Login Register






Thread Rating:
  • 0 Vote(s) - 0 Average


[PHP] AntiDOS Script filter_list
Author
Message
[PHP] AntiDOS Script #1
My friend give me this AntiDos script, but i am not sure it will works...
Try it..

PHP Code:
<?php
///////////////////////////////////////////////////////////
Antiddos PHP Skriptaby Serbian Cyber Team === === It is BEST to use AntiDDOS on VPS or Dedicated Servers...

\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
*/
$debug false// debug mode, disabled ban, Jednostavno pokazuje dali je ip bio banovan ili nije.
if ($debugerror_reporting(E_ALL);
else 
error_reporting(0);


/* Possible values - $ddos 1-5:
| 1. Check withcookies
| 2. Duble check $_GET antiddos-a i meta refresh-a
| 3. Request for WWW-Authenticate
| 4. Disable all, but BOT's can not disable..
| 5. Turn off site if it is big BUG.
*/

$ddos 1;
$log false;
$dir dirname(__file__) . '/cyki_bots/'//DDOS l
$ddos_redirect_host 'http://google.com/'// Forwarding DDOS-a
$icq '123456'//Admins ICQ
$off_message 'BUG.'//
$anticyka md5(sha1('botik' strrev(getenv('HTTP_USER_AGENT'))));
$ban_message 'You have been banned, try to contact administrator admin@hackcomunity.com' .
$icq '<hr>(c)XakNet antiddos module'// Ban msg
$exec_ban "iptables -A INPUT -s " $_SERVER["REMOTE_ADDR"] . " -j DROP"// ÃƒÂÃ‚´ÃÂ»Ã‘ iptables(Debian/ubuntu/etc)
$load sys_getloadavg(); // Funkcija za preuzimanje opterecenja \=\
$ddosuser 'lol_ddos';
$ddospass substr(ip2long($_SERVER['REMOTE_ADDR']), 0rand(24));
//nije testirano //Check:

$google strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "googlebot.com") !== false;
$yandex strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "yandex.ru") !== false;
$rambler strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "ramtel.ru") !== false;
$rambler2 strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "rambler.ru") !== false;
$aport strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "aport.ru") !== false;
$sape strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "sape.ru") !== false;
$msn strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "msn.com") !== false;
$yahoo strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "yahoo.net") !== false;
//
if(!file_exists($dir 'banned_ips')) file_put_contents($dir 'banned_ips''');
if (
strstr(file_get_contents($dir 'banned_ips'), $_SERVER['REMOTE_ADDR']))
die(
$ban_message); //GTFO )


if (! $google || ! $yandex || ! $rambler || ! $rambler2 || ! $aport || ! $sape ||
$msn || ! $yahoo) {

$f fopen($dir $_SERVER["REMOTE_ADDR"], "a");
fwrite($f"zapros cyka\n");
fclose($f);
function 
ban()
{
if (! 
system($exec_ban)) {
$f fopen($dir 'banned_ips'"a");
fwrite($f$_SERVER['REMOTE_ADDR'] . '|');
fclose($f);
}
echo 
$ban_message;
header('Location: ' $ddos_redirect_host '');
die();
}
switch (
$ddos) {
///////////////////////////
case 1:
if (empty(
$_COOKIE['ddos']) or ! $_COOKIE['ddos']) {
$counter = @file($dir $_SERVER["REMOTE_ADDR"]);
setcookie('ddos'$anticykatime() + 3600 24 356);
if (
count($counter) > 10) {
if (! 
$debugban();

else die(
"Blocked");

}
if (! 
$_COOKIE['ddos_log'] == 'bil') {
if (! 
$_GET['antiddos'] == 1) {
setcookie('ddos_log''bil'time() + 3600 24 356);
header("Location: ./?antiddos=1");
}
}
} elseif (
$_COOKIE['ddos'] !== $anticyka) {
if (! 
$debugban();

else die(
"Blocked.");

}
break;
/////////////////////////
case 2:
if (empty(
$_COOKIE['ddos'])) {
if (empty(
$_GET['antiddos'])) {
if (! 
$_COOKIE['ddos_log'] == 'bil')
//Checking cookies for request
die('<meta http-equiv="refresh" content="0;URL=?antiddos=' $anticyka '" />');

