Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DGB (DDoS Guard Bypass) is 1) not enabled 2) not working #231

Closed
porthole-ascend-cinnamon opened this issue Mar 12, 2022 · 4 comments
Closed
Assignees
Labels
bug Something isn't working new method

Comments

@porthole-ascend-cinnamon
Copy link
Contributor

Setting method as DGB in reality uses GET method (there is no if clause in HttpFlood.select).
Additionally, it's implementation uses Cloudflare scraper, which does nothing to bypass DDoS-Guard, basically acting as a plain Session.

@andress134
Copy link

@MHProDev try add something like

import requests

session = requests.Session()


def ddg_solver():
    response = session.post("https://check.ddos-guard.net/check.js")
    response.raise_for_status()
    for key, value in session.cookies.items():
        session.cookies.set_cookie(requests.cookies.create_cookie(key, value))


if __name__ == '__main__':
    ddg_solver()
    test = session.get("https://target.com").text
    print(test)```

@porthole-ascend-cinnamon
Copy link
Contributor Author

@andress134 that doesn't seem to work for me

@andress134
Copy link

@andress134 that doesn't seem to work for me

Work for v1 challenge
but ddg need ratelimit and captcha bypass (if the proxies are shit or waf detect alot req from same ip you get captcha)

@MHProDev
Copy link
Contributor

@andress134 can u contribute that ?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working new method
Projects
None yet
Development

No branches or pull requests

4 participants