Jin is a hacking command-line tools designed to make your scan port, gathering urls, check vulnerability and sending DDOS attack to your target. This tools is made for ethical and education purpose. I recommend you not to use this tools for harmfull action.
-
scan: This tool scans a target host for open ports, providing valuable information for network analysis and troubleshooting.
-
atk: This command is used to send DDOS target to target.
-
version: This command will show the current version of this cli tool.
-
map: Mapping and gathering the related urls in the target website.
- Clone the repository:
git clone https://github.com/aliftech/jin.git
Use code with caution
- Navigate to the project directory:
cd jin
- Create Virtual env
py -m venv env
.\env\Scripts\activate
- Install dependencies:
pip install -r requirements.txt
- Run the script with the desired command:
python main.py <command> [options]
- Replace with the specific tool you want to use.
The port scanning is used to scanning the open port of the targeted website. This function is called using the following command:
python main.py scan example.com
-
The
example.com
above mean the targeted website domain. -
Naming a log file
When you running both scan or map command, the system will automaticly store your scanning or mapping result into a log file. The filename automaticly generate by system, but now, you can naming the log file by yourself.
scan example.com -wl example_test_scan
The command above will generate a log file name
scan_example_test_scan.json
. The-wl
parameter is used to renamed the logs file from the default name generate by JIN into user expected name.
To launch a ddos attack to the targeted website, you can use the following command:
python main.py atk example.com -m [GET, PUT, POST] -p [payload of request] -t [number of thread (default 100)]
- The
example.com
above mean the targeted website domain. - The
80
is the port number of targeted website. To gathering information about the opening port, you need to run the port scanning function to your targeted website. [option] --threads 100
is the optional parameter, the number of threads to use for processing.
This function is designed to mapping all the related urls of the target. Here is the command to call this function:
python main.py map https://www.example.com
-
https://www.example.com
is the targeted url. -
Naming a log file
When you running both scan or map command, the system will automaticly store your scanning or mapping result into a log file. The filename automaticly generate by system, but now, you can naming the log file by yourself.
map https://www.example.com -wl example_test_map
The command above will generate a log file name
map_example_test_map.json
. The-wl
parameter is used to renamed the logs file from the default name generate by JIN into user expected name.
This function is used to manage the application logs. You can list all logs file, read, and even delete the logs file.
-
List all logs
This command is used to list all logs files.
logs -ls [scan || map]
If you set scan as the param -ls value, the application will shows you all of the scanning logs files. Meanwhile, if you input map as the -ls value, it will return all mapping logs files.
-
Read logs file
This command is used to read the log content.
logs -r filename.json
-
Delete a single los file
This command is used to delete a single log file.
logs -rm filename.json
-
Delete all logs files
This command will help you to delete all logs files.
logs -rm all
You can also running the cli app using docker by the following command:
docker compose run jin
Then, you will see the following result.
You can also build and run JIN using our existing docker image.
-
Pull our latest JIN image using the following command
docker pull wahyouka/jin
-
Run the JIN docker container using the following command.
docker run -it wahyouka/jin:latest
We encourage contributions from the community! If you have an idea for a new tool or want to improve existing ones, feel free to fork the repository and submit a pull request.
This project is licensed under the Apache 2 LICENSE. See the LICENSE file for details.
The tools provided in this project are intended for ethical and informative purposes only. Please use them responsibly and avoid any actions that could harm others or violate their privacy.