} elseif (
$_GET['antiddos'] == $anticyka) {
setcookie('ddos'$anticykatime() + 3600 24 356);
setcookie('ddos_log''bil'time() + 3600 24 356);
}
else {

if (! 
$debug) {
ban();
die(
"Forward line of adress");
}
else {
echo 
"Forward line of adress";
die(
"Blocked.");
}
}
}
break;
case 
3:
if (! isset(
$_SERVER['PHP_AUTH_USER']) || $_SERVER['PHP_AUTH_USER'] !== $ddosuser ||
$_SERVER['PHP_AUTH_PW'] !== $ddospass) {
header('WWW-Authenticate: Basic realm="Vvedite parol\': ' $ddospass .
' | Login: ' $ddosuser '"');
header('HTTP/1.0 401 Unauthorized');
if (! 
$debugban();

else die(
"Blocked");

die(
"<h1>401 Unauthorized</h1>");
}
break;
case 
4:
die(
$off_message); //Site turned off
break;
case 
5:
if (
$load[0] > 80) {
header('HTTP/1.1 503 Too busy, try again later');
die(
'<center><h1>503 Server too busy.</h1></center><hr><small><i>Server too busy. Please try again later. Apache server on ' .
$_SERVER['HTTP_HOST'] .
' at port 80 with <a href="http://serbiancyberteam.com/">ddos protect</a></i></small>');
}
break;
default:
break;
//////////////////////////
}
if (
$_COOKIE['ddos'] == $anticyka) @unlink($dir $_SERVER["REMOTE_ADDR"]);
}
......................................................................................
//////////////////////////////////////////////////////////////////////////////////////
///////////////////////////////By SCT////////////////////////////////////////
//////////////////////////////////////////////////////////////////////////////////////
......................................................................................

?>
[Image: 1308031172619.gif?w=356&h=140]
Don't learn to hack, hack to learn.

Reply

[PHP] AntiDOS Script #2
My friend give me this AntiDos script, but i am not sure it will works...
Try it..

PHP Code:
<?php
///////////////////////////////////////////////////////////
Antiddos PHP Skriptaby Serbian Cyber Team === === It is BEST to use AntiDDOS on VPS or Dedicated Servers...

\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
*/
$debug false// debug mode, disabled ban, Jednostavno pokazuje dali je ip bio banovan ili nije.
if ($debugerror_reporting(E_ALL);
else 
error_reporting(0);


/* Possible values - $ddos 1-5:
| 1. Check withcookies
| 2. Duble check $_GET antiddos-a i meta refresh-a
| 3. Request for WWW-Authenticate
| 4. Disable all, but BOT's can not disable..
| 5. Turn off site if it is big BUG.
*/

$ddos 1;
$log false;
$dir dirname(__file__) . '/cyki_bots/'//DDOS l
$ddos_redirect_host 'http://google.com/'// Forwarding DDOS-a
$icq '123456'//Admins ICQ
$off_message 'BUG.'//
$anticyka md5(sha1('botik' strrev(getenv('HTTP_USER_AGENT'))));
$ban_message 'You have been banned, try to contact administrator admin@hackcomunity.com' .
$icq '<hr>(c)XakNet antiddos module'// Ban msg
$exec_ban "iptables -A INPUT -s " $_SERVER["REMOTE_ADDR"] . " -j DROP"// ÃƒÂÃ‚´ÃÂ»Ã‘ iptables(Debian/ubuntu/etc)
$load sys_getloadavg(); // Funkcija za preuzimanje opterecenja \=\
$ddosuser 'lol_ddos';
$ddospass substr(ip2long($_SERVER['REMOTE_ADDR']), 0rand(24));
//nije testirano //Check:

$google strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "googlebot.com") !== false;
$yandex strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "yandex.ru") !== false;
$rambler strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "ramtel.ru") !== false;
$rambler2 strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "rambler.ru") !== false;
$aport strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "aport.ru") !== false;
$sape strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "sape.ru") !== false;
$msn strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "msn.com") !== false;
$yahoo strpos(gethostbyaddr($_SERVER['REMOTE_ADDR']), "yahoo.net") !== false;
//
if(!file_exists($dir 'banned_ips')) file_put_contents($dir 'banned_ips''');
if (
strstr(file_get_contents($dir 'banned_ips'), $_SERVER['REMOTE_ADDR']))
die(
$ban_message); //GTFO )


if (! $google || ! $yandex || ! $rambler || ! $rambler2 || ! $aport || ! $sape ||
$msn || ! $yahoo) {

$f fopen($dir $_SERVER["REMOTE_ADDR"], "a");
fwrite($f"zapros cyka\n");
fclose($f);
function 
ban()
{
if (! 
system($exec_ban)) {
$f fopen($dir 'banned_ips'"a");
fwrite($f$_SERVER['REMOTE_ADDR'] . '|');
fclose($f);
}
echo 
$ban_message;
header('Location: ' $ddos_redirect_host '');
die();
}
switch (
$ddos) {
///////////////////////////
case 1:
if (empty(
$_COOKIE['ddos']) or ! $_COOKIE['ddos']) {
$counter = @file($dir $_SERVER["REMOTE_ADDR"]);
setcookie('ddos'$anticykatime() + 3600 24 356);
if (
count($counter) > 10) {
if (! 
$debugban();

else die(
"Blocked");

