Intel Gathering And Ddos Guide - AnIntel Gathering And Ddos Guide By AnonyAussie www.twitter.com/AnonyAussie @AnonyAussie Welcome to my Intel Gathering and Ddos Guide for newbloods, below you'll find useful information to get started. This guide is to educate people who want to help stop ISIS so they have the knowledge to do so. ------------------------------------------------------------ YOU MUST BEGIN HERE: https://newblood.anonops.com/ MAKE SURE YOU READ THIS FIRST! ------------------------------------------------------------ Intel Resources & Tools ⦁ Language Translator: Easy to find just google search for one ⦁ Twitter Advanced Search: https://twitter.com/search-advanced?lang=en ⦁ IP Address Tools and More: http://whatismyipaddress.com/ ⦁ Reverse Image Search: https://www.tineye.com/ ⦁ Link Checker: http://www.urlvoid.com/ ⦁ Get a Twitter user's ID: http://mytwitterid.com/ ⦁ Check Host: http://check-host.net/ ⦁ Tor: https: www.torproject.org/ ⦁ Tor Search engines: http://hss3uro2hsxfogfq.onion/ and http://xmh57jrzrnw6insl.onion/ ⦁ Vulnerability search engine: https://www.punkspider.org/ ⦁ DNS Leak Test: https://dnsleaktest.com/ ⦁ Their are many more tools these are just the basics, use google to learn more. ⦁ Hashtags on Twitter #USAccomplice https://twitter.com/hashtag/USAccomplice?src=hash #muslimssalvagey https://twitter.com/hashtag/muslimssalvageyourselves?f=tweets&vertical=default&src=hash #truefaceofamerica https://twitter.com/hashtag/truefaceofamerica?f=tweets&vertical=default&src=hash #WilayatNinawa https://twitter.com/hashtag/WilayatNinawa?src=hash #SatanicCoalition https://twitter.com/hashtag/sataniccoalition?f=tweets&vertical=default&src=hash #MuslimArmies https://twitter.com/hashtag/muslimarmies?f=tweets&vertical=default&src=hash #Kuffar https://twitter.com/search?f=tweets&vertical=default&q=%23kuffar&src=typd You can also search 'JustPaste.It' on Twitter ------------------------------------------------------------ Authorities CIA - https://www.cia.gov/contact-cia/report-threats.html FBI - https://tips.fbi.gov/ NCIS - http://www.ncis.navy.mil/ContactUs/Pages/ReportaCrime.aspx ------------------------------------------------------------ FBI Most Wanted Terrorists - https://www.fbi.gov/wanted/wanted_terrorists ------------------------------------------------------------ Hunting Locations ⦁ Social Media -Twitter, Facebook, Telegram, YouTub, Archive.Org ⦁ Jihadist Forums ⦁ Jihadist Websites ⦁ Darknet - Use Tor to access Almost 1,000 ISIS twitter accounts: https://ghostbin.com/paste/r22mn If you find anything useful message me on twitter at www.twitter.com/AnonyAussie Ddos Programs ------------------------------------------------------------ hoic - High-speed multi-threaded HTTP Flood, Flood up to 256 sites at once, Use of Boosters to increase DoS output, and more. DO NOT USE ------------------------------------------------------------ Hping - is a packet generator and analyzer for the TCP/IP protocol. Features: Supports TCP, UDP, ICMP and RAW-IP protocols. For the hping3 API check docs/API.txt You can find documentation about hping3 specific functions at http://wiki.hping.org Make sure to check the page at http://wiki.hping.org/34 Windows:http://www.hping.org/ Mac:https://github.com/antirez/hping Linux:https://github.com/antirez/hping ------------------------------------------------------------ Pyloris - PyLoris is said to be a testing tool for servers. It can be used to perform DOS attacks on a service. This tool can utilize SOCKS proxies and SSL connections to perform a DOS attack on a server. It can target various protocols, including HTTP, FTP, SMTP, IMAP, and Telnet. Windows:http://sourceforge.net/projects/pyloris/ Mac:http://sourceforge.net/projects/pyloris/ Linux:http://sourceforge.net/projects/pyloris/ ------------------------------------------------------------ Slowloris - holds connections open by sending partial HTTP requests. Windows:https://sourceforge.net/projects/slolorisgui/ Mac:https://cyberwar4iran.blogspot.com/ Linux:https://download.pureftpd.org/misc/slowloris.pl ------------------------------------------------------------ Thc-ssl - Exploits asymmetric property by overloading the server and knocking it off the Internet. The tool departs from traditional DDoS tools: It does not require any bandwidth and just a single attack computer. Windows: thc-ssl-dos-1.4-win-bin.zip Mac:N/A Linux:thc-ssl-dos-1.4.tar.gz ------------------------------------------------------------ Torshammer - It is a slow post tool written in Python. This tool has an extra advantage: It can be run through a TOR network to be anonymous while performing the attack. It is an effective tool that can kill Apache or IIS servers in few seconds. Windows:http://sourceforge.net/projects/torshammer/ Mac:N/A Linux:http://sourceforge.net/projects/torshammer/ Over 100 ISIS websites: https://ghostbin.com/paste/22djnonyAussie