Installing mhddos_proxy for Android with Termux

17 April 2023 6 minutes Author: Cyber Witcher

Phone as a kind of cyber-weapon?

A mobile phone is an autonomous mobile phone designed to work in mobile communication networks; uses a radio range receiver and traditional telephone switching to carry out telephone communication in the territory of the network coverage area. Today, cellular communication is the most common of all types of mobile communication, so it is usually a cellular phone that is called a “mobile phone”, although mobile phones, in addition to cellular phones, also include satellite phones, radio phones and trunk communication devices. A mobile phone is a high-tech electronic device that includes: a receiver in the 1-2 GHz (GSM) and 2-4 GHz (UMTS) microwave sub-bands, a specialized control controller, a color/monochrome display, interface devices, and a battery. Most devices have their own unique number, the so-called IMEI is the international identifier of a mobile device.

IMEI is assigned during the production of a mobile phone and consists of 15 digits; it is recorded in the unmodified part of the phone’s firmware (*#*#089*#*#). This number itself is printed on the label of the phone under the battery or on the receipt, as well as on the wrapper (packaging) from the phone (under the barcode). Today, a telephone is not a rarity or a luxury in our lives. This is not because all people have become infinitely rich and can afford everything, but because there has been a huge availability of analogues for people with different desires and capabilities. Some fifteen years ago, it was difficult to imagine that even small children would walk around with a phone in their pocket and his parents would be able to contact him at any moment. A person who would say that in his pocket there will be a small sensor box without buttons that will have everything: from ordinary calls to TV, then he would be looked at as a madman. A mobile phone is an indispensable assistant in life. In our difficult situation, the phone becomes assistant No. 1, because thanks to it we can prevent the development of the aggressor country, so you didn’t hear that you have the opportunity to organize Ddos attacks from the phone. You ask how? Well, I will answer you, there is nothing complicated about it, and the step-by-step instructions will help you figure it out.

When installing, you must grant all permissions to the program!!!

Follow the link and choose:

termux-app_v0.118.0+github-debug_universal.apk and download. (link)

Step 1. Installation

  • 1. apt update && apt upgrade -y (in the process of executing the command, you will need to write Y a couple of times to confirm the update, so follow carefully)

  • 2. pcg install python -i && pcg install rust -i && pcg install hit -i

  • 3. with. pip install –upgrade pip

  • 4. h. tsd ~

  • 5. This is specific depending on the architecture of the processor. But let’s say I set the priority for you, if you don’t know what architecture you have, then try to install this change by going through my priority until the installation is successful.

    Architecture priorities

export CARGO_BUILD_TARGET=i686-linux-android

export CARGO_BUILD_TARGET=x86_64-linux-android

export CARGO_BUILD_TARGET=aarch64-linux-android

export CARGO_BUILD_TARGET=arm-linux-androideabi

export CARGO_BUILD_TARGET=armv7-linux-androideabi

export CARGO_BUILD_TARGET=thumbv7neon-linux-androideabi

  • 6. export CARGO_BUILD_TARGET={processor architecture}

One admin looks like this:

export CARGO_BUILD_TARGET=aarch64-linux-android

The other one has:

export CARGO_BUILD_TARGET=x86_64-linux-android


  • 7. termukh-stup-storage

  • 8. pcg install hit -i

  • 9. cd ~/storage/shared

  • 10. rm -rf mgddos_prokhi

It may appear like this, but this is normal. Or it simply won’t show anything – move on.

For Android DDoS -t should not exceed 1500 and –rpc should not exceed 1000

Done, now after the complete closure of Termux, to start a new attack, you need to go to point 2 “Launching commands” (it is small).

Step 2. Launch commands

In the future, after a successful installation, you will only need to do the following commands:

1. Open Termux through the icon on the main screen.

2. Go to the folder with mhddos_proxy – you need to enter:

3. Update the script:

4. Download new dependencies:

5. Launch the attack:

Step 3. Command template

  • Site Targets – Targets in a single-level attack using a single attack method specified in –http-methods can be listed with a space, or can be specified as a remote config via -c URL (where each target must be on a new line ). In this case, the number of targets will be divided into each method equally from the number you specified.
  • – the shell / program that will read and execute the code of the runner programs.
  • You can specify any types of ports in one command, for example: http://, https://, tcp://, udp:// – all of them will be divided into the required methods, for http and https the methods from the list will be taken –http-methods , and for tcp and udp always use TCP and UDP methods respectively.
  • Method – You can familiarize yourself with all the methods on the github itself ( ). All the commands that we prepare in our channel – we prepare already with the methods necessary for the attack). At the same attack level, methods can also be enumerated by omission. The most common methods are: –http-methods GET STRESS.
  • Threads are the number of “malicious” packets/requests in t * number_of_cores sent to the target. Here you can twist to the maximum as much as your PC can handle (monitor the load in the task manager, we look at the CPU and RAM, in Kali Linux it is a green and blue graph, respectively). Be careful, at the beginning of the attack, the load may be minimal, and after a while, it will skyrocket. Note that as packages/threats increase, the number of proxy servers may decrease. By default 1000, optionally – as much as will fit into your machine (but no more than 6000): In this command: -t 1500 (for Termux no more than 1500).
  • – the attack script itself.
  • Connections – Here we indicate the estimated number of connections to one proxy server. It is optimal to specify from 1000 to 2000. Let’s say that you have 1000 proxy servers, if you specify 1000 connections, you will send 1,000,000 packets to your destination (ideally, but a certain percentage of packets can most likely be lost). Currently, the optimal value is –rpc 1000.
  • Also, if you are connected to a VPN, you can add the –vpn option, with which the attack will take place directly from your IP, but then you need to reconnect the VPN every 10-20 minutes.
Other related articles
Found an error?
If you find an error, take a screenshot and send it to the bot.