Installing mhddos_proxy directly on your computer

18 April 2023 7 minutes Author: Cyber Witcher

Why is mhddos_proxy needed?

Choosing the right operating system is the key to efficient and trouble-free work. The operating system affects convenience and security and is used not only for data processing and storage. The goal of DDoS is to overload the host server. Therefore, one solution to prevent data theft is to store your data on multiple servers around the world. Before proceeding to the consideration of the specifics of a DDoS attack, it is necessary to dwell in more detail on what a typical DoS attack is. “Denial-of-Service” translated from English means “Refusal of service”. The goal of most attacks is either unauthorized access to the system or obtaining administrator rights.

A DoS attack is characterized by achieving the same “denial of service”. That is, bringing a network or other resource into such a state that it can process requests from legitimate users. There are many options for conducting such an attack. The situation began to change at the end of the 20th century, when the first DDoS tools appeared and the first distributed attacks were carried out. Thus, another letter “D” was added to DoS attacks. With the advent of such tools, the very concept of conducting attacks has changed, and many attack detection tools have turned out to be powerless. In this article, I want to share a manual thanks to which you will be able to direct a Ddos attack in the right direction with the help of the mhddos_proxy utility. It has a built-in database of proxy servers with a large number of IP addresses around the world, a huge variety of load testing methods, and the ability to set a huge number of targets with automatic load balancing while using the efficient use of your resources thanks to the asynchronous architecture is simply amazing. The only difference is the environment in which the data is processed.

Instructions for installing mhddos_proxy on your computer

Step 1. Install Python3:

Method 1 (very simple)

1) Go to cmd (Command line).

2) ->We write python3.

->press Enter.

If you already have it, it will be like this:

After receiving python3, close this terminal (command line) window.

If you still don’t have python3, you will be redirected to the Microsoft store, click Get. If it didn’t work through cmd (Command time), or you have Python below 3.10 (you can check it like python –version) – try to go to the Microsoft Store yourself and find and install Python3.10 there.

Method 2:


1)Download python:

Click in this order.

2) Run the downloaded file.

Next, everything is by default everywhere, click Next / Yes.

Step 2. Installing Git:

1) To begin with, you still need to install Notepad++ (a convenient code editor, you will like it even after we win the war):

2) Download the git`a installer:

Wait for it to download, then run the downloaded file.

3) It is necessary to set clearly moving photos:


Step 3. Install the mhddos_proxy script itself

1) Open My computer / This computer:

2) We are looking for the desktop folder:

3) Go to the Desktop folder:

4) And in the selected area, write the three letters cmd:

5) And press Enter – the Terminal window will open:

6) Next, write the following command:

git clone

and press Enter.

The following message is possible: fatal: destination path ‘mhddos_proxy’ already exists and is not an empty directory. – this means that a folder is needed – just follow the instructions to point 4.

7) The desired program has been downloaded, you need to go to the folder with this program and write:

Immediately download the necessary dependencies:

The final result should be like this. Now we can move on to launching the attack.

Step 4. Launch the attack

1)After all the previous points, in the future you will need to EXECUTE ONLY THIS POINT:

We find the folder with mhddos_proxy on the Desktop:

2) Open it and to enter the Terminal from this folder, write cmd in the field and press Enter:

3) Run the following commands in the opened terminal:

If you have everything installed with the latest version, you will see a message like this:

If not, it will install the latest version:

4) Now you need to install the dependencies again (and suddenly they have also been updated):

5) You need to install a super-fast and stable VPN so that your ISP does not cut traffic due to connecting to many IPs (proxies). If you will be without a VPN, then you may lose the Internet on the router in general, because providers do not like it when traffic goes from their IP to a large number of other IPs (proxies)

6) To attack, enter the following command, for example:

Congratulations, the attack has started. Zero is normal, especially at the beginning of the attack while the script is “accelerating”.

7) To stop the attack: in the open window with the attack, press Ctrl+C (or you can just click on the cross and close the window)

To add your current IP (or the IP of a connected VPN) to the attack along with the proxy, add –vpn to the end of the command. Example:

Step 5. Command template for custom attacks:

  • Python3 is a shell / program that will read and execute the code of the programs.
  • is the attack script itself.
  • Site Targets – Targets in a single-level attack using a single attack method specified in –http-methods can be listed with a space, or can be specified as a remote config via -c URL (where each target must be on a new line ). In this case, the number of targets will be divided into each method equally from the number you specified. You can specify any types of ports in one command, for example: http://, https://, tcp://, udp:/ / – all of them will be split into the required methods, for http and https the methods from the –http-methods list will be taken, and for tcp and udp always TCP and UDP methods are used, respectively.
  • Methods – All methods can be found on GitHub itself. All the commands that we prepare in our channel – we prepare already with the methods necessary for the attack). At the same attack level, methods can also be enumerated by omission. The most common methods are: –http-methods GET STRESS.
  • Threads are the number of “malicious” packets/requests in t * number_of_cores sent to the target. Here you can twist to the maximum as much as your PC can handle (monitor the load in the task manager, we look at the CPU and RAM, in Kali Linux it is a green and blue graph, respectively). Be careful, at the beginning of the attack, the load may be minimal, and after a while, it will skyrocket. Note that as packages/threats increase, the number of proxy servers may decrease. By default, 1000, if desired – as much as will fit in your car (but preferably no more than 10,000). In this command: -t 5000.
  • Connections – Here we indicate the estimated number of connections to one proxy server. It is optimal to specify from 1000 to 2000. Let’s say that you have 1000 proxy servers, if you specify 1000 connections, you will send 1,000,000 packets to your destination (ideally, but a certain percentage of packets can most likely be lost). Currently, the optimal value is –rpc 2000.
  • Also, if you are connected to a VPN, you can add the –vpn parameter, with which the attack will take place through a proxy and together with your IP address.
Other related articles
Found an error?
If you find an error, take a screenshot and send it to the bot.