- by x32x01 ||
π¨βπ» If you're into hacking, bug bounty, or cybersecurity, mastering terminal/CLI commands is π essential. Here's a powerful collection of Hacker Pro Commands with usage & examples!
π Owner info, domain age, name servers, etc.
π Get domainβs IP address.
π§ Resolve DNS records.
π΅οΈ Find subdomains (Install subfinder first)
π Scan for open ports, services, versions, and use default scripts.
β‘ Fast port scanning (be careful, can be noisy).
π‘οΈ Scan for basic web vulnerabilities.
π Auto detect & exploit SQL injection.
π Find hidden directories/files.
π Another powerful brute-forcer.
π§ͺ Intercept & modify HTTP/HTTPS traffic.
mitmproxy
πΈοΈ Man-in-the-middle proxy for deep traffic inspection.
π£ Launch Metasploit Framework β 1000s of exploits.
searchsploit wordpress
π Search for public exploits in Exploit-DB.
π Check open ports.
π‘ Sniff network packets.
htop
π Monitor system performance in real-time.
---
π Base64 encode.
π Generate MD5 hash.
πΎ Convert binary to hex.
π Search for config files (often contain secrets).
π Search for passwords inside PHP files.
β οΈ Important Note
π These commands are for educational & authorized testing only.
π« Never use them on unauthorized systems.
π§ 1. Recon Commands (Information Gathering)
π Collect information about target websites/networks.whois example.comπ Owner info, domain age, name servers, etc.
dig example.com +shortπ Get domainβs IP address.
nslookup example.comπ§ Resolve DNS records.
subfinder -d example.comπ΅οΈ Find subdomains (Install subfinder first)
π οΈ 2. Port Scanning & Service Detection
nmap -sC -sV -T4 -Pn example.comπ Scan for open ports, services, versions, and use default scripts.
masscan -p1-65535 192.168.1.0/24 --rate=1000β‘ Fast port scanning (be careful, can be noisy).
π 3. Web Vulnerability Scanning
nikto -h http://example.comπ‘οΈ Scan for basic web vulnerabilities.
sqlmap -u "http://example.com/index.php?id=1" --batchπ Auto detect & exploit SQL injection.
π 4. File & Directory Bruteforcing
ffuf -u https://example.com/FUZZ -w /usr/share/wordlists/dirb/common.txtπ Find hidden directories/files.
gobuster dir -u http://example.com -w /usr/share/wordlists/dirbuster/directory-list-2.3-small.txtπ Another powerful brute-forcer.
π οΈ 5. Intercept & Modify Requests
burpsuiteπ§ͺ Intercept & modify HTTP/HTTPS traffic.
mitmproxy
πΈοΈ Man-in-the-middle proxy for deep traffic inspection.
π― 6. Exploitation Frameworks
msfconsoleπ£ Launch Metasploit Framework β 1000s of exploits.
searchsploit wordpress
π Search for public exploits in Exploit-DB.
π‘οΈ 7. System & Network Monitoring
netstat -tulnπ Check open ports.
tcpdump -i eth0π‘ Sniff network packets.
htop
π Monitor system performance in real-time.
---
π§° 8. Encoding, Hashing & Conversion
echo -n "admin" | base64π Base64 encode.
echo -n "admin" | md5sumπ Generate MD5 hash.
xxd -p input.binπΎ Convert binary to hex.
π 9. Useful Linux One-Liners for Hackers
find / -name "*.conf" 2>/dev/nullπ Search for config files (often contain secrets).
grep -i "password" /var/www/html/*.phpπ Search for passwords inside PHP files.
β οΈ Important Note
π These commands are for educational & authorized testing only.
π« Never use them on unauthorized systems.