Create an account

Very important

  • To access the important data of the forums, you must be active in each forum and especially in the leaks and database leaks section, send data and after sending the data and activity, data and important content will be opened and visible for you.
  • You will only see chat messages from people who are at or below your level.
  • More than 500,000 database leaks and millions of account leaks are waiting for you, so access and view with more activity.
  • Many important data are inactive and inaccessible for you, so open them with activity. (This will be done automatically)


Thread Rating:
  • 470 Vote(s) - 3.5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
[PHP] AntiDOS Script

#1
My friend give me this AntiDos script, but i am not sure it will works...
Try it..

PHP Code:
<?php
///////////////////////////////////////////////////////////
Antiddos PHP Skriptaby Serbian Cyber Team === === It is BEST to use AntiDDOS on VPS or Dedicated Servers...

\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
*/
$debug false// debug mode, disabled ban, Jednostavno pokazuje dali je ip bio banovan ili nije.
if ($debugerror_reporting(E_ALL);
else 
error_reporting(0);


/* Possible values - $ddos 1-5:
| 1. Check withcookies
| 2. Duble check $_GET antiddos-a i meta refresh-a
| 3. Request for WWW-Authenticate
| 4. Disable all, but BOT's can not disable..
| 5. Turn off site if it is big BUG.
*/

$ddos 1;
$log false;
$dir dirname(__file__) . '/cyki_bots/'//DDOS l
$ddos_redirect_host 'http://google.com/'// Forwarding DDOS-a
$icq '123456'//Admins ICQ
$off_message 'BUG.'//
$anticyka md5(sha1('botik' strrev(getenv('HTTP_USER_AGENT'))));
$ban_message 'You have been banned, try to contact administrator [email protected].
$icq '<hr>(c)XakNet antiddos module'// Ban msg
$exec_ban "iptables -A INPUT -s " $_SERVER["REMOTE_ADDR"] . " -j DROP"// ÃƒÂÃ‚´ÃÂ»Ã‘ iptables(Debian/ubuntu/etc)
$load sys_getloadavg(); // Funkcija za preuzimanje opterecenja \=\
$ddosuser 'lol_ddos';
$ddospass substr(ip2long($_SERVER['REMOTE_ADDR']), 0rand(24));
//nije testirano //Check:

$google strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "googlebot.com") !== false;
$yandex strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "yandex.ru") !== false;
$rambler strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "ramtel.ru") !== false;
$rambler2 strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "rambler.ru") !== false;
$aport strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "aport.ru") !== false;
$sape strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "sape.ru") !== false;
$msn strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "msn.com") !== false;
$yahoo strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "yahoo.net") !== false;
//
if(!file_exists($dir 'banned_ips')) file_put_contents($dir 'banned_ips''');
if (
strstr(file_get_contents($dir 'banned_ips'), $_SERVER['REMOTE_ADDR']))
die(
$ban_message); //GTFO )


if (! $google || ! $yandex || ! $rambler || ! $rambler2 || ! $aport || ! $sape ||
$msn || ! $yahoo) {

$f fopen($dir $_SERVER["REMOTE_ADDR"], "a");
fwrite($f"zapros cyka\n");
fclose($f);
function 
ban()
{
if (! 
system($exec_ban)) {
$f fopen($dir 'banned_ips'"a");
fwrite($f$_SERVER['REMOTE_ADDR'] . '|');
fclose($f);
}
echo 
$ban_message;
header('Location: ' $ddos_redirect_host '');
die();
}
switch (
$ddos) {
///////////////////////////
case 1:
if (empty(
$_COOKIE['ddos']) or ! $_COOKIE['ddos']) {
$counter = @file($dir $_SERVER["REMOTE_ADDR"]);
setcookie('ddos'$anticykatime() + 3600 24 356);
if (
count($counter) > 10) {
if (! 
$debugban();

else die(
"Blocked");

}
if (! 
$_COOKIE['ddos_log'] == 'bil') {
if (! 
$_GET['antiddos'] == 1) {
setcookie('ddos_log''bil'time() + 3600 24 356);
header("Location: ./?antiddos=1");
}
}
} elseif (
$_COOKIE['ddos'] !== $anticyka) {
if (! 
$debugban();

else die(
"Blocked.");

