Methods
Layer 4 Methods
Layer 4 methods are meant for IPv4 targets, they use UDP and TCP protocols to execute there attacks.
CIDR
Method is compatible with IP And CIDR as target (ex: 1.2.3.0/24), allowing stress testing of entire subnets.Customizable
Method is compatible setting custom Source IP/CIDR, Source Port and Payload.Method | Protocol | Description | CIDR | Customizable |
---|---|---|---|---|
UDP-AMP | UDP (AMP) | Powerful multi-vector UDP reflection method, combines all the most powerful amplification protocols into one attack. | ||
NTP | UDP (AMP) | UDP reflection method that uses vulnerable NTP servers for amplification. | ||
CLDAP | UDP (AMP) | UDP reflection method that uses vulnerable CLDAP servers for amplification. | ||
DNS | UDP (AMP) | UDP reflection method that uses vulnerable DNS servers for amplification. | ||
ARD | UDP (AMP) | UDP reflection method that uses vulnerable ARD servers for amplification, capable of bypassing some OVH and other protected hosts.. | ||
WSD | UDP (AMP) | UDP reflection method that uses vulnerable WSD servers for amplification, capable of bypassing some OVH and other protected hosts.. | ||
SSDP | UDP (AMP) | UDP reflection method that uses vulnerable SSDP servers for amplification. | ||
TCP-AMP | TCP (AMP) | TCP reflection method that amplifies 8-15Gbps of TCP traffic, currently bypassing many protected servers | ||
TCP-OVH | TCP (AMP) | TCP OVH method, currently bypassing OVH and many other protected servers | ||
UDP-ABUSE | UDP | Exotic UDP Abuse method that attempts to get a target IP suspended by generating abuse reports, this is not meant to DDoS a IP, it is intended to suspend the IP from its hosting. | ||
UDP | UDP | Powerful UDP bypass method that randomizes each IP header and payload to bypass protections and security. | ||
GAME-SOURCE | UDP | Uses Source Engine Query to take down Valve/Source servers, very effective if server is not protected. | ||
UDP-SMART-ABUSE | UDP | Like regular ABUSE method but better IP selection and faster suspensions | ||
UDP-BYPASS | UDP | UDPBYPASS is made to target applications using UDP on the targetted port to attempt to create the most legitimate traffic out on the application. | ||
GAME-FIVEM | UDP | Bypass method for GTA V servers that are using FiveM multiplayer modification framework. | ||
GAME-RAKNET | UDP | Targeting widely used crossplatform multiplayer game networking engine, allowung to DDoS Rust, Minecraft PE, RageMP as well as many other games. | ||
GAME-MINECRAFT | UDP | Uses crafted minecraft queries to take down Minecraft, very effective if server is not protected. | ||
GAME-ARK | UDP | Bypass for Ark games, very effective against most servers | ||
GAME-QUAKE | UDP | Uses QUAKE engine queries, also works with Soldier of Fortune 2, Nexuiz, Quake 3, Wolfenstein, Star Trek Elite Force, Urban Terror, Star Wars JK2, Call of Duty (1, 2, 3, 4, MW2, UO), Star Wars JK, Star Trek Elite Force 2, FiveM, Tremulous | ||
GAME-UNTURNED | UDP | Bypass servers running Unturned game, effective against many servers | ||
GAME-SAMP | UDP | Bypass servers running SAMP game, effective against many servers | ||
VENTRILO | UDP | Sends special query packets to take down Ventrilos server | ||
GAME-TEEWORLDS | UDP | Sends special query packets to take down TEEWORLDS server | ||
GAME-BF2 | UDP | Sends special query packets to take down Battlefield 2 servers | ||
GAME-BF3 | UDP | Sends special query packets to take down Battlefield 3 servers | ||
GAME-LHMP | UDP | Sends special query packets to take down Lost Heaven Multiplayer servers | ||
TCP-ABUSE | TCP | Exotic TCP Abuse method that attempts to get a target IP suspended by generating abuse reports, this is not meant to DDoS a IP, it is intended to suspend the IP from its hosting. | ||
TCP-SYN | TCP | Spoofed SYN packets flood, tweaked to bypass some protections, fully customizable. | ||
TCP-ACK | TCP | Spoofed ACK packets flood, tweaked to bypass some protections, fully customizable. | ||
TCP-RAND | TCP | Spoofed randomized TCP flags packets flood, tweaked to bypass some protections, fully customizable. | ||
ICMP | ICMP | Old school ICMP attack, causes lag and CPU usage on some servers |
Layer 7 Methods
Layer 7 methods are meant for URL targets, they use HTTP/HTTPs protocols to execute there attacks.
Method | Protocol | Description |
---|---|---|
HTTP | HTTP(S) | Similar to REQUEST, with updated headers. |
BYPASS | HTTP(S) | Effective against ANY javascript challenge, wait 30-40 seconds for bypass to work. |
CAPTCHA | HTTP(S) | This bypasses Cloudflare hCaptcha, wait 50 seconds for bypass to work. |
REQUEST | HTTP(S) | Stable HTTPv2 floods, also bypasses javascript and captcha at times. |
PARAMETER | HTTP(S) | Effective bypass method with rate limit mitigation techniques. |
CONNECT | HTTP(S) | Good for unprotected backends |