Skip to content

Files

Latest commit

 

History

History

Ddos-http-layer-7-using-python-master

Ddos-http-layer-7-using-python

Bypass 503 clodflare and launch attack from different elastic public ip's there is two method

before follow this instructions https://github.com/Anorov/cloudflare-scrape

AMI Linux user

sudo yum update
sudo yum install python
sudo easy_install pip
sudo pip install cfscrape
sudo pip install requests_toolbelt
curl -o- https://raw.githubusercontent.com/creationix/nvm/v0.32.0/install.sh | bash
. ~/.nvm/nvm.sh
nvm install 4.4.5
node -v
vi thread.txt (save as empty)

ubuntu user

sudo apt-get update
sudo apt-get install python
sudo apt-get install python-pip
pip install cfscrape
apt-get install nodejs
pip install requests_toolbelt
vi thread.txt (empty)

method 1

usage :
python tr503_alternative.py <first-private-ip-of-n/w-interface>
example : python tr503_alternative.py 172.31.42.22 30 100

method 2

usage :
mkdir session

if the site is not under dos attack mode (503 checking your browser before accessing site)
python tr200.py "first-private-ip-of-n/w-interface" "how-much-ip"

After 503
python scraper503.py "first-private-ip-of-n/w-interface" "how-much-ip" "char"
python tr503.py "first-private-ip-of-n/w-interface" 'how-much-ip"

To increase thread level at Runtime
change the values in thread.txt to increase threads