Methods

Layer 4 Methods

Layer 4 methods are meant for IPv4 targets, they use UDP and TCP protocols to execute there attacks.


CIDR

Method is compatible with IP And CIDR as target (ex: 1.2.3.0/24), allowing stress testing of entire subnets.

Customizable

Method is compatible setting custom Source IP/CIDR, Source Port and Payload.


Method Protocol Description CIDR Customizable
UDP-AMP UDP  (AMP) Powerful multi-vector UDP reflection method, combines all the most powerful amplification protocols into one attack.
NTP UDP  (AMP) UDP reflection method that uses vulnerable NTP servers for amplification.
CLDAP UDP  (AMP) UDP reflection method that uses vulnerable CLDAP servers for amplification.
DNS UDP  (AMP) UDP reflection method that uses vulnerable DNS servers for amplification.
ARD UDP  (AMP) UDP reflection method that uses vulnerable ARD servers for amplification, capable of bypassing some OVH and other protected hosts..
WSD UDP  (AMP) UDP reflection method that uses vulnerable WSD servers for amplification, capable of bypassing some OVH and other protected hosts..
SSDP UDP  (AMP) UDP reflection method that uses vulnerable SSDP servers for amplification.
TCP-AMP TCP  (AMP) TCP reflection method that amplifies 8-15Gbps of TCP traffic, currently bypassing many protected servers
TCP-OVH TCP  (AMP) TCP OVH method, currently bypassing OVH and many other protected servers
UDP-ABUSE UDP Exotic UDP Abuse method that attempts to get a target IP suspended by generating abuse reports, this is not meant to DDoS a IP, it is intended to suspend the IP from its hosting.
UDP UDP Powerful UDP bypass method that randomizes each IP header and payload to bypass protections and security.
GAME-SOURCE UDP Uses Source Engine Query to take down Valve/Source servers, very effective if server is not protected.
UDP-SMART-ABUSE UDP Like regular ABUSE method but better IP selection and faster suspensions
UDP-BYPASS UDP UDPBYPASS is made to target applications using UDP on the targetted port to attempt to create the most legitimate traffic out on the application.
GAME-FIVEM UDP Bypass method for GTA V servers that are using FiveM multiplayer modification framework.
GAME-RAKNET UDP Targeting widely used crossplatform multiplayer game networking engine, allowung to DDoS Rust, Minecraft PE, RageMP as well as many other games.
GAME-MINECRAFT UDP Uses crafted minecraft queries to take down Minecraft, very effective if server is not protected.
GAME-ARK UDP Bypass for Ark games, very effective against most servers
GAME-QUAKE UDP Uses QUAKE engine queries, also works with Soldier of Fortune 2, Nexuiz, Quake 3, Wolfenstein, Star Trek Elite Force, Urban Terror, Star Wars JK2, Call of Duty (1, 2, 3, 4, MW2, UO), Star Wars JK, Star Trek Elite Force 2, FiveM, Tremulous
GAME-UNTURNED UDP Bypass servers running Unturned game, effective against many servers
GAME-SAMP UDP Bypass servers running SAMP game, effective against many servers
VENTRILO UDP Sends special query packets to take down Ventrilos server
GAME-TEEWORLDS UDP Sends special query packets to take down TEEWORLDS server
GAME-BF2 UDP Sends special query packets to take down Battlefield 2 servers
GAME-BF3 UDP Sends special query packets to take down Battlefield 3 servers
GAME-LHMP UDP Sends special query packets to take down Lost Heaven Multiplayer servers
TCP-ABUSE TCP Exotic TCP Abuse method that attempts to get a target IP suspended by generating abuse reports, this is not meant to DDoS a IP, it is intended to suspend the IP from its hosting.
TCP-SYN TCP Spoofed SYN packets flood, tweaked to bypass some protections, fully customizable.
TCP-ACK TCP Spoofed ACK packets flood, tweaked to bypass some protections, fully customizable.
TCP-RAND TCP Spoofed randomized TCP flags packets flood, tweaked to bypass some protections, fully customizable.
ICMP ICMP Old school ICMP attack, causes lag and CPU usage on some servers
Layer 7 Methods

Layer 7 methods are meant for URL targets, they use HTTP/HTTPs protocols to execute there attacks.

Method Protocol Description
HTTP HTTP(S) Similar to REQUEST, with updated headers.
BYPASS HTTP(S) Effective against ANY javascript challenge, wait 30-40 seconds for bypass to work.
CAPTCHA HTTP(S) This bypasses Cloudflare hCaptcha, wait 50 seconds for bypass to work.
REQUEST HTTP(S) Stable HTTPv2 floods, also bypasses javascript and captcha at times.
PARAMETER HTTP(S) Effective bypass method with rate limit mitigation techniques.
CONNECT HTTP(S) Good for unprotected backends