-
💣 Layer7
GET | GET Flood
POST | POST Flood
OVH | Bypass OVH
RHEX | Random HEX
STOMP | Bypass chk_captcha
STRESS | Send HTTP Packet With High Byte
DYN | A New Method With Random SubDomain
DOWNLOADER | A New Method of Reading data slowly
SLOW | Slowloris Old Method of DDoS
HEAD | https://developer.mozilla.org/en-US/docs/Web/HTTP/Methods/HEAD
NULL | Null UserAgent and ...
COOKIE | Random Cookie PHP 'if (isset($_COOKIE))'
PPS | Only 'GET / HTTP/1.1\r\n\r\n'
EVEN | GET Method with more header
GSB | Google Project Shield Bypass
DGB | DDoS Guard Bypass
AVB | Arvan Cloud Bypass
BOT | Like Google bot
APACHE | Apache Expliot
XMLRPC | WP XMLRPC exploit (add /xmlrpc.php)
CFB | CloudFlare Bypass
CFBUAM | CloudFlare Under Attack Mode Bypass
BYPASS | Bypass Normal AntiDDoS
BOMB | Bypass with codesenberg/bombardier
- 🔪 KILLER | Run many threads to kill a target
- 🧅 TOR | Bypass onion website
-
🧨 Layer4:
TCP | TCP Flood Bypass
UDP | UDP Flood Bypass
SYN | SYN Flood
CPS | Open and close connections with proxy
ICMP | Icmp echo request flood (Layer3)
CONNECTION | Open connection alive with proxy
VSE | Send Valve Source Engine Protocol
TS3 | Send Teamspeak 3 Status Ping Protocol
FIVEM | Send FiveM Status Ping Protocol
MEM | Memcached Amplification
NTP | NTP Amplification
MCBOT | Minecraft Bot Attack
MINECRAFT | Minecraft Status Ping Protocol
MCPE | Minecraft PE Status Ping Protocol
DNS | DNS Amplification
CHAR | Chargen Amplification
CLDAP | Cldap Amplification
ARD | Apple Remote Desktop Amplification
RDP | Remote Desktop Protocol Amplification
-
⚙️ 工具 - 运行方式
python3 start.py 工具
- 🌟CFIP | 查找由 Cloudflare 提供支持的网站的真实 IP 地址
- 🔪 DNS | 显示站点的 DNS 记录
- 📍TSSRV | TeamSpeak SRV 解析器
- ⚠PING | PING 服务器
- 📌CHECK | 检查网站状态 *😎DSTAT | 显示接收的字节数、发送的字节数及其数量
-
🎩 其他 *❌STOP| 停止所有攻击
- 🌠 TOOLS | 控制台工具
- 👑 HELP | 显示使用脚本
克隆并安装脚本
wget https://github.com/a12cn/ddos/archive/refs/heads/main.zip
unzip main.zip
cd ddos-main
pip install -r requirements.txt