TLP:UNCLEAR

Get the current UserAgent List

Feel free to browse all configurations

Get the official current IP list (Be aware of private IP)

Get the official current IP list cleaned without private IP

Get the (un)official current IP list (Be aware of private IP)

Get the (un)official current IP list cleaned without private IP

Get the (un)official current IP list from MedusaL4 (Be aware of private IP)

Get the (un)official current IP list from MedusaL4 cleaned without private IP

Feel free to browse all known IP per date

END OF TLP:UNCLEAR

Welcome to Minimedusa!

If you see this page, you are at the right place to find details about the MegaMedusa configuration.

The actual version is 3.3.1 and is heavly protected.

Prior versions were protected with jsob and were easy to unprotect.

Due to some configuration, the main user-agent is axios/1.8.1.

Blocked TLD are the followings and if you try to target them, the script will try to self delete and reboot (only if you configure sudo without password ;) )

".bn", ".co.id", ".sch.id", ".web.id", ".lb", ".ir", ".ye", "-ye", ".com.ye", ".org.ye", ".id", ".my", "malaysia", ".af", ".sy", ".om", ".kw", ".bh", ".uz", ".sd", ".qa", ".jo", ".dz", ".sa", ".pk", ".bd", ".ps", ".eg", ".iq", ".ly", ".ae", ".tn", ".so", ".mv", ".km", ".ma"

There is many drama about, if you want we can discuss about it later ;-)

What is MegaMedusa

MegaMedusa is NodeJS DDoS Machine Layer-7 provided by RipperSec Team. Coded with poor skills.

MegaMedusa Security Bypass

Those features are from the coder, not from us :p

Reals features

Randomized Headers

Randomized Request Paths

Randomized Request Methods

The HTTP method (GET, POST, HEAD, etc.) is selected at random, making it harder to detect patterns.

Randomized Cookies

Randomly generated cookies give the impression of different sessions or users. Certain cookies like cf_clearance are generated following particular patterns, aiming to bypass security checks.

Random IP Addresses (IP Spoofing)

Headers like X-Forwarded-For, Client-IP, Real-IP, X-Forwarded-Host, etc., are populated with random IPs to obscure the request's true origin.

Randomized TLS/SSL Configurations

Different TLS/SSL ciphers and protocols are used randomly to make the TLS handshake appear unique for each request.

Randomized HTTP/2 Settings

Parameters such as headerTableSize, maxConcurrentStreams, initialWindowSize, etc., are varied to change HTTP/2 session characteristics.

Proxy Randomization

A random proxy is chosen from a list for each request, causing the source IP and geolocation to vary.

Random Timing Intervals

The script employs setInterval() with configurable, randomized delays, making request timing unpredictable.

MedusaL4

This project is describe as able to run attacks with TCP and UDP, but if you look closer, only the UDP part is running... There is absolutly no TCP attack with it.

It only send packets in UPD with a size between 1025 and 65505 bytes... Even if it use many threads it will send X packets on Y threads at same time.