0 0
Read Time:2 Minute, 49 Second

English version :

This documentation is for people who wish to participate in OpIran with us. We DO NOT FORCE ANYONE to do anything that they do not want to do.


This is ILLEGAL and we do NOT want the civilians of any kind to get in trouble on our behalf, if you don’t want to participate please void this and hear our precautions!

  • 1 ) Anonymity is key! –
  • 2 ) Arm yourself decent! –
  • 3 ) These tools are for protesting! –

– 4 ) Everyone has a voice!

What OS you should prepare yourself with :

Parrot OS – https://www.parrotsec.org/ (Its equipped with alot of tools various of hackers use.)

Kali Linux – https://www.kali.org/ (Most common linux destro up to date used by most of the hacking community)

Tails OS – https://tails.boum.org/install/download/ (portable operating system that protects against surveillance and censorship.)

Qubes OS – https://www.qubes-os.org/downloads/ (If you like security we recommend this OS)
Virtual Machines :
Oracle & VMware can be used to run your preferable OS https://www.virtualbox.org/ >(Oracle)
https://www.vmware.com/ >(VMware)

Anonymity :
ALWAYS EQUIP YOURSELF WITH A VPN / (and or) proxy!

Tools :

Tool SQLmap – https://sqlmap.org/ ( sqlmap is an open source penetration testing tool that automates the process-
of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying-
file system and executing commands on the operating system via out-of-band connections.)

Acunetix – https://www.acunetix.com/ (A vulnerability scanner to find root problems like XSS / LFI / Shell injection, and SQL injection depending on the sites core..
if you don’t want to purchase there is also cracked versions roaming around – I wont supply due to if it causes damage and I dont want to put ANYONE at risk.)

If you want to help target government servers without in depth hacking we have a easy solution for you, and that’s DDoS attacks. Please install the requirements to help aid you on your way.

Python2.7 & Python3 Helps a lot > https://www.python.org/ (Download link) some scripts will ask you to install modules which you can easily “pip install (nodule name)

We also have a module the team has worked on called ‘Bane’ ( pip install bane ) itll install the scripts and files needed to run the functions.

Here are some scripts that can help you DDoS and we ask you please don’t be mischievous with these tools ONLY for iran protesters.

Torshammer : https://github.com/dotfighter/torshammer
SlowLoris : https://github.com/gkbrk/slowloris
Proxy DDoS : https://github.com/Leeon123/CC-attack
TCP – UDP flooder : https://github.com/Leeon123/TCP-UDP-Flood

Application DDoS for noobies :
https://github.com/proactiveRISK/switchblade
http://www.mediafire.com/file/6d9qkv58qe7cmg7/SwitchBlade4.0.zip (4.0 by OWASP)
http://www.mediafire.com/file/npxbtsv3vt8wssj/HttpDosTool.zip (HTTP Post/DoS tool)

Other ‘how to’
https://www.geeksforgeeks.org/how-to-install-kalitorify-tool-in-kali-linux/ (routing entire traffic with tor)
https://github.com/brainfucksec/kalitorify

whonix for routing entire traffic of a vm (virtual machine)

Shout-out : YourAnonS0u1 YourAnonSpider KromSec AXenocrates Neferian and All New Anonymous members that joined the fight with OpIran and you! <3

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence