See Configuration and options on how to change the interface language
- Own proxy database creates the attack from the whole world, which makes it much more difficult to protect against
- Efficient on a large number of targets simultaneously
- A variety of different methods, both "classic" and proprietary ones
- Frequent automatic updates without user intervention
Attention! Updates happen automatically, all steps except the last one need to be done only at the first time!
Our software does not contain viruses, but some antiviruses identify such software as potentially dangerous and block the files. You may need to allow running the downloaded file, or disable your antivirus.
- Download the latest version and save to a convenient location
- To start the attack, simply launch the file by double-click
1. Download the appropriate version for your platform
curl https://github.com/porthole-ascend-cinnamon/mhddos_proxy_releases/releases/latest/download/mhddos_proxy_linux -Lo mhddos_proxy_linux
curl https://github.com/porthole-ascend-cinnamon/mhddos_proxy_releases/releases/latest/download/mhddos_proxy_linux_arm64 -Lo mhddos_proxy_linux
2. Next, run chmod +x mhddos_proxy_linux
3. To start the attack, run ./mhddos_proxy_linux
directly or inside screen
- Install and launch Docker
- Run with the command
docker run -it --rm --pull always --net=host ghcr.io/porthole-ascend-cinnamon/mhddos_proxy
Aarch64 version should work on RPi4, probably on RPi3 too. The main thing is to have 64x OS.
Please refer to these Issues for extra info and potential solutions:
#13
#19
#23
Requies Termux and rooted device
apt update -y && apt install -y root-repo tsu glibc-repo glibc
curl https://github.com/porthole-ascend-cinnamon/mhddos_proxy_releases/releases/latest/download/mhddos_proxy_linux_arm64 -Lo mhddos_proxy
chmod +x mhddos_proxy
grun -c mhddos_proxy
sudo grun -n ./mhddos_proxy
apt install -y qemu-user-aarch64
sudo grun -n qemu-aarch64 ./mhddos_proxy
An mhddos.ini file will be created in the current directory on the first launch
You may edit it to change configuration
# Change language (ua | en | es | de | pl | lt)
lang = ua
# Run multiple copies (set "auto" for max value, requires 3+ core CPU and stable network)
copies = 1
# Number of threads per copy (to enable, remove the hashtag symbol on the next line)
#threads = 8000
# Use my IP/VPN for the attack in % from 0 to 100 (requires VPN or remote server)
use-my-ip = 0
You can also specify options via command line in --lang en
format
Full list of options is available by --help
command
Expand
To specify custom proxy(ies), use the proxy
option
proxy = [socks4://114.231.123.38:3065, socks5://114.231.123.38:1080]
If the list of proxies is too big, use the local or remote file option proxies
.
Each proxy should be on a new line
proxies = proxies.txt | https://pastebin.com/raw/UkFWzLOt
Surely, these options are also available via command line
--proxy socks4://114.231.123.38:3065, socks5://114.231.123.38:1080
--proxies proxies.txt | https://pastebin.com/raw/UkFWzLOt
114.231.123.38:3065
114.231.123.38:3065:username:password
username:[email protected]:3065
socks4://114.231.123.38:3065
socks5://114.231.123.38:3065:username:password
http://username:[email protected]:3065
if protocol (socks4
|socks5
) is not specified, http
is used by default