}
if (! 
$_COOKIE['ddos_log'] == 'bil') {
if (! 
$_GET['antiddos'] == 1) {
setcookie('ddos_log''bil'time() + 3600 24 356);
header("Location: ./?antiddos=1");
}
}
} elseif (
$_COOKIE['ddos'] !== $anticyka) {
if (! 
$debugban();

else die(
"Blocked.");

}
break;
/////////////////////////
case 2:
if (empty(
$_COOKIE['ddos'])) {
if (empty(
$_GET['antiddos'])) {
if (! 
$_COOKIE['ddos_log'] == 'bil')
//Checking cookies for request
die('<meta http-equiv="refresh" content="0;URL=?antiddos=' $anticyka '" />');

} elseif (
$_GET['antiddos'] == $anticyka) {
setcookie('ddos'$anticykatime() + 3600 24 356);
setcookie('ddos_log''bil'time() + 3600 24 356);
}
else {

if (! 
$debug) {
ban();
die(
"Forward line of adress");
}
else {
echo 
"Forward line of adress";
die(
"Blocked.");
}
}
}
break;
case 
3:
if (! isset(
$_SERVER['PHP_AUTH_USER']) || $_SERVER['PHP_AUTH_USER'] !== $ddosuser ||
$_SERVER['PHP_AUTH_PW'] !== $ddospass) {
header('WWW-Authenticate: Basic realm="Vvedite parol\': ' $ddospass .
' | Login: ' $ddosuser '"');
header('HTTP/1.0 401 Unauthorized');
if (! 
$debugban();

else die(
"Blocked");

die(
"<h1>401 Unauthorized</h1>");
}
break;
case 
4:
die(
$off_message); //Site turned off
break;
case 
5:
if (
$load[0] > 80) {
header('HTTP/1.1 503 Too busy, try again later');
die(
'<center><h1>503 Server too busy.</h1></center><hr><small><i>Server too busy. Please try again later. Apache server on ' .
$_SERVER['HTTP_HOST'] .
' at port 80 with <a href="http://serbiancyberteam.com/">ddos protect</a></i></small>');
}
break;
default:
break;
//////////////////////////
}
if (
$_COOKIE['ddos'] == $anticyka) @unlink($dir $_SERVER["REMOTE_ADDR"]);
}
......................................................................................
//////////////////////////////////////////////////////////////////////////////////////
///////////////////////////////By SCT////////////////////////////////////////
//////////////////////////////////////////////////////////////////////////////////////
......................................................................................

?>
[Image: 1308031172619.gif?w=356&h=140]
Don't learn to hack, hack to learn.

Reply

RE: [PHP] AntiDOS Script #3
thanks for the share ill go make one later my own style Biggrin
Pierce the life fibers with your drill.

Reply

RE: [PHP] AntiDOS Script #4
thanks for the share ill go make one later my own style Biggrin
Pierce the life fibers with your drill.

Reply

RE: [PHP] AntiDOS Script #5
(07-21-2011, 09:38 PM)1234hotmaster Wrote: thanks for the share ill go make one later my own style Biggrin

nnc... I like to help everybody..
[Image: 1308031172619.gif?w=356&h=140]
Don't learn to hack, hack to learn.

Reply

RE: [PHP] AntiDOS Script #6
(07-21-2011, 09:38 PM)1234hotmaster Wrote: thanks for the share ill go make one later my own style Biggrin

nnc... I like to help everybody..
[Image: 1308031172619.gif?w=356&h=140]
Don't learn to hack, hack to learn.

Reply

RE: [PHP] AntiDOS Script #7
thx , i am gonna try it.
anyone checked it? Does it works?

Reply

RE: [PHP] AntiDOS Script #8
Man it works.. I checked it ! Trust me
[Image: 1308031172619.gif?w=356&h=140]
Don't learn to hack, hack to learn.

Reply

RE: [PHP] AntiDOS Script #9
Code:
Parse error: syntax error, unexpected T_STRING in /home/SITE/public_html/antidos.php on line 3
[Image: 5Y220l1.png]
[FREE] iPentagram Version4 - AIO Hacking Tool.
/ IPTracer, Shellbooter, Vuln.Scanner, DorkScanner, AnonEmailClient, Encrypter/Decrypter & more. /

Reply

RE: [PHP] AntiDOS Script #10
Just chane it, if you know, right now i have no time to do that ! Smile
[Image: 1308031172619.gif?w=356&h=140]
Don't learn to hack, hack to learn.

Reply







Users browsing this thread: 1 Guest(s)