Installing mhddos_proxy directly on your Mac

18 April 2023 6 minutes Author: Cyber Witcher

What does using mhddos_proxy do?

Distributed denial of service (DDoS) attacks have become commonplace. Everything connected to the Internet can be brought down by a DDoS attack. We all know that in a DDoS attack, the attackers use a procedure on the servers that respond to the request. Attackers do not use their IP address for DDoS, but the IP address of the target of the attack. The server responds not to the intended client, but to itself, resulting in an endless cycle of server requests and responses. However, an increase in the number of requests leads to a very high data transfer rate, which ultimately leads to an overload of the server and its destruction. And if I tell you that you can sit at home and help our troops? We live in a time of progress and it is a pity that only a small part of adequate people understand this.

The mhddos_proxy utility keeps up with technology, having a good arsenal and potential: Built-in proxy server database with a wide range of IP addresses around the world. A variety of different load testing methods. Ability to set a huge number of targets with automatic load balancing. Efficient use of your resources thanks to asynchronous architecture. This type of distributed denial of service (DDoS) attack overwhelms the target, causing systems and services to crash or shut down.


Step 1. Installing Python3:

Method 1 (very easy):

1) We enter the Terminal

2)-> We write python3

-> press Enter

Якщо він у вас вже є то буде так .

3) After receiving python3, close this terminal window.

If you have a version of Python lower than 3.10, then you need to update it through the site.


Method 2:

1) Download python:

2) Click in this order.


3) Run the downloaded file.

4) The usual Mac installation procedure follows.

5) After successful installation, a window like this will appear.

Step 2. Installing Git

1)  We download the git`a installer:

2) After clicking, you will be automatically transferred to the site with autoloading after 5 seconds.

3) After downloading, you need to click on the file that was downloaded, then go to settings, Security and Privacy, and click “Open anyway” (You will need to enter your password before unlocking the Mac).

4) But once again you need to press – Open. DONE.

Step 3. Install the mhddos_proxy script

1)  Code -> Download ZIP.

Or directly from the link:

2) Click on the green “Code” button.

3) And click “Download ZIP”.

4) The downloaded archive must be unpacked (double-click), and the resulting folder called “mhddos_proxy” should be transferred to the desktop (for faster access).

open the terminal through the folder

5) Go to the “Services” menu with the right mouse button and select “New terminal in folder”.

6) Next, enter (only once on a new machine):

if it doesn’t run at all (it says some python-related errors), try this:

press Enter.

7) Download started:

8) When everything is done, close the window (red button in the upper left corner).

Now we can launch attacks!

Step 4. Launch the attack

1) VPN is not required for mhddos_proxy because it has its own proxies, but I recommend installing a fast VPN to avoid scaring your ISP.

2) Click on the folder with mhddos_proxy, and click the right mouse button, select “Services” from the list there and select “New terminal in folder”.

A terminal window will open.

3) We update the version of the program:

4) load new dependencies:

5) Launch the attack:

if it doesn’t run at all (it says some python-related errors), try this:

Or this:

6) Congratulations, the attack has started.

An example of a successful attack

7) To stop the attack: in the open window (in the terminal) with the attack, press ctrl + C.

An example of a successfully stopped attack.

Step 5. Command template:

Also, if you are connected to a Russian VPN, you can add the –vpn option, which will allow the attack to take place directly from your IP, but then you need to reconnect the VPN every 5-10 minutes.


  • Python3 – a shell / program that will read and execute the code of the programs.
  • – the attack script itself.
  • Site-Targets – Targets for an attack at the same level and using the same attack method specified in –http-methods can be listed with a space. In this case, the number of targets will be divided into each method equally from the number you specified.
    You can specify any types of ports in one command, for example: http://, https://, tcp://, udp:// – all of them will be divided into the required methods, for http and https the methods from the list will be taken –http-methods , and for tcp and udp always use TCP and UDP methods respectively.
  • Methods – You can familiarize yourself with all the methods on GitHub itself.
    ( ). All the commands that we prepare in our channel – we prepare already with the methods necessary for the attack). At the same attack level, methods can also be enumerated by omission. The most common methods are: –http-methods GET STRESS.
  • Threads are the number of “malicious” packets/requests in t * number_of_cores sent to the target. Here you can twist to the maximum as much as your PC can handle (monitor the load in the task manager, we look at the CPU and RAM, in Kali Linux it is a green and blue graph, respectively). Be careful, at the beginning of the attack, the load may be minimal, and after a while, it will skyrocket. Note that as packages/threats increase, the number of proxy servers may decrease. By default, 1000, as desired – as much as will fit in your car (but not more than 6000). In this command: -t 2000.
  • Connections – Here we indicate the estimated number of connections to one proxy server. It is optimal to specify from 1000 to 2000. Let’s say that you have 1000 proxy servers, if you specify 1000 connections, you will send 1,000,000 packets to your destination (ideally, but a certain percentage of packets can most likely be lost). Currently, the optimal value is –rpc 2000.
  • Attack period – The value is specified in seconds, by default it is 300 seconds and this means that every 300 seconds you will update the list of proxy servers and reconnect to them (some proxies may be banned or the connection with them may be lost). The script restarts automatically, it is recommended to specify here no more than 20 minutes (1200), because the more often the proxies will be updated, within reasonable limits, the better. Update example: -p 1200.
Other related articles
Found an error?
If you find an error, take a screenshot and send it to the bot.