Skip to content

DoS shell in PHP --- Methods: UDP, TCP, HTTP, and TLS exhaustion

Notifications You must be signed in to change notification settings

waived/waive-shell

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

27 Commits
 
 
 
 
 
 

Repository files navigation

WAIVE SHELL:
    This is a Denial-of-Service shell coded in PHP. It supports UDP, TCP, TLS, and HTTP floods. WaiveShell has a
    clickable interface and also supports direct API calls via HTTP-GET. The layer-4 attack vectors have dynamic
    data buffers, ranging from 1000 to 1200 bytes per packet (which can be modified). The TLS exhaustion attack
    is of a fixed-length, however the data buffer is dynamic as the byte-padding is randomized per each packet.

    This shell is NOT obfuscated!
    Use ChatGPT (https://chatgpt.com/) or other proprietary software for a custom obfuscation to be applied.

    Shells are uploaded to hacked websites via RFI, LFI, SQL Injection, etc.

    WaiveShell takes four parameters: TYPE, HOST, PORT, and TIME

        ---- TYPE: the type is specified by "udp", "tcp", "tls" or "http"
        ---- HOST: WaiveShell accepts either an IP address of a Domain Name. Do NOT enter a complete URL!
        ---- PORT: ports range from 1 to 65,535. Ensure your endpoint has the specified port open before attacking.
                   For the TLS attack, the default HTTPS port is 443 and should be used unless an alternate HTTPS
                   port is being used, ex: port 8080 https-proxy
        ---- TIME: the duration in seconds for the attack to run. Once WaiveShell is executed, the attacks cannot 
                   be aborted!

    Example: http://www.vulnerable.com/files/waiveshell.php?type=udp&host=www.example.com&port=80&time=300

NOTE:
    All attack-traffic has been confirmed via Wireshark. Payloads structure correct and not malformed, etc.

Releases

No releases published

Packages

No packages published

Languages