}
break;
/////////////////////////
case 2:
if (empty(
$_COOKIE['ddos'])) {
if (empty(
$_GET['antiddos'])) {
if (! 
$_COOKIE['ddos_log'] == 'bil')
//Checking cookies for request
die('<meta http-equiv="refresh" content="0;URL=?antiddos=' $anticyka '" />');

} elseif (
$_GET['antiddos'] == $anticyka) {
setcookie('ddos'$anticykatime() + 3600 24 356);
setcookie('ddos_log''bil'time() + 3600 24 356);
}
else {

if (! 
$debug) {
ban();
die(
"Forward line of adress");
}
else {
echo 
"Forward line of adress";
die(
"Blocked.");
}
}
}
break;
case 
3:
if (! isset(
$_SERVER['PHP_AUTH_USER']) || $_SERVER['PHP_AUTH_USER'] !== $ddosuser ||
$_SERVER['PHP_AUTH_PW'] !== $ddospass) {
header('WWW-Authenticate: Basic realm="Vvedite parol\': ' $ddospass .
' | Login: ' $ddosuser '"');
header('HTTP/1.0 401 Unauthorized');
if (! 
$debugban();

else die(
"Blocked");

die(
"<h1>401 Unauthorized</h1>");
}
break;
case 
4:
die(
$off_message); //Site turned off
break;
case 
5:
if (
$load[0] > 80) {
header('HTTP/1.1 503 Too busy, try again later');
die(
'<center><h1>503 Server too busy.</h1></center><hr><small><i>Server too busy. Please try again later. Apache server on ' .
$_SERVER['HTTP_HOST'] .
' at port 80 with <a href="http://serbiancyberteam.com/">ddos protect</a></i></small>');
}
break;
default:
break;
//////////////////////////
}
if (
$_COOKIE['ddos'] == $anticyka) @unlink($dir $_SERVER["REMOTE_ADDR"]);
}
......................................................................................
//////////////////////////////////////////////////////////////////////////////////////
///////////////////////////////By SCT////////////////////////////////////////
//////////////////////////////////////////////////////////////////////////////////////
......................................................................................

?>
Reply

#2
My friend give me this AntiDos script, but i am not sure it will works...
Try it..

PHP Code:
<?php
///////////////////////////////////////////////////////////
Antiddos PHP Skriptaby Serbian Cyber Team === === It is BEST to use AntiDDOS on VPS or Dedicated Servers...

\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
*/
$debug false// debug mode, disabled ban, Jednostavno pokazuje dali je ip bio banovan ili nije.
if ($debugerror_reporting(E_ALL);
else 
error_reporting(0);


/* Possible values - $ddos 1-5:
| 1. Check withcookies
| 2. Duble check $_GET antiddos-a i meta refresh-a
| 3. Request for WWW-Authenticate
| 4. Disable all, but BOT's can not disable..
| 5. Turn off site if it is big BUG.
*/

$ddos 1;
$log false;
$dir dirname(__file__) . '/cyki_bots/'//DDOS l
$ddos_redirect_host 'http://google.com/'// Forwarding DDOS-a
$icq '123456'//Admins ICQ
$off_message 'BUG.'//
$anticyka md5(sha1('botik' strrev(getenv('HTTP_USER_AGENT'))));
$ban_message 'You have been banned, try to contact administrator [email protected].
$icq '<hr>(c)XakNet antiddos module'// Ban msg
$exec_ban "iptables -A INPUT -s " $_SERVER["REMOTE_ADDR"] . " -j DROP"// ÃƒÂÃ‚´ÃÂ»Ã‘ iptables(Debian/ubuntu/etc)
$load sys_getloadavg(); // Funkcija za preuzimanje opterecenja \=\
$ddosuser 'lol_ddos';
$ddospass substr(ip2long($_SERVER['REMOTE_ADDR']), 0rand(24));
//nije testirano //Check:

$google strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "googlebot.com") !== false;
$yandex strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "yandex.ru") !== false;
$rambler strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "ramtel.ru") !== false;
$rambler2 strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "rambler.ru") !== false;
$aport strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "aport.ru") !== false;
$sape strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "sape.ru") !== false;
$msn strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "msn.com") !== false;
$yahoo strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "yahoo.net") !== false;
//
if(!file_exists($dir 'banned_ips')) file_put_contents($dir 'banned_ips''');
if (
strstr(file_get_contents($dir 'banned_ips'), $_SERVER['REMOTE_ADDR']))
die(
$ban_message); //GTFO )


if (! $google || ! $yandex || ! $rambler || ! $rambler2 || ! $aport || ! $sape ||
$msn || ! $yahoo) {

