diff --git a/auto.htm b/auto.htm index 8c9ccdf6..e833d296 100644 --- a/auto.htm +++ b/auto.htm @@ -156,9 +156,9 @@

You'll be redirected any second...

- +



- You are about to be directed to Day 721 in 10 Seconds

+ You are about to be directed to Day 724 in 10 Seconds

-

Not Working? Click Here


+

Not Working? Click Here


*

diff --git a/day722.htm b/day722.htm new file mode 100644 index 00000000..b5baa931 --- /dev/null +++ b/day722.htm @@ -0,0 +1,1329 @@ + + + + + + Day 722 flood + + + + + + + + + + + + + + + + + + + + + + +
+ + + + +
+ + + + + + + +
Info: Your Public IP Address is:
Loading..
For privacy, download the Tor Browser: https://www.torproject.org/download/  
+

Propaganda http(s) flood for Day 722 using targets from the IT Army of Ukraine.

+
+

Information about this tool.

+
+ + + +

This tool is hosted via GitHub Page, You can download it for local use and customization here. A new page will be added for each day, with a new set of targets from the Ukrainian IT Army's telegram servers.

+

All of the news in the Russian federation is fake and need to be shut down, we need as many people as possible to help. Just a tiny 1kbps of data could be the edge needed to take down a server hosting propaganda.
+
Just open this page and leave it running on your devices as long as possible, it will flood targets selected specifically for that day.
+ Targets are chosen by an intelligence team who are always looking at what services are aiding Russia’s war,together we can pose a huge load on their infrastructure.

+
+ Click Here for FAQ (Questions & Answers) +

+ + + + +

FAQ:
+ Q) How can I use this in the tor browser if HTTPS overrides HTTP no matter what i try?
+ A) Download the page for local use, it won't use any http/https protocols because those are used to request files from a web server, but using it locally (directly from your computer) bypasses the need and allows you to flood both HTTP and HTTPS from your TOR Browser's IP.

+

Q) How can I see what's happening in more detail?
+ A) Redacted for security.

+

Q) After so much time has passed, my browser/computer become very laggy and unresponsive or my browser crashes, how can I fix this?
+ A) Redacted for security.

+

Q) Why are some of the requests having the same number error after a while?
+ A) This is likely caused by the IP of the VPN you're using has been blocked on their side, but it could also mean the site's just totally overloaded and cannot respond to any requests.
Also if you’re are using https:// in the address bar that would cause the http:// addresses to do the same

+
+
+ + + + +

Session Status

+

Below is a log of sites that ether responded with errors or failed to respond at all.
+ It’s normal for this number to count up slow or fast and can often change.
+ If a lot of services are overloaded the numbers will go fast, else they’ll go slower.
+ If all requests are the same as all errors on some sites, it most likely means that the
+ site operator has banned the IP you’re using.
+

+
+
+

Total number of requests: 0

+

So far zero sites have responded with errors

+
+
+
+
+
+
+
Estimate: data requested from servers via GET: 0MB (MegaBytes)
+ + + + \ No newline at end of file diff --git a/day723.htm b/day723.htm new file mode 100644 index 00000000..f6864d17 --- /dev/null +++ b/day723.htm @@ -0,0 +1,1329 @@ + + + + + + Day 723 flood + + + + + + + + + + + + + + + + + + + + + + +
+ + + + +
+ + + + + + + +
Info: Your Public IP Address is:
Loading..
For privacy, download the Tor Browser: https://www.torproject.org/download/  
+

Propaganda http(s) flood for Day 723 using targets from the IT Army of Ukraine.

+
+

Information about this tool.

+
+ + + +

This tool is hosted via GitHub Page, You can download it for local use and customization here. A new page will be added for each day, with a new set of targets from the Ukrainian IT Army's telegram servers.

+

All of the news in the Russian federation is fake and need to be shut down, we need as many people as possible to help. Just a tiny 1kbps of data could be the edge needed to take down a server hosting propaganda.
+
Just open this page and leave it running on your devices as long as possible, it will flood targets selected specifically for that day.
+ Targets are chosen by an intelligence team who are always looking at what services are aiding Russia’s war,together we can pose a huge load on their infrastructure.

