Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   1563

DDoS API / Layer4 / 5gb/s (free)

by Artem - 01 December, 2024 - 05:22 AM
This post is by a banned member (Aryangamer6) - Unhide
253
Posts
0
Threads
2 Years of service
#9
(01 December, 2024 - 05:22 AM)Artem Wrote: Show More
 

Hii
This post is by a banned member (Artem) - Unhide
Artem  
Heaven
2.988
Posts
602
Threads
6 Years of service
#10
(01 December, 2024 - 06:09 AM)businessmenD Wrote: Show More
(01 December, 2024 - 05:47 AM)Artem Wrote: Show More
(01 December, 2024 - 05:26 AM)businessmenD Wrote: Show More
What happens if I put 127.0.0.1 port 5000? [Image: pepenigger.gif] [Image: kek.png]

{"duration":60,"ip":"127.0.0.1","num_processes":1,"port":5000,"status":"Attack started"}

PS: it's probably fake since...
{"duration":60,"ip":"nigger","num_processes":1,"port":5000,"status":"Attack started"}

bro shut up, have you at least tested on a dstat? No.
it's not because there are no string check that it is fake, shut your ass the next time

i made a video (it took me 30s to verify it works, next time instead of taking 5minutes to say it's fake, just check)
https://streamable.com/2qaxho


Hahaha it's starting a attack against itself? Against the word nigger? Absolutely retard content. To show you how wrong you are, I even made a mock server to test it. Anyone can test it in their own PC:
Code:
from http.server import HTTPServer, BaseHTTPRequestHandler

class RequestHandler(BaseHTTPRequestHandler):
def do_GET(self):
print(f"Received GET request: {self.path}")
self.send_response(200)
self.end_headers()

def do_POST(self):
content_length = int(self.headers['Content-Length'])
post_data = self.rfile.read(content_length)
print(f"Received POST request: {self.path}")
print(f"Data: {post_data}")
self.send_response(200)
self.end_headers()

server_address = ('0.0.0.0', 8080)
httpd = HTTPServer(server_address, RequestHandler)
print("Mock server running on port 8080...")
httpd.serve_forever()

Also can check how the server actually works opening it and going 127.0.0.1:8080 at your browser. You will see how intercepts everything from the requests.

I think you have to chance my rep.

[Image: kek.png] [Image: kek.png] [Image: kek.png] [Image: kek.png]  I send a video to test on a vedbex dstat to show it works and u (the skid nigga) you still don't admit you were wrong
rip bozo raging because i neg rep him
◽ArtemFromNights◽
_______________________________________

[Image: b3bqD.gif]

_______________________________________

Telegram ArtemDotIcu
This post is by a banned member (businessmenD) - Unhide
1.017
Posts
101
Threads
1 Year of service
#11
(This post was last modified: 01 December, 2024 - 06:27 AM by businessmenD. Edited 1 time in total.)
(01 December, 2024 - 06:24 AM)Artem Wrote: Show More
(01 December, 2024 - 06:09 AM)businessmenD Wrote: Show More
(01 December, 2024 - 05:47 AM)Artem Wrote: Show More
bro shut up, have you at least tested on a dstat? No.
it's not because there are no string check that it is fake, shut your ass the next time

i made a video (it took me 30s to verify it works, next time instead of taking 5minutes to say it's fake, just check)
https://streamable.com/2qaxho


Hahaha it's starting a attack against itself? Against the word nigger? Absolutely retard content. To show you how wrong you are, I even made a mock server to test it. Anyone can test it in their own PC:
Code:
from http.server import HTTPServer, BaseHTTPRequestHandler

class RequestHandler(BaseHTTPRequestHandler):
def do_GET(self):
print(f"Received GET request: {self.path}")
self.send_response(200)
self.end_headers()

def do_POST(self):
content_length = int(self.headers['Content-Length'])
post_data = self.rfile.read(content_length)
print(f"Received POST request: {self.path}")
print(f"Data: {post_data}")
self.send_response(200)
self.end_headers()

server_address = ('0.0.0.0', 8080)
httpd = HTTPServer(server_address, RequestHandler)
print("Mock server running on port 8080...")
httpd.serve_forever()

Also can check how the server actually works opening it and going 127.0.0.1:8080 at your browser. You will see how intercepts everything from the requests.

I think you have to chance my rep.

