceforge.net/projects/torshammer/
  86. Mac:N/A
  87. Linux:http://sourceforge.net/projects/torshammer/
  88. Over 100 ISIS websites:
  89. https://ghostbin.com/paste/22djnonyAussie

comments powered by Disqus