MHDDoS/README.md
_MRZT721010_ 74a6d0ca4a
Some checks failed
CodeQL / Analyze (python) (push) Has been cancelled
Docker Image CI / push_image (push) Has been cancelled
Update README.md
2024-09-11 23:50:35 +03:30

11 KiB

ddos

MHDDoS - DDoS Attack Script With 56 Methods

(Programming Language - Python 3)

MH-DDoS forks MH-DDoS last commit (main) MH-DDoS Repo stars MH-DDoS License MatrixTM issues

Please Don't Attack websites without the owners consent.

POWER

SCRIPT

Features And Methods

  • 💣 Layer7

    • get GET | GET Flood
    • post POST | POST Flood
    • ovh OVH | Bypass OVH
    • ovh RHEX | Random HEX
    • ovh STOMP | Bypass chk_captcha
    • stress STRESS | Send HTTP Packet With High Byte
    • dyn DYN | A New Method With Random SubDomain
    • downloader DOWNLOADER | A New Method of Reading data slowly
    • slow SLOW | Slowloris Old Method of DDoS
    • head HEAD | https://developer.mozilla.org/en-US/docs/Web/HTTP/Methods/HEAD
    • null NULL | Null UserAgent and ...
    • cookie COOKIE | Random Cookie PHP 'if (isset($_COOKIE))'
    • pps PPS | Only 'GET / HTTP/1.1\r\n\r\n'
    • even EVEN | GET Method with more header
    • googleshield GSB | Google Project Shield Bypass
    • DDoSGuard DGB | DDoS Guard Bypass
    • ArvanCloud AVB | Arvan Cloud Bypass
    • Google bot BOT | Like Google bot
    • Apache Webserver APACHE | Apache Expliot
    • wordpress expliot XMLRPC | WP XMLRPC exploit (add /xmlrpc.php)
    • CloudFlare CFB | CloudFlare Bypass
    • CloudFlare UnderAttack Mode CFBUAM | CloudFlare Under Attack Mode Bypass
    • bypass BYPASS | Bypass Normal AntiDDoS
    • bypass BOMB | Bypass with codesenberg/bombardier
    • 🔪 KILLER | Run many threads to kill a target
    • 🧅 TOR | Bypass onion website
  • 🧨 Layer4:

    • tcp TCP | TCP Flood Bypass
    • udp UDP | UDP Flood Bypass
    • syn SYN | SYN Flood
    • cps CPS | Open and close connections with proxy
    • icmp ICMP | Icmp echo request flood (Layer3)
    • connection CONNECTION | Open connection alive with proxy
    • vse VSE | Send Valve Source Engine Protocol
    • teamspeak 3 TS3 | Send Teamspeak 3 Status Ping Protocol
    • fivem FIVEM | Send FiveM Status Ping Protocol
    • mem MEM | Memcached Amplification
    • ntp NTP | NTP Amplification
    • mcbot MCBOT | Minecraft Bot Attack
    • minecraft MINECRAFT | Minecraft Status Ping Protocol
    • minecraft pe MCPE | Minecraft PE Status Ping Protocol
    • dns DNS | DNS Amplification
    • chargen CHAR | Chargen Amplification
    • cldap CLDAP | Cldap Amplification
    • ard ARD | Apple Remote Desktop Amplification
    • rdp RDP | Remote Desktop Protocol Amplification
  • ⚙️ Tools - Runs With python3 start.py tools

    • 🌟 CFIP | Find Real IP Address Of Websites Powered By Cloudflare
    • 🔪 DNS | Show DNS Records Of Sites
    • 📍 TSSRV | TeamSpeak SRV Resolver
    • ⚠ PING | PING Servers
    • 📌 CHECK | Check If Websites Status
    • 😎 DSTAT | That Shows Bytes Received, bytes Sent and their amount
  • 🎩 Other

    • STOP | STOP All Attacks
    • 🌠 TOOLS | Console Tools
    • 👑 HELP | Show Usage Script

Our social's💻

Please do not use the "Issues" section to ask your questions!

discord telegram

If u Like the project, leave a star on the repository!

Downloads

You can download it from GitHub Releases

Getting Started

Requirements


Documentation

You can read it from GitHub Wiki

Clone and Install Script

git clone https://github.com/MatrixTM/MHDDoS.git
cd MHDDoS
pip install -r requirements.txt

One-Line Installing on Fresh VPS

apt -y update && apt -y install curl wget libcurl4 libssl-dev python3 python3-pip make cmake automake autoconf m4 build-essential git && git clone https://github.com/MatrixTM/MHDDoS.git && cd MH* && pip3 install -r requirements.txt

Need a Cheap Hourly Server? No Problem

aeza

You can buy an hourly 10Gbps server from Aeza Hosting with crypto (100% anonymous).