{"id":13539546,"url":"https://github.com/649/memcrashed-ddos-exploit","last_synced_at":"2025-04-02T06:31:02.847Z","repository":{"id":38361902,"uuid":"123632038","full_name":"649/Memcrashed-DDoS-Exploit","owner":"649","description":"DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API","archived":false,"fork":false,"pushed_at":"2022-12-02T07:14:59.000Z","size":133,"stargazers_count":1336,"open_issues_count":45,"forks_count":467,"subscribers_count":75,"default_branch":"master","last_synced_at":"2024-11-21T16:39:22.459Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/649.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2018-03-02T21:19:51.000Z","updated_at":"2024-11-12T20:25:20.000Z","dependencies_parsed_at":"2023-01-23T22:02:10.551Z","dependency_job_id":null,"html_url":"https://github.com/649/Memcrashed-DDoS-Exploit","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/649%2FMemcrashed-DDoS-Exploit","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/649%2FMemcrashed-DDoS-Exploit/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/649%2FMemcrashed-DDoS-Exploit/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/649%2FMemcrashed-DDoS-Exploit/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/649","download_url":"https://codeload.github.com/649/Memcrashed-DDoS-Exploit/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":246767754,"owners_count":20830547,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-08-01T09:01:27.654Z","updated_at":"2025-04-02T06:31:00.477Z","avatar_url":"https://github.com/649.png","language":"Python","readme":"# MEMCRASHED DDOS EXPLOIT TOOL\n\n* Author: [@037](https://twitter.com/037)\n\nThis tool allows you to send forged UDP packets to Memcached servers obtained from Shodan.io\n\n### Prerequisites\n\nThe only thing you need installed is Python 3.x\n\n```\napt-get install python3\n```\n\nYou also require to have Scapy and Shodan modules installed\n```\npip install scapy\n```\n\n```\npip install shodan\n```\n\n### Using Shodan API\n\nThis tool requires you to own an upgraded Shodan API\n\nYou may obtain one for free in [Shodan](https://shodan.io/) if you sign up using a .edu email\n\n![alt text](https://raw.githubusercontent.com/649/Memcrashed-DDoS-Exploit/master/2.png)\n![alt text](https://raw.githubusercontent.com/649/Memcrashed-DDoS-Exploit/master/1.png)\n![alt text](https://raw.githubusercontent.com/649/Memcrashed-DDoS-Exploit/master/3.png)\n![alt text](https://raw.githubusercontent.com/649/Memcrashed-DDoS-Exploit/master/4.png)\n\n\n### Using Docker\n\n##### [Demo](https://asciinema.org/a/v1AEEa17xzqUfyW4pEIS0JONW)\n\nYou may deploy this tool to the cloud using a light Alpine Docker image.\n\n\u003e Note: Make sure to explicitly enter 'y' or 'n' to the interactive prompt\n\n```bash\ngit clone https://github.com/649/Memcrashed-DDoS-Exploit.git\ncd Memcrashed-DDoS-Exploit\necho \"SHODAN_KEY\" \u003e api.txt\ndocker build -t memcrashed .\ndocker run -it memcrashed\n\n```\n\n","funding_links":[],"categories":["\u003ca id=\"a76463feb91d09b3d024fae798b92be6\"\u003e\u003c/a\u003e侦察\u0026\u0026信息收集\u0026\u0026子域名发现与枚举\u0026\u0026OSINT","\u003ca id=\"170048b7d8668c50681c0ab1e92c679a\"\u003e\u003c/a\u003e工具"],"sub_categories":["\u003ca id=\"18c7c1df2e6ae5e9135dfa2e4eb1d4db\"\u003e\u003c/a\u003eShodan"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2F649%2Fmemcrashed-ddos-exploit","html_url":"https://awesome.ecosyste.ms/projects/github.com%2F649%2Fmemcrashed-ddos-exploit","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2F649%2Fmemcrashed-ddos-exploit/lists"}