Skip to content
This repository has been archived by the owner on Mar 14, 2022. It is now read-only.
/ stoprussia Public archive

Russia MUST BE STOPPED! This repository contains a set of tools to attack russian services such as news, food delivery, transport and more for both technical and non-technical kind of persons

License

Notifications You must be signed in to change notification settings

0x77dev/stoprussia

Repository files navigation

Archived due to small activity and better alternatives

StopRussia

banner

Russia MUST BE STOPPED! This repository contains a set of tools to attack russian services such as news, food delivery, transport and more for both technical and non-technical kind of persons

List is updated once a hour according to: IT Army of Ukraine and ddos котики Ukrainian communities

How to get started?

First of all, do not do this at full power from Ukrainian providers, this can harm the connectivity of other people with the world by taking down providers if a lot of people will do this simultaneously.

Also you need to use a VPN if you running this on your local machine, because many of the services uses region blocking to not accept requests from Ukraine

ClearVPN is a good choice, use can use promo-code SAVEUKRAINE to get free access for a year

Web browser

You can use web tool to start DDoS on russian services: https://stoprussia.0x77.dev

CLI

Install Node.js >=16

npm i -g stoprussia autocannon
stoprussia

Running in war mode

stoprussia -p -t 2 -b 4

or

stoprussia -p -t 2 -b 3

Choosing battlefield

stoprussia -b 4

Running in power mode

Do not use it Ukraine! This mode requires a lot of network throughput This mode multiplies threads by 2

stoprussia -p -t 2

Docker

Install Docker

Single instance:

docker run -it ghcr.io/0x77dev/stoprussia:main

Running multiple instances:

docker run -t ghcr.io/0x77dev/stoprussia:main -b 1 &
docker run -t ghcr.io/0x77dev/stoprussia:main -b 2 &
docker run -t ghcr.io/0x77dev/stoprussia:main -b 3 &
docker run -t ghcr.io/0x77dev/stoprussia:main -b 4

More coming soon

More performant desktop, docker and kubernetes versions coming soon...

Choosing battlefield

The list of targets are split into 4 chunks each chunk called battlefield

Battlefield 1: passive attack and low priority services

Battlefield 2: passive attack and medium priority services

Battlefield 3: active attack and medium priority services

Battlefield 4: active attack and high priority services

Battlefield 3 and 4 is the main focus to DDoS

How can I get the list of targets?

Targets list are distributed over IPFS

You get it by resolving IPNS name

ipns://srl.0x77.dev

by requesting Cloudflare Gateway:

https://srl.0x77.dev

or by requesting Cloudflare Gateway directly:

https://cloudflare-ipfs.com/ipns/srl.0x77.dev

or by requesting public IPFS gateway:

https://ipfs.io/ipns/srl.0x77.dev

About

Russia MUST BE STOPPED! This repository contains a set of tools to attack russian services such as news, food delivery, transport and more for both technical and non-technical kind of persons

Topics

Resources

License

Security policy

Stars

Watchers

Forks

Packages