Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/waived/cloudflare-bypass
HTTP DDoS attack | Bypass Cloudflare CDN/WAF | Integrated SOCKS4 support | Header randomization/proxification
https://github.com/waived/cloudflare-bypass
bypass-firewall cache-busting cloudflare-bypass cloudflare-bypass-script http-bypass http-ddos proxy-ddos python3 socks4-proxy
Last synced: 11 days ago
JSON representation
HTTP DDoS attack | Bypass Cloudflare CDN/WAF | Integrated SOCKS4 support | Header randomization/proxification
- Host: GitHub
- URL: https://github.com/waived/cloudflare-bypass
- Owner: waived
- Created: 2025-01-09T05:46:29.000Z (18 days ago)
- Default Branch: main
- Last Pushed: 2025-01-09T06:05:02.000Z (18 days ago)
- Last Synced: 2025-01-09T06:42:38.591Z (18 days ago)
- Topics: bypass-firewall, cache-busting, cloudflare-bypass, cloudflare-bypass-script, http-bypass, http-ddos, proxy-ddos, python3, socks4-proxy
- Language: Python
- Homepage:
- Size: 0 Bytes
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.txt
Awesome Lists containing this project
README
/////////////////////////////////////////////
/// CLOUDFLARE CDN/WAF DDOS BYPASS SCRIPT ///
/////////////////////////////////////////////Overview:
Because of the increased need for secure, many modern websites implement some
sort of reverse-proxy technology. At the forefront of this technology, is most
commonly found: CloudFlare. This organization offers many reverse-proxy services
such as Cloudflare's CDN (Content Delivery Network) and WAF (Web Application
Firewall). Instead of a domain pointing to the IP Address of the "origin server"
(the true device an attack is attempting to attack) the domain points to one of
these services.This means each request sent must be inspected and assuming its not malicious or
malformed in any way, will be passed to the origin server. That request is processed,
sent to the reverse proxy, and the reverse proxy then sends the response back to the
client.During instances of abuse (DDoS, wordlist attacks, URL tampering, etc) Cloudflare
will begin blocking these requests, either throwing them out altogether or by
enabling rate-limit techniques to buffer an over-influx of traffic. This can
easily defeat basic HTTP-based Denial-of-Service attacks.This script however aims to bypass Cloudflare services and the many techniques
implemented when trying to mitigate HTTP DDoS attacks. It uses proxification
(via public SOCKS4 proxies), header randomization, and a finite amount of requests
per utilized proxy to forward dynamic and abusive HTTP traffic directly to the
origin server. Because each request is unique (random user-agent, URL refer, etc)
the requests will not be cached and will always take up server-side resources
at the origin.Note:
This script can also bypass Cloudflare UAM (Under Attack Mode). Although this
script is designed to be used against Cloudflare services, it also works against
services belonging to Akamai, BlazingFast, Amazon CloudFront (part of AWS), etc.Requirements:
This script requires a few Python libraries to run that may not be installed on
your system. These requirements can be found in the "requirements.txt" file.They can be installed via: "pip install -r requirements.txt"
Or by manually installing the latest version:
pip install requests[socks]
pip install PySocks