MXDDoS – DDoS Attack Script With 40 Methods
(Code Lang – Python 3)
Please Don’t Attack ‘.gov’ and ‘.ir’ Websites ?
Features And Methods
-
? Layer7
GET | GET Flood
POST | POST Flood
OVH | Bypass OVH
STRESS | Send HTTP Packet With High Byte
DYN | A New Method With Random SubDomain
SLOW | Slowloris Old Method of DDoS
HEAD | https://developer.mozilla.org/en-US/docs/Web/HTTP/Methods/HEAD
NULL | Null UserAgent and …
COOKIE | Random Cookie PHP ‘if (isset($_COOKIE))’
PPS | Only ‘GET / HTTP/1.1\r\n\r\n’
EVEN | GET Method with more header
GSB | Google Project Shield Bypass
DGB | DDoS Guard Bypass
AVB | Arvan Cloud Bypass
BOT | Like Google bot
APACHE | Apache Expliot
XMLRPC | WP XMLRPC expliot (add /xmlrpc.php)
CFB | CloudFlare Bypass
CFBUAM | CloudFlare Under Attack Mode Bypass
BYPASS | Bypass Normal AntiDDoS
-
? Layer4:
TCP | TCP Flood Bypass
UDP | UDP Flood Bypass
SYN | SYN Flood
VSE | Send VSE Protocol
MEM | Memcached Amplification
NTP | NTP Amplification
MINECRAFT | Minecraft Status Ping Protocol
DNS | DNS Amplification
CHAR | Chargen Amplification
ARD | Apple Remote Desktop Amplification
RDP | Remote Desktop Protocol Amplification
-
⚙️ Tools – Run With ‘python3 start.py tools’
- ? CFIP | Find Real IP Address Of Websites Powered By Cloudflare
- ? DNS | Show DNS Records Of Sites
- ⚠ PING | PING Servers
- ? CHECK | Check If Websites Status
- ? DSTAT | That Shows Bytes Received, bytes Sent and their amount
-
? Other
- ❌ STOP | STOP All Attacks
- ? TOOLS | Console Tools
- ? HELP | Show Usage Script
Issues ?
- Discord : Эрик#0372 && NULL#2245
- GitHub
Like the project? Leave a star on the repository!
Downloads
You can download it from GitHub Releases
Getting Started
Requirements
Videos
- YouTube : Coming soon…
Toturial
- YouTube : Coming soon…
Clone and Install Script
git clone https://github.com/XEricDev/MXDDoS.git
cd MXDDoS
pip3 install -r requirements.txt
Launch Script
Proxy Type | Value |
---|---|
All Proxy | 0 |
HTTP | 1 |
SOCKS4 | 4 |
SOCKS5 | 5 |
- Layer7 (Website):
python3 start.py bypass https://example.com 5 1000 socks5.txt 100 100
- Layer4 (Server/Home):
python3 start.py udp 1.1.1.1:53 1 100
python3 start.py dns 1.1.1.1:53 1 100 dns.txt
- Debug Mode (L4/L7):
python3 start.py bypass https://example.com 5 1000 socks5.txt 100 100 true
python3 start.py udp 1.1.1.1:53 1 100 true
- Tools/Help:
python3 start.py tools
python3 start.py help