Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



 25383

[SUPER HQ TOOL]FOR DDOS,SCRAPPROXY,CRAWLING,SQLinjection,ForcedBrowsing,INFOgathering

by Redm00n - 28 June, 2020 - 06:49 AM
This post is by a banned member (aboba68) - Unhide
aboba68  
Registered
20
Posts
0
Threads
[font]Lets work together, aiming G.O.O.G.L.E :)[/font]
[font]Lets work together, aiming G.O.O.G.L.E :)[/font]
[font]Lets work together, aiming G.O.O.G.L.E :)[/font]
[font]Lets work together, aiming G.O.O.G.L.E :)[/font]
[font]Lets work together, aiming G.O.O.G.L.E :)[/font]
This post is by a banned member (love666222) - Unhide
11
Posts
0
Threads
[font][font]感谢分享[/font][/font]
This post is by a banned member (Thekurd12) - Unhide
Thekurd12  
Registered
95
Posts
0
Threads
ty
This post is by a banned member (Hoytuh) - Unhide
Hoytuh  
Registered
26
Posts
0
Threads
2 Years of service
thank you
This post is by a banned member (cubolindex23) - Unhide
25
Posts
0
Threads
(28 June, 2020 - 06:49 AM)Redm00n Wrote: Show More
GIVE LIKE ,DON'T LEECH , I WILL REPORT LEECHERS 
DDoS: UDP,TCP,HTTP,Torshammer attack,R.U.D.Y attack,Apache killer attack,DNS amplification attack,Bypass "Under attack mode" provided by CloudFlare,Bypass "Under attack mode" provided by CloudFlare and Rate-LimitingWordPress testing.
Proxies collecting: Mass HTTP proxies gathering,Mass SOCKS5 proxies gathering,Checking proxy.
IoTs mass scanning: MASS SSH,TELNET,FTP,SMTP,MYSQL SCANNING,Mass Android Debug Bridge (ADB) exploit.
Bruteforcing: Admin panel on web page,FTP server,SSH SERVER, TELNET SERVER,WORDPRESS LOGIN PAGE , Admin panel finder.GOOGLE DORKING, WEBCAM FINDER ETC




This python library is made for educationnal purposes only. The creator and developper, not responsible for any misuse for this module in any malicious activity. it is made as a tool to understand how hackers can create their tools and performe their attacks. it contains most of known attacks and exploits.
fdf
This post is by a banned member (NANOJA) - Unhide
NANOJA  
Registered
192
Posts
0
Threads
(28 June, 2020 - 06:49 AM)Redm00n Wrote: Show More
GIVE LIKE ,DON'T LEECH , I WILL REPORT LEECHERS 
DDoS: UDP,TCP,HTTP,Torshammer attack,R.U.D.Y attack,Apache killer attack,DNS amplification attack,Bypass "Under attack mode" provided by CloudFlare,Bypass "Under attack mode" provided by CloudFlare and Rate-LimitingWordPress testing.
Proxies collecting: Mass HTTP proxies gathering,Mass SOCKS5 proxies gathering,Checking proxy.
IoTs mass scanning: MASS SSH,TELNET,FTP,SMTP,MYSQL SCANNING,Mass Android Debug Bridge (ADB) exploit.
Bruteforcing: Admin panel on web page,FTP server,SSH SERVER, TELNET SERVER,WORDPRESS LOGIN PAGE , Admin panel finder.GOOGLE DORKING, WEBCAM FINDER ETC




This python library is made for educationnal purposes only. The creator and developper, not responsible for any misuse for this module in any malicious activity. it is made as a tool to understand how hackers can create their tools and performe their attacks. it contains most of known attacks and exploits.

tytyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
This post is by a banned member (0waltuh0) - Unhide
0waltuh0  
Registered
43
Posts
0
Threads
(28 June, 2020 - 06:49 AM)Redm00n Wrote: Show More
Monkah GIVE LIKE ,DON'T LEECH , I WILL REPORT LEECHERS 
DDoS: UDP,TCP,HTTP,Torshammer attack,R.U.D.Y attack,Apache killer attack,DNS amplification attack,Bypass "Under attack mode" provided by CloudFlare,Bypass "Under attack mode" provided by CloudFlare and Rate-LimitingWordPress testing.
Proxies collecting: Mass HTTP proxies gathering,Mass SOCKS5 proxies gathering,Checking proxy.
IoTs mass scanning: MASS SSH,TELNET,FTP,SMTP,MYSQL SCANNING,Mass Android Debug Bridge (ADB) exploit.
Bruteforcing: Admin panel on web page,FTP server,SSH SERVER, TELNET SERVER,WORDPRESS LOGIN PAGE , Admin panel finder.GOOGLE DORKING, WEBCAM FINDER ETC




This python library is made for educationnal purposes only. The creator and developper, not responsible for any misuse for this module in any malicious activity. it is made as a tool to understand how hackers can create their tools and performe their attacks. it contains most of known attacks and exploits.

Monkah

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 8 Guest(s)