This post is by a banned member (Aryangamer6) - Unhide
01 December, 2024 - 06:22 AM
Reply
(01 December, 2024 - 05:22 AM)Artem Wrote: Show More
Hii
This post is by a banned member (Artem) - Unhide
OP 01 December, 2024 - 06:24 AM
Reply
(01 December, 2024 - 06:09 AM)businessmenD Wrote: Show More (01 December, 2024 - 05:47 AM)Artem Wrote: Show More (01 December, 2024 - 05:26 AM)businessmenD Wrote: Show MoreWhat happens if I put 127.0.0.1 port 5000?
{"duration":60,"ip":"127.0.0.1","num_processes":1,"port":5000,"status":"Attack started"}
PS: it's probably fake since...
{"duration":60,"ip":"nigger","num_processes":1,"port":5000,"status":"Attack started"}
bro shut up, have you at least tested on a dstat? No.
it's not because there are no string check that it is fake, shut your ass the next time
i made a video (it took me 30s to verify it works, next time instead of taking 5minutes to say it's fake, just check)
https://streamable.com/2qaxho
Hahaha it's starting a attack against itself? Against the word nigger? Absolutely retard content. To show you how wrong you are, I even made a mock server to test it. Anyone can test it in their own PC:
Code: from http.server import HTTPServer, BaseHTTPRequestHandler
class RequestHandler(BaseHTTPRequestHandler):
def do_GET(self):
print(f"Received GET request: {self.path}")
self.send_response(200)
self.end_headers()
def do_POST(self):
content_length = int(self.headers['Content-Length'])
post_data = self.rfile.read(content_length)
print(f"Received POST request: {self.path}")
print(f"Data: {post_data}")
self.send_response(200)
self.end_headers()
server_address = ('0.0.0.0', 8080)
httpd = HTTPServer(server_address, RequestHandler)
print("Mock server running on port 8080...")
httpd.serve_forever()
Also can check how the server actually works opening it and going 127.0.0.1:8080 at your browser. You will see how intercepts everything from the requests.
I think you have to chance my rep.
![[Image: kek.png]](https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fstatic.cracked.sh%2Fimages%2Fsmilies%2Fkek.png) I send a video to test on a vedbex dstat to show it works and u (the skid nigga) you still don't admit you were wrong
rip bozo raging because i neg rep him
◽ArtemFromNights◽
_______________________________________
_______________________________________
Telegram : ArtemDotIcu
This post is by a banned member (businessmenD) - Unhide
01 December, 2024 - 06:26 AM
(This post was last modified: 01 December, 2024 - 06:27 AM by businessmenD. Edited 1 time in total.)
Reply
(01 December, 2024 - 06:24 AM)Artem Wrote: Show More (01 December, 2024 - 06:09 AM)businessmenD Wrote: Show More (01 December, 2024 - 05:47 AM)Artem Wrote: Show Morebro shut up, have you at least tested on a dstat? No.
it's not because there are no string check that it is fake, shut your ass the next time
i made a video (it took me 30s to verify it works, next time instead of taking 5minutes to say it's fake, just check)
https://streamable.com/2qaxho
Hahaha it's starting a attack against itself? Against the word nigger? Absolutely retard content. To show you how wrong you are, I even made a mock server to test it. Anyone can test it in their own PC:
Code: from http.server import HTTPServer, BaseHTTPRequestHandler
class RequestHandler(BaseHTTPRequestHandler):
def do_GET(self):
print(f"Received GET request: {self.path}")
self.send_response(200)
self.end_headers()
def do_POST(self):
content_length = int(self.headers['Content-Length'])
post_data = self.rfile.read(content_length)
print(f"Received POST request: {self.path}")
print(f"Data: {post_data}")
self.send_response(200)
self.end_headers()
server_address = ('0.0.0.0', 8080)
httpd = HTTPServer(server_address, RequestHandler)
print("Mock server running on port 8080...")
httpd.serve_forever()
Also can check how the server actually works opening it and going 127.0.0.1:8080 at your browser. You will see how intercepts everything from the requests.
I think you have to chance my rep.
![[Image: kek.png]](https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fstatic.cracked.sh%2Fimages%2Fsmilies%2Fkek.png) I send a video to test on a vedbex dstat to show it works and u (the skid nigga) you still don't admit you were wrong
rip bozo raging because i neg rep him
Yeah that's why it doesn't even send one request to a TCP server...  same reason it takes any string as victim IP and port and say it's starting attack.
