Intel Gathering And Ddos Guide - AnIntel Gathering And Ddos Guide
By AnonyAussie
www.twitter.com/AnonyAussie
@AnonyAussie
Welcome to my Intel Gathering and Ddos Guide for newbloods, below you'll find useful information to get started.
This guide is to educate people who want to help stop ISIS so they have the knowledge to do so.
------------------------------------------------------------
YOU MUST BEGIN HERE: https://newblood.anonops.com/ MAKE SURE YOU READ THIS FIRST!
------------------------------------------------------------
Intel Resources & Tools
⦁ Language Translator: Easy to find just google search for one
⦁ Twitter Advanced Search: https://twitter.com/search-advanced?lang=en
⦁ IP Address Tools and More: http://whatismyipaddress.com/
⦁ Reverse Image Search: https://www.tineye.com/
⦁ Link Checker: http://www.urlvoid.com/
⦁ Get a Twitter user's ID: http://mytwitterid.com/
⦁ Check Host: http://check-host.net/
⦁ Tor: https: www.torproject.org/
⦁ Tor Search engines: http://hss3uro2hsxfogfq.onion/ and http://xmh57jrzrnw6insl.onion/
⦁ Vulnerability search engine: https://www.punkspider.org/
⦁ DNS Leak Test: https://dnsleaktest.com/
⦁ Their are many more tools these are just the basics, use google to learn more.
⦁ Hashtags on Twitter
#USAccomplice
https://twitter.com/hashtag/USAccomplice?src=hash
#muslimssalvagey
https://twitter.com/hashtag/muslimssalvageyourselves?f=tweets&vertical=default&src=hash
#truefaceofamerica
https://twitter.com/hashtag/truefaceofamerica?f=tweets&vertical=default&src=hash
#WilayatNinawa
https://twitter.com/hashtag/WilayatNinawa?src=hash
#SatanicCoalition
https://twitter.com/hashtag/sataniccoalition?f=tweets&vertical=default&src=hash
#MuslimArmies
https://twitter.com/hashtag/muslimarmies?f=tweets&vertical=default&src=hash
#Kuffar
https://twitter.com/search?f=tweets&vertical=default&q=%23kuffar&src=typd
You can also search 'JustPaste.It' on Twitter
------------------------------------------------------------
Authorities
CIA - https://www.cia.gov/contact-cia/report-threats.html
FBI - https://tips.fbi.gov/
NCIS - http://www.ncis.navy.mil/ContactUs/Pages/ReportaCrime.aspx
------------------------------------------------------------
FBI Most Wanted Terrorists - https://www.fbi.gov/wanted/wanted_terrorists
------------------------------------------------------------
Hunting Locations
⦁ Social Media -Twitter, Facebook, Telegram, YouTub, Archive.Org
⦁ Jihadist Forums
⦁ Jihadist Websites
⦁ Darknet - Use Tor to access
Almost 1,000 ISIS twitter accounts:
https://ghostbin.com/paste/r22mn
If you find anything useful message me on twitter at www.twitter.com/AnonyAussie
Ddos Programs
------------------------------------------------------------
hoic - High-speed multi-threaded HTTP Flood, Flood up to 256 sites at once, Use of Boosters to increase DoS output, and more.
DO NOT USE
------------------------------------------------------------
Hping - is a packet generator and analyzer for the TCP/IP protocol. Features: Supports TCP, UDP, ICMP and RAW-IP protocols.
For the hping3 API check docs/API.txt
You can find documentation about hping3 specific functions
at http://wiki.hping.org
Make sure to check the page at http://wiki.hping.org/34
Windows:http://www.hping.org/
Mac:https://github.com/antirez/hping
Linux:https://github.com/antirez/hping
------------------------------------------------------------
Pyloris - PyLoris is said to be a testing tool for servers. It can be used to perform DOS attacks on a service. This tool can utilize SOCKS proxies and SSL connections to perform a DOS attack on a server. It can target various protocols, including HTTP, FTP, SMTP, IMAP, and Telnet.
Windows:http://sourceforge.net/projects/pyloris/
Mac:http://sourceforge.net/projects/pyloris/
Linux:http://sourceforge.net/projects/pyloris/
------------------------------------------------------------
Slowloris - holds connections open by sending partial HTTP requests.
Windows:https://sourceforge.net/projects/slolorisgui/
Mac:https://cyberwar4iran.blogspot.com/
Linux:https://download.pureftpd.org/misc/slowloris.pl
------------------------------------------------------------
Thc-ssl - Exploits asymmetric property by overloading the server and knocking it off the Internet. The tool departs from traditional DDoS tools: It does not require any bandwidth and just a single attack computer.
Windows: thc-ssl-dos-1.4-win-bin.zip
Mac:N/A
Linux:thc-ssl-dos-1.4.tar.gz
------------------------------------------------------------
Torshammer - It is a slow post tool written in Python. This tool has an extra advantage: It can be run through a TOR network to be anonymous while performing the attack. It is an effective tool that can kill Apache or IIS servers in few seconds.
Windows:http://sourceforge.net/projects/torshammer/
Mac:N/A
Linux:http://sourceforge.net/projects/torshammer/
Over 100 ISIS websites:
https://ghostbin.com/paste/22djnonyAussie