This post is by a banned member (zantyy) - Unhide
22 February, 2021 - 07:52 AM
Reply
This post is by a banned member (Hub62) - Unhide
22 February, 2021 - 11:20 AM
Reply
This post is by a banned member (eatmyrectum) - Unhide
23 February, 2021 - 07:43 AM
Reply
theres no way this is source but ok thx
This post is by a banned member (battlefrite3) - Unhide
23 February, 2021 - 06:47 PM
Reply
This post is by a banned member (CreedoW_Issues) - Unhide
23 February, 2021 - 06:59 PM
Reply
This post is by a banned member (Klunk) - Unhide
23 February, 2021 - 11:24 PM
Reply
hmmm how much power dose it have?
This post is by a banned member (makaro1012) - Unhide
27 February, 2021 - 08:45 PM
Reply
This post is by a banned member (bhencher) - Unhide
28 February, 2021 - 06:06 PM
Reply
(21 February, 2021 - 12:30 AM)Varkov Wrote: Show MoreGeneral Information
Name: OVH-SLAVIC.C
Targets: OVH Servers
Protocol: UDP
Type: Raw
Payload (hex): 081e77da + random
Description:
This method was used on several stressers under different names.
It was sold by someone called 'Slavicd' who claims to have written the code but in reality was just reselling a script.
Disclaimer
Only use the method for education purpose only.
Interesting bro :D