Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Command Guide (MCPTool)
Command Guide (MCPTool)
💻 Command: server
Description:
🇱🇷 Shows information of the entered server. (IP, MOTD,
Version, Protocol, Number of Players, Mods)
How to use:
server <ip:port/domain>
Example:
server mc.universocraft.com
Screenshots:
💻 Command: player
Description:
🇱🇷 Shows information of the entered user. (premium UUID
and non-premium UUID)
How to use:
player <username>
Example:
player wRRulos
Screenshots:
💻 Command: ip
Description:
🇱🇷 Shows the IP address of the specified domain.
🇦🇷 Muestra la dirección IP del dominio especificado.
How to use:
ip <domain>
Example:
ip mc.universocraft.com
Screenshot:
💻 Command: ipinfo
Description:
🇱🇷 Shows information of the specified ip address.
🇦🇷 Muestra información de la dirección IP especificada.
How to use:
ipinfo <ip>
Example:
ipinfo 51.79.106.228
Screenshot:
💻 Command: search
Description:
🇱🇷 Find servers that contain the specified data.
You can add more data separating it with ' --- ' (including
space)
How to use:
search <data>
Examples:
search Spigot 1.8.8
search Spigot 1.8.8 --- Lobby
Screenshots:
💻 Command: scan
Description:
🇱🇷 Scan the ports of an IP address using different types
of scanners. (You can also scan a file containing a list of
IP addresses) Also, you can send a bot to check if the
server is reachable. (This bot can use socks5 proxy to
connect) The proxy thing is optional.
How to use:
scan <ip/file> <ports> <method> <checker: y/n> [<proxy>]
Examples:
scan 127.0.0.1 25560-25570 0 y
scan 127.0.0.1 25560-25570 0 y 164.60.26.2:7472
Screenshots:
💻 Command: host
Description:
🇱🇷 Scan the nodes of a host using different types of
scanners. Also, you can send a bot to check if the server is
reachable. (This bot can use socks5 proxy to connect) The
proxy thing is optional.
How to use:
host <host> <ports> <method> <checker: y/n> [<proxy>]
Example:
host vultam 25560-25570 0 y
Screenshot:
💻 Command: checker
Description:
🇱🇷 Check if servers found in a file can be accessed. Also,
you can send a bot to check if the server is reachable.
(This bot can use socks5 proxy to connect) The proxy
thing is optional.
How to use:
checker <file> <checker: y/n> [<proxy>]
Example:
checker file.txt y
Screenshot:
💻 Command: listening
Description:
🇱🇷 Listen for names coming into the server. (Ideal to
know who has access to the whitelist)
How to use:
listening <ip:port/domain>
Example:
listening 127.0.0.1:25565
Screenshot:
💻 Command: bungee
Description:
🇱🇷 Start a proxy server that redirects to the specified
server.
How to use:
bungee <ip:port/domain>
Example:
bungee 127.0.0.1:25565
Screenshot:
💻 Command: poisoning
Description:
🇱🇷 Start a proxy server that redirects to the specified
server and captures the commands that are sent within it.
How to use:
poisoning <ip:port/domain>
Example:
poisoning mc.universocraft.com
Screenshots:
💻 Command: rcon
Description:
🇱🇷 Initiate a brute force attack to access the console. (via
RCON).
How to use:
rcon <ip:rcon-port> <file>
Example:
rcon 127.0.0.1:25575 passwords/test.txt
Screenshots:
💻 Command: auth
Description:
🇱🇷 Initiate a brute force attack to access the user's
account. (via /login).
How to use:
auth <ip:port> <file>
IMPORTANT!:
🇱🇷The attack works this way:
🇱🇷 The bot will try to log in every time it reads one of the
previous messages. But how does the bot detect when the
password is correct?
Easy. When the bot reads one of the words found in the
configuration file, it means that the password entered
was correct and will be displayed on the screen.
Screenshots:
💻 Command: connect
Description:
🇱🇷 Connect to the server through a bot. (This bot can use
socks5 proxy to connect) The proxy thing is optional.
How to use:
connect <ip:port> <username> [<proxy>]
Example:
connect 127.0.0.1:25565 wRRulos
connect 127.0.0.1:25565 wRRulos 164.60.26.2:7472
Screenshot:
💻 Command: rconnect
Description:
🇱🇷 Connect to the server through RCON.
🇦🇷 Conéctese al servidor a través de RCON.
How to use:
rconnect <ip:rcon-port> <password>
Example:
rconnect 127.0.0.1:25575 password
Screenshot:
💻 Command: kick
Description:
🇱🇷 Kick a player from the server. (This bot can use socks5
proxy to connect) The proxy thing is optional.
How to use:
kick <ip:port> <name> [<proxy>]
Example:
kick 127.0.0.1:25565 wRRulos
kick 127.0.0.1:25565 wRRulos 164.60.26.2:7472
Screenshot:
💻 Command: kickall
Description:
🇱🇷 Kick all players from the server. (This bot can use
socks5 proxy to connect) The proxy thing is optional.
How to use:
kickall <ip:port> [<proxy>]
Example:
kickall 127.0.0.1:25565
kickall 127.0.0.1:25565 164.60.26.2:7472
Screenshot:
💻 Command: block
Description:
🇱🇷 Kick a player off the server without stopping. (Infinite
loop) (This bot can use socks5 proxy to connect) The
proxy thing is optional.
How to use:
block <ip:port> <name> [<proxy>]
Example:
block 127.0.0.1:25565 wRRulos
block 127.0.0.1:25565 wRRulos 164.60.26.2:7472
Screenshot: