Methods
Layer 4 Methods
Layer 4 methods are meant for IPv4 targets, they use UDP and TCP protocols to execute there attacks.
CIDR
Method is compatible with IP And CIDR as target (ex: 1.2.3.0/24), allowing stress testing of entire subnets.Customizable
Method is compatible setting custom Source IP/CIDR, Source Port and Payload.Method | Protocol | Description | CIDR | Customizable |
---|---|---|---|---|
UDP-AMP | UDP (AMP) | Powerful multi-protocol UDP reflection method, combines all the most powerful amplification protocols into one attack. | ||
NTP | UDP (AMP) | UDP reflection method that uses vulnerable NTP servers for amplification. | ||
DNS | UDP (AMP) | UDP reflection method that uses vulnerable DNS servers for amplification. | ||
ARD | UDP (AMP) | UDP reflection method that uses vulnerable ARD servers for amplification, capable of bypassing some OVH and other protected hosts.. | ||
WSD | UDP (AMP) | UDP reflection method that uses vulnerable WSD servers for amplification, capable of bypassing some OVH and other protected hosts.. | ||
DVR | UDP (AMP) | UDP reflection method that uses vulnerable DVR servers for amplification. | ||
SNMP | UDP (AMP) | UDP reflection method that uses vulnerable SNMP servers for amplification. | ||
CHARGEN | UDP (AMP) | UDP reflection method that uses vulnerable CHARGEN servers for amplification. | ||
UDP-SYNERGY | UDP (AMP) | An insanely powerful UDP method, requires minimum 10 Simultaneous Attacks to launch | ||
TCP-AMP | TCP (AMP) | TCP reflection method that amplifies 8-15Gbps of TCP traffic, currently bypassing many protected servers | ||
TCP-REFLECT | TCP (AMP) | TCP reflection method that uses large pool of IPs and many different TCP protocols combined, similar to TCP-AMP but exchanges volume for greater IP/Protocol variation. | ||
UDP-ABUSE | UDP | Exotic UDP Abuse method that attempts to get a target IP suspended by generating abuse reports, this is not meant to DDoS a IP, it is intended to suspend the IP from its hosting. | ||
UDP | UDP | Powerful UDP bypass method that randomizes each IP header and payload to bypass protections and security. | ||
GAME-SOURCE | UDP | Uses Source Engine Query to take down Valve/Source servers, very effective if server is not protected. | ||
UDP-INSTANT-ABUSE | UDP | Like regular ABUSE method but better IP selection and faster suspensions | ||
UDP-BYPASS | UDP | UDPBYPASS is made to target applications using UDP on the targetted port to attempt to create the most legitimate traffic out on the application. | ||
GAME-FIVEM | UDP | Bypass method for GTA V servers that are using FiveM multiplayer modification framework. | ||
GAME-RAKNET | UDP | Targeting widely used crossplatform multiplayer game networking engine, allowung to DDoS Rust, Minecraft PE, RageMP as well as many other games. | ||
GAME-MINECRAFT | UDP | Uses crafted minecraft queries to take down Minecraft, very effective if server is not protected. | ||
GAME-QUAKE | UDP | Uses QUAKE engine queries, also works with Soldier of Fortune 2, Nexuiz, Quake 3, Wolfenstein, Star Trek Elite Force, Urban Terror, Star Wars JK2, Call of Duty (1, 2, 3, 4, MW2, UO), Star Wars JK, Star Trek Elite Force 2, FiveM, Tremulous | ||
GAME-UNTURNED | UDP | Bypass servers running Unturned game, effective against many servers | ||
GAME-FIVEMV2 | UDP | Bypass servers running SAMP game, effective against many servers | ||
TCP-ABUSE | TCP | Exotic TCP Abuse method that attempts to get a target IP suspended by generating abuse reports, this is not meant to DDoS a IP, it is intended to suspend the IP from its hosting. | ||
TCP-INSTANT-ABUSE | TCP | Like regular ABUSE method but better IP selection and faster suspensions | ||
TCP-SYN | TCP | Spoofed SYN packets flood, tweaked to bypass some protections, fully customizable. | ||
TCP-ACK | TCP | Spoofed ACK packets flood, tweaked to bypass some protections, fully customizable. | ||
TCP-RAND | TCP | Spoofed randomized TCP flags packets flood, tweaked to bypass some protections, fully customizable. | ||
TCP-PROTECT | TCP | Powerful TCP method that can bypass various servers | ||
TCP-SYNACK | TCP | Powerful method that emulates a SYN-ACK handshake. | ||
TCP-DATA | TCP | TCP method that attempts to emulate a real connection with SYN and PSH+ACK data | ||
TCP-BYPASS | TCP | Powerful method that emulates a SYN-ACK handshake, while using residential IPs that automatically matches the same geographic location as the target IP. It is very effective at bypassing geolock targets, and also generally effective against most targets. | ||
TCP-DETECT | TCP | This advanced TCP method automatically detects all open TCP ports and attacks all of them at once, a destination port is not required for this method. It can take ~15 seconds for the attack to work in full effect. | ||
ICMP | ICMP | Old school ICMP attack, causes lag and CPU usage on some servers |
Layer 7 Methods
Layer 7 methods are meant for URL targets, they use HTTP/HTTPs protocols to execute there attacks.
Method | Protocol | Description |
---|---|---|
AUTOMATION | HTTP | Effective method for HTTP/HTTPs |
BYPASS | HTTP | Effective method for HTTP/HTTPs |
SOCKET | HTTP | Socket method for mass requests |
SPAMMER | HTTP | Spammer method for mass requests |
BYPASS | HTTP | Powerful layer 7 attack. |