From 10e70e5fb6d04526530b840d6d7aa931422ad3cd Mon Sep 17 00:00:00 2001 From: rmellis <41447552+rmellis@users.noreply.github.com> Date: Sat, 28 Oct 2023 00:57:39 +0100 Subject: [PATCH] Added Day 612 - Targets and Days (TL) Eng+Ukr MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Simply run this for as long as you can to help flood Russia in the most legal, yet effective way possible New targets imported from db1000n: To keep up with targets we're going to use the db1000n targets direct from their GitHub repository. These updates will be daily, so if the db1000n changes, it will probably take a few hours longer for the change to make it here. Message posted by the IT Army of Ukraine: We continue targeting internet and telecom providers to disrupt enemy communications. Today, our intel orchestrated a "thousand proxies" strike, disabling "Miranda-media," "Krimtelekom," and "MirTelekom." This affects not only Crimea but also occupied parts of Kherson, Zaporizhia, Donetsk, and Luhansk regions. Another blow by our cyber army disrupting enemy military communication at the frontlines. Joining our operations is easy. Install our software and be part of the cyber resistance. / *** / Просто запускайте це стільки, скільки зможете, щоб допомогти наповнити Росію найбільш законним, але ефективним способом Нові цілі, імпортовані з db1000n: Щоб не відставати від цілей, ми збираємося використовувати цілі db1000n безпосередньо з їхнього сховища GitHub. Ці оновлення відбуватимуться щодня, тож якщо db1000n зміниться, ймовірно, знадобиться кілька годин більше, перш ніж зміни з’являться тут. Інформація про цілі: Продовжуємо працювати по інтернет і телеком провайдерам, щоб ускладнити комунікації ворога. Сьогодні наша розвідка змогла організувати потужний удар "тисячі проксей" щоб вимкнути Міранда-медіа», «Кримтелеком» й «МирТелеком». А це не тільки Крим, але й окуповані частини Херсонської, Запорізької, Донецької та Луганських областей. Тож це черговий удар нашої кіберармії по зв'язку військових частин ворога прямо на лінії фронту. Приєднатись до наших операцій дуже просто. Встановлюйте наше ПО і ставайте частиною кіберспротиву. --- auto.htm | 8 +- day612.htm | 636 ++++++++++++++++++++++++++++++++++++++++++ days.htm | 218 +++++++-------- flood-via-browser.htm | 20 +- 4 files changed, 759 insertions(+), 123 deletions(-) create mode 100644 day612.htm diff --git a/auto.htm b/auto.htm index 5a328ddd..398d865c 100644 --- a/auto.htm +++ b/auto.htm @@ -156,20 +156,20 @@

You'll be redirected any second...

- +



- You are about to be directed to Day 611 in 10 Seconds

+ You are about to be directed to Day 612 in 10 Seconds

-

Not Working? Click Here


+

Not Working? Click Here


*

diff --git a/day612.htm b/day612.htm new file mode 100644 index 00000000..9f4ed2b2 --- /dev/null +++ b/day612.htm @@ -0,0 +1,636 @@ + + + + + + Day 612 flood + + + + + + + + + + + + + + + + + + + + + + + +
+ + + + +
+ + + + + + + +
Info: Your Public IP Address is:
Loading..
For privacy, download the Tor Browser: https://www.torproject.org/download/  
+

Propaganda http(s) flood for Day 612 using targets from the IT Army of Ukraine.

+
+

Information about this tool.

+
+ + + +

This tool is hosted via GitHub Page, You can download it for local use and customization here. A new page will be added for each day, with a new set of targets from the Ukrainian IT Army's telegram servers.

+

All of the news in the Russian federation is fake and need to be shut down, we need as many people as possible to help. Just a tiny 1kbps of data could be the edge needed to take down a server hosting propaganda.
+
Just open this page and leave it running on your devices as long as possible, it will flood targets selected specifically for that day.
+ Targets are chosen by an intelligence team who are always looking at what services are aiding Russia’s war,together we can pose a huge load on their infrastructure.

