Methods

Layer 4 Methods

Layer 4 methods are meant for IPv4 targets, they use UDP and TCP protocols to execute there attacks.


CIDR

Method is compatible with IP And CIDR as target (ex: 1.2.3.0/24), allowing stress testing of entire subnets.

Customizable

Method is compatible setting custom Source IP/CIDR, Source Port and Payload.


Method Protocol Description CIDR Customizable
X-REFLECT X  (AMP) UDP reflection method that uses vulnerable SSDP servers for amplification.
UDP-AMP UDP  (AMP) Powerful multi-protocol UDP reflection method, combines all the most powerful amplification protocols into one attack.
NTP UDP  (AMP) UDP reflection method that uses vulnerable NTP servers for amplification.
DNS UDP  (AMP) UDP reflection method that uses vulnerable DNS servers for amplification.
ARD UDP  (AMP) UDP reflection method that uses vulnerable ARD servers for amplification, capable of bypassing some OVH and other protected hosts..
WSD UDP  (AMP) UDP reflection method that uses vulnerable WSD servers for amplification, capable of bypassing some OVH and other protected hosts..
DVR UDP  (AMP) UDP reflection method that uses vulnerable DVR servers for amplification.
SNMP UDP  (AMP) UDP reflection method that uses vulnerable SNMP servers for amplification.
CHARGEN UDP  (AMP) UDP reflection method that uses vulnerable CHARGEN servers for amplification.
UDP-SYNERGY UDP  (AMP) An insanely powerful UDP method, requires minimum 10 Simultaneous Attacks to launch
TCP-AMP TCP  (AMP) TCP reflection method that amplifies 8-15Gbps of TCP traffic, currently bypassing many protected servers
TCP-REFLECT TCP  (AMP) TCP reflection method that uses large pool of IPs and many different TCP protocols combined, similar to TCP-AMP but exchanges volume for greater IP/Protocol variation.
UDP-ABUSE UDP Exotic UDP Abuse method that attempts to get a target IP suspended by generating abuse reports, this is not meant to DDoS a IP, it is intended to suspend the IP from its hosting.
UDP UDP Powerful UDP bypass method that randomizes each IP header and payload to bypass protections and security.
GAME-SOURCE UDP Uses Source Engine Query to take down Valve/Source servers, very effective if server is not protected.
UDP-INSTANT-ABUSE UDP Like regular ABUSE method but better IP selection and faster suspensions
UDP-BYPASS UDP UDPBYPASS is made to target applications using UDP on the targetted port to attempt to create the most legitimate traffic out on the application.
GAME-FIVEM UDP Bypass method for GTA V servers that are using FiveM multiplayer modification framework.
GAME-RAKNET UDP Targeting widely used crossplatform multiplayer game networking engine, allowung to DDoS Rust, Minecraft PE, RageMP as well as many other games.
GAME-MINECRAFT UDP Uses crafted minecraft queries to take down Minecraft, very effective if server is not protected.
GAME-QUAKE UDP Uses QUAKE engine queries, also works with Soldier of Fortune 2, Nexuiz, Quake 3, Wolfenstein, Star Trek Elite Force, Urban Terror, Star Wars JK2, Call of Duty (1, 2, 3, 4, MW2, UO), Star Wars JK, Star Trek Elite Force 2, FiveM, Tremulous
GAME-UNTURNED UDP Bypass servers running Unturned game, effective against many servers
GAME-FIVEMV2 UDP Bypass servers running SAMP game, effective against many servers
TCP-ABUSE TCP Exotic TCP Abuse method that attempts to get a target IP suspended by generating abuse reports, this is not meant to DDoS a IP, it is intended to suspend the IP from its hosting.
TCP-INSTANT-ABUSE TCP Like regular ABUSE method but better IP selection and faster suspensions
TCP-SYN TCP Spoofed SYN packets flood, tweaked to bypass some protections, fully customizable.
TCP-ACK TCP Spoofed ACK packets flood, tweaked to bypass some protections, fully customizable.
TCP-RAND TCP Spoofed randomized TCP flags packets flood, tweaked to bypass some protections, fully customizable.
TCP-PROTECT TCP Powerful TCP method that can bypass various servers
TCP-SYNACK TCP Powerful method that emulates a SYN-ACK handshake.
TCP-DATA TCP TCP method that attempts to emulate a real connection with SYN and PSH+ACK data
TCP-BYPASS TCP Powerful method that emulates a SYN-ACK handshake, while using residential IPs that automatically matches the same geographic location as the target IP. It is very effective at bypassing geolock targets, and also generally effective against most targets.
TCP-DETECT TCP This advanced TCP method automatically detects all open TCP ports and attacks all of them at once, a destination port is not required for this method. It can take ~15 seconds for the attack to work in full effect.
ICMP ICMP Old school ICMP attack, causes lag and CPU usage on some servers
Layer 7 Methods

Layer 7 methods are meant for URL targets, they use HTTP/HTTPs protocols to execute there attacks.

Method Protocol Description
AUTOMATION HTTP Effective method for HTTP/HTTPs
BYPASS HTTP Effective method for HTTP/HTTPs
SOCKET HTTP Socket method for mass requests
SPAMMER HTTP Spammer method for mass requests