Skip to content
Nginx L7 DDoS Protection! And many more features 💥 ⚡️
Branch: master
Clone or download
Latest commit d20c1b9 Jul 11, 2019
Type Name Latest commit message Commit time
Failed to load latest commit information.
.github Create FUNDING.yml May 23, 2019
ArchLinux Update install Jun 4, 2019
UBUNTU14 Update whitelist-ips.conf Jan 6, 2018
UBUNTU16 Update nginx.service May 27, 2018
iptables Update rules May 3, 2019
static Update sysctl.conf Jul 11, 2019 Update Jul 11, 2019
config Update config Dec 1, 2017
install Update install Jun 2, 2019

Nginx L7 DDoS Protection! 💥 ⚡️

(Please Read Whole Page, All Things Are Important Then If You Want You Can Use IT.)

This is it!

There will be no other version of this PR, This is the only and one and the best that you can find for free where you can see/do/change anything on your will and not some encrypted piece of code! This is pure open source code as you can open any file and read anything, This script automatically compiles nginx from source with lots of modules helpful but mostly who play a big role in L7 Anti-DDoS, including the L7 nginx module which you can configure as simple as more then that consider a Donate and you can contact me for further support!

Summer is here, after that i may be working and i don't see having much of free time to play with nginx!


  • Nginx Version, Always Latest.
  • Support Ubuntu Trusty. (14.04)
  • Support Ubuntu Xenial. (16.04)
  • Support Ubuntu Cosmic. (18.10)
  • Support Arch Linux.
  • ModSecurity Support.
  • Naxsi Support.
  • L7 Protection.
  • AutoBan System.
  • Integrate Fail2Ban > IpTables.


  1. apt-get install build-essential libssl-dev curl nano wget zip unzip sudo git psmisc -y

  2. git clone

  3. cd The-World-Is-Yours/; chmod +x *

  4. ./install


What if installation script fails? - Check what was the problem source fix it (mostly should be for missing packages) then remove everything under /opt/ folder and just execute again ./install

=> /nginx/                                = Nginx Path,
=> /nginx/live/                           = Vhosts Config Files Dir,
=> /nginx/logs/                           = Core Logs Files,
=> /nginx/modsecurity/                    = ModSecurity Rules Dir,
=> /hostdata/                             = Place to store your domain folders.
=> /hostdata/              = Ex of domain dir (private folder),
=> /hostdata/  = Ex of your domain webroot (public files only),
=> /hostdata/         = Place where to store your Domains logs (access.log) (private folder),
=> /hostdata/          = Place where to store domain ssl/key (private folder),
=> /hostdata/        = Place where to store site cache (private folder).

// Private Folder - Means this cannot be accessed by public.
// Public Folder  - Means files into this folder can be accessed by public.


1 . L7 (Cookie Based Protection) AND Replace "proxy2.dope.. links with yours click here to find aes which should be stored on a external link or in a place where L7 is disabled because it will not work if you put it in main site dir!.

2 . Auto Ban System based on Connection for ip

3 . Auto Ban 444 Reqs A day i've been under attack of multiple proxies, and even after they got banned they still was keep trying the same thing so when you ban someone when that ip tries to access your website that request will not go on error.log but in access.log so i created this rule to ban with iptables every request who have stauts 444 so nginx will not have to handle those.

4 . Kernel Settings

5 . Naxsi Rules Included

6 . Example of Naxsi

7 . Check Iptables rules It will not be automatically enabled, because this changes based on providers in ovh it work in azure it doesn't work. so you need to manually activate iptables!

8 . ModSecurity is not loaded. However you need to set it up by yourself. you have a folder /nginx/modsecurity/ which ModSecurity rules are stored, open /nginx/modsecurity/modsecurity.conf add those

Include crs-setup.conf
Include rules/*.conf

ModSecurity is by default enabled as "detect only" you can turn it on always by doing this

SecRuleEngine On

Using modSecurity for your site

server { 
        modsecurity on;
        modsecurity_rules_file /nginx/modsecurity/modsecurity.conf; 
        location / { 

Careful Using modsec rules like

   location / { 
       modsecurity_rules_file /nginx/modsecurity/modsecurity.conf; 

it means that's enabled just for your main place / not for other dirs in your site ex /admin/ (:

Test it! curl 'http://localhost/?q="><script>wanna hack</script>'

<head><title>403 Forbidden</title></head>
<body bgcolor="white">
<center><h1>403 Forbidden</h1></center>

Keep In Mind.

The L7 Protection is the same way which cloudflare have that banner "Under Attack" A.K.A Cookie based authorization. Most of bots from where attacks will come doesn't support cookies so it will fail to access your site. (Test it by yourself to "curl" before you activate L7 and after you start L7 so you will understand better.)

The L7 protection is a good thing for your protection. But a very bad thing for your website seo!, As facebook/google/bing and all search engines will not be able to access your website anymore. There is a way to allow them but if you have 1 year free time to find all their ips go and try it. I've been thinking for a "reverse dns" whitelist but haven't done it so as of now it is like this.


Feel free to pull request or do a suggestion..

You can’t perform that action at this time.