$f fopen($dir $_SERVER["REMOTE_ADDR"], "a");
fwrite($f"zapros cyka\n");
fclose($f);
function 
ban()
{
if (! 
system($exec_ban)) {
$f fopen($dir 'banned_ips'"a");
fwrite($f$_SERVER['REMOTE_ADDR'] . '|');
fclose($f);
}
echo 
$ban_message;
header('Location: ' $ddos_redirect_host '');
die();
}
switch (
$ddos) {
///////////////////////////
case 1:
if (empty(
$_COOKIE['ddos']) or ! $_COOKIE['ddos']) {
$counter = @file($dir $_SERVER["REMOTE_ADDR"]);
setcookie('ddos'$anticykatime() + 3600 24 356);
if (
count($counter) > 10) {
if (! 
$debugban();

else die(
"Blocked");

}
if (! 
$_COOKIE['ddos_log'] == 'bil') {
if (! 
$_GET['antiddos'] == 1) {
setcookie('ddos_log''bil'time() + 3600 24 356);
header("Location: ./?antiddos=1");
}
}
} elseif (
$_COOKIE['ddos'] !== $anticyka) {
if (! 
$debugban();

else die(
"Blocked.");

}
break;
/////////////////////////
case 2:
if (empty(
$_COOKIE['ddos'])) {
if (empty(
$_GET['antiddos'])) {
if (! 
$_COOKIE['ddos_log'] == 'bil')
//Checking cookies for request
die('<meta http-equiv="refresh" content="0;URL=?antiddos=' $anticyka '" />');

} elseif (
$_GET['antiddos'] == $anticyka) {
setcookie('ddos'$anticykatime() + 3600 24 356);
setcookie('ddos_log''bil'time() + 3600 24 356);
}
else {

if (! 
$debug) {
ban();
die(
"Forward line of adress");
}
else {
echo 
"Forward line of adress";
die(
"Blocked.");
}
}
}
break;
case 
3:
if (! isset(
$_SERVER['PHP_AUTH_USER']) || $_SERVER['PHP_AUTH_USER'] !== $ddosuser ||
$_SERVER['PHP_AUTH_PW'] !== $ddospass) {
header('WWW-Authenticate: Basic realm="Vvedite parol\': ' $ddospass .
' | Login: ' $ddosuser '"');
header('HTTP/1.0 401 Unauthorized');
if (! 
$debugban();

else die(
"Blocked");

die(
"<h1>401 Unauthorized</h1>");
}
break;
case 
4:
die(
$off_message); //Site turned off
break;
case 
5:
if (
$load[0] > 80) {
header('HTTP/1.1 503 Too busy, try again later');
die(
'<center><h1>503 Server too busy.</h1></center><hr><small><i>Server too busy. Please try again later. Apache server on ' .
$_SERVER['HTTP_HOST'] .
' at port 80 with <a href="http://serbiancyberteam.com/">ddos protect</a></i></small>');
}
break;
default:
break;
//////////////////////////
}
if (
$_COOKIE['ddos'] == $anticyka) @unlink($dir $_SERVER["REMOTE_ADDR"]);
}
......................................................................................
//////////////////////////////////////////////////////////////////////////////////////
///////////////////////////////By SCT////////////////////////////////////////
//////////////////////////////////////////////////////////////////////////////////////
......................................................................................

?>
Reply

#3
thanks for the share ill go make one later my own style
Reply

#4
Quote:(07-21-2011, 09:38 PM)1234hotmaster Wrote:

[To see links please register here]

thanks for the share ill go make one later my own style :biggrin:

nnc... I like to help everybody..
Reply

#5
thanks for the share ill go make one later my own style
Reply

#6
Quote:(07-21-2011, 09:38 PM)1234hotmaster Wrote:

[To see links please register here]

thanks for the share ill go make one later my own style :biggrin:

nnc... I like to help everybody..
Reply

#7
thx , i am gonna try it.
anyone checked it? Does it works?
Reply

#8
Man it works.. I checked it ! Trust me
Reply

#9

Hidden Content
You must

[To see links please register here]

or

[To see links please register here]

to view this content.

Reply

#10
Just chane it, if you know, right now i have no time to do that !
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

©0Day  2016 - 2023 | All Rights Reserved.  Made with    for the community. Connected through