This post is by a banned member (Artem) - Unhide
OP 01 December, 2024 - 06:28 AM
Reply
(01 December, 2024 - 06:26 AM)businessmenD Wrote: Show More (01 December, 2024 - 06:24 AM)Artem Wrote: Show More (01 December, 2024 - 06:09 AM)businessmenD Wrote: Show MoreHahaha it's starting a attack against itself? Against the word nigger? Absolutely retard content. To show you how wrong you are, I even made a mock server to test it. Anyone can test it in their own PC:
Code: from http.server import HTTPServer, BaseHTTPRequestHandler
class RequestHandler(BaseHTTPRequestHandler):
def do_GET(self):
print(f"Received GET request: {self.path}")
self.send_response(200)
self.end_headers()
def do_POST(self):
content_length = int(self.headers['Content-Length'])
post_data = self.rfile.read(content_length)
print(f"Received POST request: {self.path}")
print(f"Data: {post_data}")
self.send_response(200)
self.end_headers()
server_address = ('0.0.0.0', 8080)
httpd = HTTPServer(server_address, RequestHandler)
print("Mock server running on port 8080...")
httpd.serve_forever()
Also can check how the server actually works opening it and going 127.0.0.1:8080 at your browser. You will see how intercepts everything from the requests.
I think you have to chance my rep.
![[Image: kek.png]](https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fstatic.cracked.sh%2Fimages%2Fsmilies%2Fkek.png) I send a video to test on a vedbex dstat to show it works and u (the skid nigga) you still don't admit you were wrong
rip bozo raging because i neg rep him
Yeah that's why it doesn't even send one request to a TCP server... ![[Image: kek.png]](https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fstatic.cracked.sh%2Fimages%2Fsmilies%2Fkek.png)
Ofc it does as you can test with a DSTAT
I never claimed the API would bypass anti-ddos of your server provider, stop being dumb and test it on a DSTAT made for tests
https://streamable.com/2qaxho
stop crying bozo
◽ArtemFromNights◽
_______________________________________
_______________________________________
Telegram : ArtemDotIcu
This post is by a banned member (businessmenD) - Unhide
01 December, 2024 - 06:30 AM
Reply
(01 December, 2024 - 06:28 AM)Artem Wrote: Show More (01 December, 2024 - 06:26 AM)businessmenD Wrote: Show More (01 December, 2024 - 06:24 AM)Artem Wrote: Show More
Yeah that's why it doesn't even send one request to a TCP server... ![[Image: kek.png]](https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fstatic.cracked.sh%2Fimages%2Fsmilies%2Fkek.png)
Ofc it does as you can test with a DSTAT
I never claimed the API would bypass anti-ddos of your server provider, stop being dumb and test it on a DSTAT made for tests
https://streamable.com/2qaxho
stop crying bozo
Literally I'm talking about a TCP server mounted at my vps, the script I sent (second one).
This post is by a banned member (Artem) - Unhide
OP 01 December, 2024 - 06:32 AM
Reply
(01 December, 2024 - 06:30 AM)businessmenD Wrote: Show More (01 December, 2024 - 06:28 AM)Artem Wrote: Show More (01 December, 2024 - 06:26 AM)businessmenD Wrote: Show MoreYeah that's why it doesn't even send one request to a TCP server... ![[Image: kek.png]](https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fstatic.cracked.sh%2Fimages%2Fsmilies%2Fkek.png)
Ofc it does as you can test with a DSTAT
I never claimed the API would bypass anti-ddos of your server provider, stop being dumb and test it on a DSTAT made for tests
https://streamable.com/2qaxho
stop crying bozo
Literally I'm talking about a TCP server mounted at my vps, the script I sent (second one).
VPS = Probably anti ddos from your provider
Test the API on unprotected server to be accurate.
All VPS provider has at least a light anti ddos because downing a VPS may down all other VPS on the same node nigga
Go back to school to learn bases of sysadmin plz
◽ArtemFromNights◽
_______________________________________
_______________________________________
Telegram : ArtemDotIcu
This post is by a banned member (businessmenD) - Unhide
01 December, 2024 - 06:37 AM
Reply
(01 December, 2024 - 06:32 AM)Artem Wrote: Show More (01 December, 2024 - 06:30 AM)businessmenD Wrote: Show More (01 December, 2024 - 06:28 AM)Artem Wrote: Show MoreOfc it does as you can test with a DSTAT
I never claimed the API would bypass anti-ddos of your server provider, stop being dumb and test it on a DSTAT made for tests
https://streamable.com/2qaxho
stop crying bozo
Literally I'm talking about a TCP server mounted at my vps, the script I sent (second one).
VPS = Probably anti ddos from your provider
Test the API on unprotected server to be accurate.
All VPS provider has at least a light anti ddos because downing a VPS may down all other VPS on the same node nigga
Go back to school to learn bases of sysadmin plz
Lol at least some firsts request gotta pass through. But you can try the script in your own PC.
This post is by a banned member (Typeshitruns) - Unhide
01 December, 2024 - 06:38 AM
Reply
(01 December, 2024 - 05:22 AM)Artem Wrote: Show More
WOWZAAAS
|