All Projects → wodxgod → Griefing Methods

wodxgod / Griefing Methods

A documentation about how to hack Minecraft servers

Projects that are alternatives of or similar to Griefing Methods

Awesome Bbht
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (+150%)
Mutual labels:  hacking, exploitation
Badmod
CMS auto detect and exploit.
Stars: ✭ 296 (+289.47%)
Mutual labels:  hacking, exploitation
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (+1731.58%)
Mutual labels:  hacking, exploitation
Ssrf vulnerable lab
This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Stars: ✭ 361 (+375%)
Mutual labels:  hacking, exploitation
Xattacker
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+1080.26%)
Mutual labels:  hacking, exploitation
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+1044.74%)
Mutual labels:  hacking, exploitation
Fdsploit
File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (+161.84%)
Mutual labels:  hacking, exploitation
Attifyos
Attify OS - Distro for pentesting IoT devices
Stars: ✭ 615 (+709.21%)
Mutual labels:  hacking, exploitation
Hacker Roadmap
📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+10100%)
Mutual labels:  hacking, exploitation
Awesome Ethical Hacking Resources
🔗 All the resources I could find for learning Ethical Hacking and Penetration Testing.
Stars: ✭ 933 (+1127.63%)
Mutual labels:  hacking, exploitation
Vulnx
vulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+1227.63%)
Mutual labels:  hacking, exploitation
Ares
Ares is a free, open source minecraft utility mod aimed at anarchy servers. Created by Tigermouthbear.
Stars: ✭ 73 (-3.95%)
Mutual labels:  minecraft
Baf
Blind Attacking Framework
Stars: ✭ 71 (-6.58%)
Mutual labels:  exploitation
Chaos
🔥 CHAOS is a Remote Administration Tool that allow generate binaries to control remote operating systems.
Stars: ✭ 1,168 (+1436.84%)
Mutual labels:  hacking
Pwin
Security Evaluation of Dynamic Binary Instrumentation Engines
Stars: ✭ 70 (-7.89%)
Mutual labels:  exploitation
Movies For Hackers
🎬 A curated list of movies every hacker & cyberpunk must watch.
Stars: ✭ 8,884 (+11589.47%)
Mutual labels:  hacking
Flexiblelogin
A Sponge minecraft server plugin for second factor authentication
Stars: ✭ 73 (-3.95%)
Mutual labels:  minecraft
Netmap.js
Fast browser-based network discovery module
Stars: ✭ 70 (-7.89%)
Mutual labels:  hacking
Exploits
Miscellaneous exploit code
Stars: ✭ 1,157 (+1422.37%)
Mutual labels:  hacking
The Midnight
The Midnight: A cold, unforgiving hostile dimension. Originally made for SpookyJam 2018.
Stars: ✭ 68 (-10.53%)
Mutual labels:  minecraft

Minecraft Server Discovery And Griefing Methods

(DONT DOWNLOAD, JUST CLICK AND BROWSE ON THIS PAGE FOR A BETTER EXPERIENCE)

A documentation about how to destroy Minecraft servers

Introduction

How griefers get OP (operator privileges) on servers is still a myth for a lot of players, server owners and administrators. In this documentation, you'll learn everything about how to exploit, discover and grief Minecraft networks, and how it all works in details.

I've decided to write this documentation with a full explanation on how to do it, because I've seen a lot of script kiddies selling their "private" methods, where in reality, they're not private at all, nor their own methods.

Overview

  1. Methods
  2. Griefing Process Example

There are other ways to gain access to a server. E.g. by bruteforcing or hacking into the back-end server through different vulnerabilities. These methods are more advanced and requires knowledge in hacking and exploitation, and will therefore not be added to this documentation, as this documentation is aimed at Minecraft servers only.

Am I missing anything? Please report it here

Author

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].