+
+ Click Here for FAQ (Questions & Answers) +

+ + + + +

FAQ:
+ Q) How can I use this in the tor browser if HTTPS overrides HTTP no matter what i try?
+ A) Download the page for local use, it won't use any http/https protocols because those are used to request files from a web server, but using it locally (directly from your computer) bypasses the need and allows you to flood both HTTP and HTTPS from your TOR Browser's IP.

+

Q) How can I see what's happening in more detail?
+ A) Redacted for security.

+

Q) After so much time has passed, my browser/computer become very laggy and unresponsive or my browser crashes, how can I fix this?
+ A) Redacted for security.

+

Q) Why are some of the requests having the same number error after a while?
+ A) This is likely caused by the IP of the VPN you're using has been blocked on their side, but it could also mean the site's just totally overloaded and cannot respond to any requests.
Also if you’re are using https:// in the address bar that would cause the http:// addresses to do the same

+
+
+ + + + +

Session Status

+

Below is a log of sites that ether responded with errors or failed to respond at all.
+ It’s normal for this number to count up slow or fast and can often change.
+ If a lot of services are overloaded the numbers will go fast, else they’ll go slower.
+ If all requests are the same as all errors on some sites, it most likely means that the
+ site operator has banned the IP you’re using.
+

+
+
+

Total number of requests: 0

+

So far zero sites have responded with errors

+
+
+
+
+
+
+
Estimate: data requested from servers via GET: 0MB (MegaBytes)
+ + + + \ No newline at end of file diff --git a/days.htm b/days.htm index 2750bc0f..00720dc2 100644 --- a/days.htm +++ b/days.htm @@ -68,190 +68,190 @@ - - + - - - -

 Day 611
-  

 Day 612
+  
  
-  День 611 +">  
+  День 612

Day 610
Day 611
  
+">  
+День 611
Day 610
+    
День 610
Day 609
-  Day 609
  
+">  
День 609
Day 608
Day 608
  
+">  
День 608
Day 607
  
+">  
День 607
Day 606
  
+">  
День 606
Day 605
  
+">  
День 605
Day 604
  
+">  
День 604
Day 603
Day 603
  
+">   
День 603
Day 602
   
-День 602
- - + - + - + - + - + - + - + - + - + +"> - - + - + - + - + - + - + - + - + - + +"> - - + - + - + - + - + - + - + - + - + +"> - - + - + - + - + - + - + - + - + - + +">
  601  602  600   601   599   600   598   599   597   598   596  597  595   596  594  595  593  594  592  593 
  591   592    590   591  589  590  588   589   587  588  586  587  585   586  584 585 583  584  582  583 
   581    582    580   581  579   580   578   579   577   578   576  577   575    576  574  575  573  574  572  573 
   571    572     570     571   569   570   568   569   567   568   566   567   565   566  564  565  563  564  562  563
diff --git a/flood-via-browser.htm b/flood-via-browser.htm index ace699bf..2a0953e5 100644 --- a/flood-via-browser.htm +++ b/flood-via-browser.htm @@ -249,9 +249,9 @@

Flood pre-targeted Russian propaganda & infrastructure by day via our flood tool + Day 612 Day 611 - Day 610 - Day 609 + Day 610

as you'll already know, the IT Army of Ukraine puts out a list of targets every day.
These targets are chosen by an intelligence team who look into everything going on in Russia and with the war to determine what would be the most effective place to strike and when.
It's thanks to organised and coordinated attacks like this that we were able to not only take down, but cause permanent damage to the Russian streaming service RuTube, banks funding the invasion and more..
@@ -260,32 +260,32 @@

+ Day 609 Day 608 Day 607 - Day 606 + Day 606 Day 605 Day 604 - Day 603 + Day 603 Day 602 Day 601 - Day 600 + Day 600 Day 599 - Day 598 - Day 597 + Day 598 - Day 596 + Day 597 + Day 596 Day 595 - Day 594 - --> Today's Script <-- + --> Today's Script <--