DOCUMENTS MHDDoS - DDoS Attack
by n3od4y - 16-08-24, 09:04 PM
DarkForums Members
Posts
1
Threads
0
Joined
Jan 2026
4 days
DarkForums Members
Posts
29
Threads
0
Joined
Nov 2025
2 Months
nice dude
Β I like my keyboard machineΒ Β
DarkForums Members
Posts
18
Threads
0
Joined
Aug 2025
5 Months
DarkForums Members
Posts
3
Threads
0
Joined
Nov 2025
2 Months
(16-08-24, 09:04 PM)n3od4y Wrote: ![[Image: 68747470733a2f2f692e696d6775722e636f6d2f...6e2e706e67]](https://camo.githubusercontent.com/51e106541b8791091f35c294ce59ea63491b3d355beb4b68468c6dd4a61a27e7/68747470733a2f2f692e696d6775722e636f6d2f3451377632776e2e706e67)
Quote:Features And Methods
π£ Layer7
get GET | GET Flood
post POST | POST Flood
ovh OVH | Bypass OVH
ovh RHEX | Random HEX
ovh STOMP | Bypass chk_captcha
stress STRESS | Send HTTP Packet With High Byte
dyn DYN | A New Method With Random SubDomain
downloader DOWNLOADER | A New Method of Reading data slowly
slow SLOW | Slowloris Old Method of DDoS
head HEAD | https://developer.mozilla.org/en-US/docs...thods/HEAD
null NULL | Null UserAgent and ...
cookie COOKIE | Random Cookie PHP 'if (isset($_COOKIE))'
pps PPS | Only 'GET / HTTP/1.1\r\n\r\n'
even EVEN | GET Method with more header
googleshield GSB | Google Project Shield Bypass
DDoSGuard DGB | DDoS Guard Bypass
ArvanCloud AVB | Arvan Cloud Bypass
Google bot BOT | Like Google bot
Apache Webserver APACHE | Apache Expliot
wordpress expliot XMLRPC | WP XMLRPC exploit (add /xmlrpc.php)
CloudFlare CFB | CloudFlare Bypass
CloudFlare UnderAttack Mode CFBUAM | CloudFlare Under Attack Mode Bypass
bypass BYPASS | Bypass Normal AntiDDoS
bypass BOMB | Bypass with codesenberg/bombardier
πͺ KILLER | Run many threads to kill a target
π§
TOR | Bypass onion website
𧨠Layer4:
tcp TCP | TCP Flood Bypass
udp UDP | UDP Flood Bypass
syn SYN | SYN Flood
cps CPS | Open and close connections with proxy
icmp ICMP | Icmp echo request flood (Layer3)
connection CONNECTION | Open connection alive with proxy
vse VSE | Send Valve Source Engine Protocol
teamspeak 3 TS3 | Send Teamspeak 3 Status Ping Protocol
fivem FIVEM | Send FiveM Status Ping Protocol
mem MEM | Memcached Amplification
ntp NTP | NTP Amplification
mcbot MCBOT | Minecraft Bot Attack
minecraft MINECRAFT | Minecraft Status Ping Protocol
minecraft pe MCPE | Minecraft PE Status Ping Protocol
dns DNS | DNS Amplification
chargen CHAR | Chargen Amplification
cldap CLDAP | Cldap Amplification
ard ARD | Apple Remote Desktop Amplification
rdp RDP | Remote Desktop Protocol Amplification
βοΈ Tools - Runs With python3 start.py tools
π CFIP | Find Real IP Address Of Websites Powered By Cloudflare
πͺ DNS | Show DNS Records Of Sites
π TSSRV | TeamSpeak SRV Resolver
β PING | PING Servers
π CHECK | Check If Websites Status
π DSTAT | That Shows Bytes Received, bytes Sent and their amount
π© Other
β STOP | STOP All Attacks
π TOOLS | Console Tools
π HELP | Show Usage Script
DarkForums Members
Posts
13
Threads
0
Joined
Jan 2026
1 Weeks
(16-08-24, 09:04 PM)n3od4y Wrote: ![[Image: 68747470733a2f2f692e696d6775722e636f6d2f...6e2e706e67]](https://camo.githubusercontent.com/51e106541b8791091f35c294ce59ea63491b3d355beb4b68468c6dd4a61a27e7/68747470733a2f2f692e696d6775722e636f6d2f3451377632776e2e706e67)
Quote:Features And Methods
π£ Layer7
get GET | GET Flood
post POST | POST Flood
ovh OVH | Bypass OVH
ovh RHEX | Random HEX
ovh STOMP | Bypass chk_captcha
stress STRESS | Send HTTP Packet With High Byte
dyn DYN | A New Method With Random SubDomain
downloader DOWNLOADER | A New Method of Reading data slowly
slow SLOW | Slowloris Old Method of DDoS
head HEAD | https://developer.mozilla.org/en-US/docs...thods/HEAD
null NULL | Null UserAgent and ...
