https://www.kitploit.com//2018/07/devploit-v36-information-gathering-tool.html
https://github.com/joker25000/Devploit
DNS Lookup
Whois Lookup
GeoIP Lookup
Subnet Lookup
Port Scanner
Extract Links
Zone Transfer
HTTP Header
Host Finder
Robots.txt
IP-Locator
Traceroute
Host DNS Finder
Revrse IP Lookup
Collection Email
Subdomain Finder Attribuzione audio NCS (NoCopyrightSounds) https://www.youtube.com/channel/UC_aEa8K-EOJ3D6gOs7HcyNg
...
https://www.youtube.com/watch?v=CPLhxxGnFew
1) Ifconfig is used to configure the kernel-resident network interfaces.
2)Iwconfig is similar to ifconfig(8), but is dedicated to the wireless interfaces. It is used to set the parameters of the network interfacewhich are specific to the wireless operation (for example : the frequency). Iwconfig may also be used to display those parameters, and the wireless statistics (extracted from /proc/net/wireless).
3)traceroute tracks the route packets taken from an IP network on their way to a given host. It utilizes the IP protocol's time to live (TTL)field and attempts to elicit an ICMP TIME_EXCEEDED response from each gateway along the path to the host.
4)ping uses the ICMP protocol's mandatory ECHO_REQUEST datagram to elicit an ICMP ECHO_RESPONSE from a host or gateway. ECHO_REQUEST
datagrams (“pings”) have an IP and ICMP header, followed by a struct timeval and then an arbitrary number of “pad” bytes used to fill out the packet.
ping works with both IPv4 and IPv6. Using only one of them explicitly can be enforced by specifying -4 or -6.
ping can also send IPv6 Node Information Queries (RFC4620). Intermediate hops may not be allowed, because IPv6 source routing was deprecated (RFC5095).
5)Route manipulates the kernel's IP routing tables. Its primary use is to set up static routes to specific hosts or networks via an inter‐face after it has been configured with the ifconfig(8) program.When the add or del options are used, route modifies the routing tables. Without these options, route displays the current contents of the routing tables.
File /etc/resolve:
The /etc/resolv.conf is resolver configuration file for Linux and UNIX like operating systems.
It is used to configure dns name servers.
The file /etc/resolv.conf file contains information that is read by the resolver routines the first time they are invoked by a process.
The file is designed to be human readable and contains a list of keywords with values that provide various types of resolver information.
You need to update this file with your own caching dns server or ISPs caching dns server that you want to use the resolver should query.
You can view this file with cat command itself:
cat /etc/resolv.conf
https://bash.cyberciti.biz/guide//etc/resolv.conf
Sound Ncs Channel https://www.youtube.com/watch?v=pZzSq8WfsKo
...
https://www.youtube.com/watch?v=sVsyZwfKu20
https://github.com/al0ne/Vxscan/blob/master/README.md
Python3 comprehensive scanning tool, mainly used for sensitive file detection (directory scanning and js leak interface), WAF/CDN identification, port scanning, fingerprint/service identification, operating system identification, weak password detection, POC scanning, SQL injection, winding Pass CDN, check the next station
Usage
python3 Vxscan.py -h
optional arguments:
-h, --help show this help message and exit
-u URL, --url URL Start scanning this url -u xxx.com
-i INET, --inet INET cidr eg. 1.1.1.1 or 1.1.1.0/24
-f FILE, --file FILE read the url from the file
...
https://www.youtube.com/watch?v=pceppJBgrlM
https://github.com/sameera-madushan/InstaSave
InstaSave is a python script to download images, videos & profile pictures from Instagram without any API access.
Git Installation
# clone the repo
$ git clone https://github.com/sameera-madushan/InstaSave.git
# change the working directory to InstaSave
$ cd InstaSave
# install the requirements
$ pip3 install -r requirements.txt
Usage
python instasave.py
For your Attention
If you are downloading copyrighted content you should respect author's rights and use the content either for personal purposes or for non-commercial needs with proper mention and authorisation from the author.
Disclamer:
All information contained in this site and all software provided by it are intended solely for the purpose of helping users to secure their online privacy from eventual cyberattacks. Such information and software do NOT constitute professional advice/services, are indicative and provided for educational use only. The site does not guarantee their accuracy or completeness. The use of such information and software for any purpose other than the abovementioned is strictly forbidden. The site and/or the site’s owner(s) hold no responsibility for any misuse of the above by third parties and reserve their rights to ban the access of users or take any legal action against users, should any misuse be noticed.
...
https://www.youtube.com/watch?v=dWx2Vgq__J8
Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
...
https://www.youtube.com/watch?v=fA6Q3OTGd6I