Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   12456

OVH Method Leak and explaination.

by Varkov - 21 February, 2021 - 12:30 AM
This post is by a banned member (BenDover699) - Unhide
33
Posts
0
Threads
4 Years of service
#25
nice man i use
This post is by a banned member (aprxl) - Unhide
This post is by a banned member (paidfortrust) - Unhide
7
Posts
0
Threads
5 Years of service
#27
(21 February, 2021 - 12:30 AM)Varkov Wrote: Show More
dgGeneral Information
Name: OVH-SLAVIC.C
Targets: OVH Servers
Protocol: UDP
Type: Raw
Payload (hex): 081e77da + random
 
Description:
This method was used on several stressers under different names.
It was sold by someone called 'Slavicd' who claims to have written the code but in reality was just reselling a script.
 
Disclaimer
Only use the method for education purpose only.
 

drgfrdhtgfh
This post is by a banned member (Xeon64) - Unhide
Xeon64  
Registered
33
Posts
0
Threads
4 Years of service
#28
Thanks' dude
This post is by a banned member (Adria122) - Unhide
Adria122  
Registered
39
Posts
0
Threads
3 Years of service
#29
(21 February, 2021 - 12:30 AM)Varkov Wrote: Show More
General Information
Name: OVH-SLAVIC.C
Targets: OVH Servers
Protocol: UDP
Type: Raw
Payload (hex): 081e77da + random
 
Description:
This method was used on several stressers under different names.
It was sold by someone called 'Slavicd' who claims to have written the code but in reality was just reselling a script.
 
Disclaimer
Only use the method for education purpose only.
 
[url=https://github.com/Varkov/DDoS/tree/main/DDoS%20Scripts/UDP/OVH-Slavic][/url]
Blokmmmmnn thinking :PepoThink: pepeokay heyguys Ughpepe Ughpepe :pepegun:
This post is by a banned member (TKS96) - Unhide
TKS96  
Registered
14
Posts
0
Threads
3 Years of service
#30
thank you brother
This post is by a banned member (HappyHarding) - Unhide
20
Posts
0
Threads
4 Years of service
#31
(21 February, 2021 - 12:30 AM)Varkov Wrote: Show More
General Information
Name: OVH-SLAVIC.C
Targets: OVH Servers
Protocol: UDP
Type: Raw
Payload (hex): 081e77da + random
 
Description:
This method was used on several stressers under different names.
It was sold by someone called 'Slavicd' who claims to have written the code but in reality was just reselling a script.
 
Disclaimer
Only use the method for education purpose only.
 
thanks sir
This post is by a banned member (melad90028) - Unhide

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 13 Guest(s)