cookie COOKIE | Random Cookie PHP 'if (isset($_COOKIE))'
pps PPS | Only 'GET / HTTP/1.1\r\n\r\n'
even EVEN | GET Method with more header
googleshield GSB | Google Project Shield Bypass
DDoSGuard DGB | DDoS Guard Bypass
ArvanCloud AVB | Arvan Cloud Bypass
Google bot BOT | Like Google bot
Apache Webserver APACHE | Apache Expliot
wordpress expliot XMLRPC | WP XMLRPC exploit (add /xmlrpc.php)
CloudFlare CFB | CloudFlare Bypass
CloudFlare UnderAttack Mode CFBUAM | CloudFlare Under Attack Mode Bypass
bypass BYPASS | Bypass Normal AntiDDoS
bypass BOMB | Bypass with codesenberg/bombardier
πͺ KILLER | Run many threads to kill a target
π§
TOR | Bypass onion website
𧨠Layer4:
tcp TCP | TCP Flood Bypass
udp UDP | UDP Flood Bypass
syn SYN | SYN Flood
cps CPS | Open and close connections with proxy
icmp ICMP | Icmp echo request flood (Layer3)
connection CONNECTION | Open connection alive with proxy
vse VSE | Send Valve Source Engine Protocol
teamspeak 3 TS3 | Send Teamspeak 3 Status Ping Protocol
fivem FIVEM | Send FiveM Status Ping Protocol
mem MEM | Memcached Amplification
ntp NTP | NTP Amplification
mcbot MCBOT | Minecraft Bot Attack
minecraft MINECRAFT | Minecraft Status Ping Protocol
minecraft pe MCPE | Minecraft PE Status Ping Protocol
dns DNS | DNS Amplification
chargen CHAR | Chargen Amplification
cldap CLDAP | Cldap Amplification
ard ARD | Apple Remote Desktop Amplification
rdp RDP | Remote Desktop Protocol Amplification
βοΈ Tools - Runs With python3 start.py tools
π CFIP | Find Real IP Address Of Websites Powered By Cloudflare
πͺ DNS | Show DNS Records Of Sites
π TSSRV | TeamSpeak SRV Resolver
β PING | PING Servers
π CHECK | Check If Websites Status
π DSTAT | That Shows Bytes Received, bytes Sent and their amount
π© Other
β STOP | STOP All Attacks
π TOOLS | Console Tools
π HELP | Show Usage Script
DarkForums Members
Posts
9
Threads
0
Joined
Jul 2025
6 Months
DarkForums Members
Posts
22
Threads
0
Joined
Dec 2025
1 Months
(16-08-24, 09:04 PM)n3od4y Wrote: ![[Image: 68747470733a2f2f692e696d6775722e636f6d2f...6e2e706e67]](https://camo.githubusercontent.com/51e106541b8791091f35c294ce59ea63491b3d355beb4b68468c6dd4a61a27e7/68747470733a2f2f692e696d6775722e636f6d2f3451377632776e2e706e67)
Quote:Features And Methods
π£ Layer7
get GET | GET Flood
post POST | POST Flood
ovh OVH | Bypass OVH
ovh RHEX | Random HEX
ovh STOMP | Bypass chk_captcha
stress STRESS | Send HTTP Packet With High Byte
dyn DYN | A New Method With Random SubDomain
downloader DOWNLOADER | A New Method of Reading data slowly
slow SLOW | Slowloris Old Method of DDoS
head HEAD | https://developer.mozilla.org/en-US/docs...thods/HEAD
null NULL | Null UserAgent and ...
cookie COOKIE | Random Cookie PHP 'if (isset($_COOKIE))'
pps PPS | Only 'GET / HTTP/1.1\r\n\r\n'
even EVEN | GET Method with more header
googleshield GSB | Google Project Shield Bypass
DDoSGuard DGB | DDoS Guard Bypass
ArvanCloud AVB | Arvan Cloud Bypass
Google bot BOT | Like Google bot
Apache Webserver APACHE | Apache Expliot
wordpress expliot XMLRPC | WP XMLRPC exploit (add /xmlrpc.php)
CloudFlare CFB | CloudFlare Bypass
CloudFlare UnderAttack Mode CFBUAM | CloudFlare Under Attack Mode Bypass
bypass BYPASS | Bypass Normal AntiDDoS
bypass BOMB | Bypass with codesenberg/bombardier
πͺ KILLER | Run many threads to kill a target
π§
TOR | Bypass onion website
𧨠Layer4:
tcp TCP | TCP Flood Bypass
udp UDP | UDP Flood Bypass
syn SYN | SYN Flood
cps CPS | Open and close connections with proxy
icmp ICMP | Icmp echo request flood (Layer3)
connection CONNECTION | Open connection alive with proxy
vse VSE | Send Valve Source Engine Protocol
teamspeak 3 TS3 | Send Teamspeak 3 Status Ping Protocol
fivem FIVEM | Send FiveM Status Ping Protocol
mem MEM | Memcached Amplification
ntp NTP | NTP Amplification
mcbot MCBOT | Minecraft Bot Attack
minecraft MINECRAFT | Minecraft Status Ping Protocol
minecraft pe MCPE | Minecraft PE Status Ping Protocol
dns DNS | DNS Amplification
chargen CHAR | Chargen Amplification
cldap CLDAP | Cldap Amplification
ard ARD | Apple Remote Desktop Amplification
rdp RDP | Remote Desktop Protocol Amplification
βοΈ Tools - Runs With python3 start.py tools
π CFIP | Find Real IP Address Of Websites Powered By Cloudflare
πͺ DNS | Show DNS Records Of Sites
π TSSRV | TeamSpeak SRV Resolver
β PING | PING Servers
π CHECK | Check If Websites Status
π DSTAT | That Shows Bytes Received, bytes Sent and their amount
π© Other
β STOP | STOP All Attacks
π TOOLS | Console Tools
π HELP | Show Usage Script
|
Users browsing this thread: 2 Guest(s)