From 469ade87ab3a4cf65cffc466d37959143884977e Mon Sep 17 00:00:00 2001
From: PXEiYyMH8F <100959332+PXEiYyMH8F@users.noreply.github.com>
Date: Sat, 5 Mar 2022 17:37:42 +0000
Subject: [PATCH] Update README.md
---
README.md | 20 ++++++++++++++++++--
1 file changed, 18 insertions(+), 2 deletions(-)
diff --git a/README.md b/README.md
index 517493e..2181ebf 100644
--- a/README.md
+++ b/README.md
@@ -39,6 +39,7 @@
* CFB | CloudFlare Bypass
* CFBUAM | CloudFlare Under Attack Mode Bypass
* BYPASS | Bypass Normal AntiDDoS
+ * BOMB | Bypass with codesenberg/bombardier
* 🧨 Layer4:
@@ -92,6 +93,20 @@ You can download it from [GitHub Releases](https://github.com/MHProDev/MHDDoS/re
* [dnspython](https://github.com/rthalley/dnspython)
* [yarl](https://github.com/aio-libs/yarl)
---
+Optional
+* [bombardier with proxy](github.com/mariotrucco/bombardier@78-add-proxy-support)
+
+**Bombardier with proxy installation**
+
+```shell script
+mkdir bombardier_tmp
+cd bombardier_tmp
+go mod init bombardier_tmp
+go mod edit -replace github.com/codesenberg/bombardier=github.com/mariotrucco/bombardier@78-add-proxy-support
+go get github.com/codesenberg/bombardier
+cd ..
+rm -r bombardier_tmp
+```
**Videos**
@@ -125,12 +140,13 @@ pip3 install -r requirements.txt
* Layer7 (Website):
```console
python3 start.py bypass https://example.com 5 1000 socks5.txt 100 100
+python3 start.py bomb https://example.com 5 50 socks5.txt 100 100
```
* Layer4 (Server/Home):
```console
-python3 start.py udp 1.1.1.1:53 1 100
-python3 start.py dns 1.1.1.1:53 1 100 dns.txt
+python3 start.py udp 1.1.1.1:53 1 100 socks5.txt 5
+python3 start.py dns 1.1.1.1:53 1 100 socks5.txt 5 dns.txt
```
* Debug Mode (L4/L7):