Denial Service Attack
Denial Attacks by Various Methods
IIIIIIIIIIIIIIIIIIII PPPPPPPPPPPPPPPPP VVVVVVVV VVVVVVVV
I::::::::II::::::::I P::::::::::::::::P V::::::V V::::::V
I::::::::II::::::::I P::::::PPPPPP:::::P V::::::V V::::::V
II::::::IIII::::::II PP:::::P P:::::P V::::::V V::::::V
I::::I I::::I P::::P P:::::P V:::::V V:::::V
I::::I I::::I P::::P P:::::P V:::::V V:::::V
I::::I I::::I P::::PPPPPP:::::P V:::::V V:::::V
I::::I I::::I P:::::::::::::PP V:::::V V:::::V
I::::I I::::I P::::PPPPPPPPP V:::::V V:::::V
I::::I I::::I P::::P V:::::V V:::::V
I::::I I::::I P::::P V:::::V:::::V
I::::I I::::I P::::P V:::::::::V
II::::::IIII::::::II PP::::::PP V:::::::V
I::::::::II::::::::I ...... P::::::::P V:::::V
I01000110II00110100I .::::. P01000110P V:::V --> CREATED FOR FREE NET
IIIIIIIIIIIIIIIIIIII ...... PPPPPPPPPP VVV --> open-source culture
############################################################################################################
############################################################################################################
-------------------------------------------------------------------------------------
py IIPV_DDOS.py -<TYPE> https://example.com [or] py IIPV_DDOS.py --<TYPE> https://example.com
-------------------------------------------------------------------------------------
############################################################################################################
############################################################################################################
-------------------------------------------------------------------------------------
#### -H --help how to use ####
[ -p ] --pentesting -> CHECK OPEN PORTS AND WEB SERVER METHODS
[ -d ] --ddos -> START MAIN ATTACK
[ -x ] --strong -> START THE STRONGEST ATTACK
[ -o ] --curlone -> START THE TYPE ONE ATTACK
[ -t ] --curltwo -> START THE TYPE TWO ATTACK
[ -r ] --curlthree -> START THE TYPE THREE ATTACK
[ -f ] --curlfour -> START THE TYPE FOUR ATTACK
[ -v ] --curlfive -> START THE TYPE FIVE ATTACK
[ -s ] --curlsix -> START THE TYPE SIX ATTACK
[ -b ] --botattack -> START THE BOT ATTACK
-------------------------------------------------------------------------------------
<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
-------------------------------------------------------------------------------------
[NOTED - IMPORTANT]
+ USE FOR EDUCATIONAL PURPOSES
+ PERFORMANCE DEPENDS ON YOUR COMPUTER POWER AND INTERNET CAPACITY
+ THE MOSTLY SELECTED DEFAULT PORT IS 80
+ CODE OWNER IS NOT RESPONSIBLE FOR MISUSE
-------------------------------------------------------------------------------------
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
-------------------------------------------------------------------------------------
[RECOMMENDATION]
+ MAKE SURE YOU HAVE STRONG COMPUTER CORE AND INTERNET NETWORK CAPACITY FOR <--strong>
+ THE CODE OWNER IS NOT RESPONSIBLE FOR DAMAGES ARISING FROM <--strong>
+ ATTACK EFFICIENCY INCREASES DUE TO THE PORT VARIABLE
+ MAKE SURE OF YOUR NETWORK PRIVACY
+ DO NOT USE IF IN DOUBT
-------------------------------------------------------------------------------------
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>