[Image: kek.png] [Image: kek.png] [Image: kek.png] [Image: kek.png]  I send a video to test on a vedbex dstat to show it works and u (the skid nigga) you still don't admit you were wrong
rip bozo raging because i neg rep him

Yeah that's why it doesn't even send one request to a TCP server... kek same reason it takes any string as victim IP and port and say it's starting attack.
This post is by a banned member (Artem) - Unhide
Artem  
Heaven
2.988
Posts
602
Threads
6 Years of service
#12
(01 December, 2024 - 06:26 AM)businessmenD Wrote: Show More
(01 December, 2024 - 06:24 AM)Artem Wrote: Show More
(01 December, 2024 - 06:09 AM)businessmenD Wrote: Show More
Hahaha it's starting a attack against itself? Against the word nigger? Absolutely retard content. To show you how wrong you are, I even made a mock server to test it. Anyone can test it in their own PC:
Code:
from http.server import HTTPServer, BaseHTTPRequestHandler

class RequestHandler(BaseHTTPRequestHandler):
def do_GET(self):
print(f"Received GET request: {self.path}")
self.send_response(200)
self.end_headers()

def do_POST(self):
content_length = int(self.headers['Content-Length'])
post_data = self.rfile.read(content_length)
print(f"Received POST request: {self.path}")
print(f"Data: {post_data}")
self.send_response(200)
self.end_headers()

server_address = ('0.0.0.0', 8080)
httpd = HTTPServer(server_address, RequestHandler)
print("Mock server running on port 8080...")
httpd.serve_forever()

Also can check how the server actually works opening it and going 127.0.0.1:8080 at your browser. You will see how intercepts everything from the requests.

I think you have to chance my rep.

[Image: kek.png] [Image: kek.png] [Image: kek.png] [Image: kek.png]  I send a video to test on a vedbex dstat to show it works and u (the skid nigga) you still don't admit you were wrong
rip bozo raging because i neg rep him

Yeah that's why it doesn't even send one request to a TCP server... [Image: kek.png]

Ofc it does as you can test with a DSTAT
I never claimed the API would bypass anti-ddos of your server provider, stop being dumb and test it on a DSTAT made for tests
https://streamable.com/2qaxho
stop crying bozo
◽ArtemFromNights◽
_______________________________________

[Image: b3bqD.gif]

_______________________________________

Telegram ArtemDotIcu
This post is by a banned member (businessmenD) - Unhide
1.017
Posts
101
Threads
1 Year of service
#13
(01 December, 2024 - 06:28 AM)Artem Wrote: Show More
(01 December, 2024 - 06:26 AM)businessmenD Wrote: Show More
(01 December, 2024 - 06:24 AM)Artem Wrote: Show More
[Image: kek.png] [Image: kek.png] [Image: kek.png] [Image: kek.png]  I send a video to test on a vedbex dstat to show it works and u (the skid nigga) you still don't admit you were wrong
rip bozo raging because i neg rep him

Yeah that's why it doesn't even send one request to a TCP server... [Image: kek.png]

Ofc it does as you can test with a DSTAT
I never claimed the API would bypass anti-ddos of your server provider, stop being dumb and test it on a DSTAT made for tests
https://streamable.com/2qaxho
stop crying bozo

Literally I'm talking about a TCP server mounted at my vps, the script I sent (second one).
This post is by a banned member (Artem) - Unhide
Artem  
Heaven
2.988
Posts
602
Threads
6 Years of service
#14
(01 December, 2024 - 06:30 AM)businessmenD Wrote: Show More
(01 December, 2024 - 06:28 AM)Artem Wrote: Show More
(01 December, 2024 - 06:26 AM)businessmenD Wrote: Show More
Yeah that's why it doesn't even send one request to a TCP server... [Image: kek.png]

Ofc it does as you can test with a DSTAT
I never claimed the API would bypass anti-ddos of your server provider, stop being dumb and test it on a DSTAT made for tests
https://streamable.com/2qaxho
stop crying bozo

Literally I'm talking about a TCP server mounted at my vps, the script I sent (second one).

VPS = Probably anti ddos from your provider
Test the API on unprotected server to be accurate.
All VPS provider has at least a light anti ddos because downing a VPS may down all other VPS on the same node nigga
Go back to school to learn bases of sysadmin plz
◽ArtemFromNights◽
_______________________________________

[Image: b3bqD.gif]

_______________________________________

Telegram ArtemDotIcu
This post is by a banned member (businessmenD) - Unhide
1.017
Posts
101
Threads
1 Year of service
#15
(01 December, 2024 - 06:32 AM)Artem Wrote: Show More
(01 December, 2024 - 06:30 AM)businessmenD Wrote: Show More
(01 December, 2024 - 06:28 AM)Artem Wrote: Show More
Ofc it does as you can test with a DSTAT
I never claimed the API would bypass anti-ddos of your server provider, stop being dumb and test it on a DSTAT made for tests
https://streamable.com/2qaxho
stop crying bozo

Literally I'm talking about a TCP server mounted at my vps, the script I sent (second one).

VPS = Probably anti ddos from your provider
Test the API on unprotected server to be accurate.
All VPS provider has at least a light anti ddos because downing a VPS may down all other VPS on the same node nigga
Go back to school to learn bases of sysadmin plz

Lol at least some firsts request gotta pass through. But you can try the script in your own PC.
This post is by a banned member (Typeshitruns) - Unhide
220
Posts
1
Threads
1 Year of service
#16
(01 December, 2024 - 05:22 AM)Artem Wrote: Show More
 

WOWZAAAS

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)