+
+ Click Here for FAQ (Questions & Answers) +

+ + + + +

FAQ:
+ Q) How can I use this in the tor browser if HTTPS overrides HTTP no matter what i try?
+ A) Download the page for local use, it won't use any http/https protocols because those are used to request files from a web server, but using it locally (directly from your computer) bypasses the need and allows you to flood both HTTP and HTTPS from your TOR Browser's IP.

+

Q) How can I see what's happening in more detail?
+ A) Redacted for security.

+

Q) After so much time has passed, my browser/computer become very laggy and unresponsive or my browser crashes, how can I fix this?
+ A) Redacted for security.

+

Q) Why are some of the requests having the same number error after a while?
+ A) This is likely caused by the IP of the VPN you're using has been blocked on their side, but it could also mean the site's just totally overloaded and cannot respond to any requests.
Also if you’re are using https:// in the address bar that would cause the http:// addresses to do the same

+
+
+ + + + +

Session Status

+

Below is a log of sites that ether responded with errors or failed to respond at all.
+ It’s normal for this number to count up slow or fast and can often change.
+ If a lot of services are overloaded the numbers will go fast, else they’ll go slower.
+ If all requests are the same as all errors on some sites, it most likely means that the
+ site operator has banned the IP you’re using.
+

+
+
+

Total number of requests: 0

+

So far zero sites have responded with errors

+
+
+
+
+
+
+
Estimate: data requested from servers via GET: 0MB (MegaBytes)
+ + + + \ No newline at end of file diff --git a/day724.htm b/day724.htm new file mode 100644 index 00000000..33b019e3 --- /dev/null +++ b/day724.htm @@ -0,0 +1,1077 @@ + + + + + + Day 724 flood + + + + + + + + + + + + + + + + + + + + + + +
+ + + + +
+ + + + + + + +
Info: Your Public IP Address is:
Loading..
For privacy, download the Tor Browser: https://www.torproject.org/download/  
+

Propaganda http(s) flood for Day 724 using targets from the IT Army of Ukraine.

+
+

Information about this tool.

+
+ + + +

This tool is hosted via GitHub Page, You can download it for local use and customization here. A new page will be added for each day, with a new set of targets from the Ukrainian IT Army's telegram servers.

+

All of the news in the Russian federation is fake and need to be shut down, we need as many people as possible to help. Just a tiny 1kbps of data could be the edge needed to take down a server hosting propaganda.
+
Just open this page and leave it running on your devices as long as possible, it will flood targets selected specifically for that day.
+ Targets are chosen by an intelligence team who are always looking at what services are aiding Russia’s war,together we can pose a huge load on their infrastructure.

+
+ Click Here for FAQ (Questions & Answers) +

+ + + + +

FAQ:
+ Q) How can I use this in the tor browser if HTTPS overrides HTTP no matter what i try?
+ A) Download the page for local use, it won't use any http/https protocols because those are used to request files from a web server, but using it locally (directly from your computer) bypasses the need and allows you to flood both HTTP and HTTPS from your TOR Browser's IP.

+

Q) How can I see what's happening in more detail?
+ A) Redacted for security.

+

Q) After so much time has passed, my browser/computer become very laggy and unresponsive or my browser crashes, how can I fix this?
+ A) Redacted for security.

+

Q) Why are some of the requests having the same number error after a while?
+ A) This is likely caused by the IP of the VPN you're using has been blocked on their side, but it could also mean the site's just totally overloaded and cannot respond to any requests.
Also if you’re are using https:// in the address bar that would cause the http:// addresses to do the same

+
+
+ + + + +

Session Status

+

Below is a log of sites that ether responded with errors or failed to respond at all.
+ It’s normal for this number to count up slow or fast and can often change.
+ If a lot of services are overloaded the numbers will go fast, else they’ll go slower.
+ If all requests are the same as all errors on some sites, it most likely means that the
+ site operator has banned the IP you’re using.
+

+
+
+

Total number of requests: 0

+

So far zero sites have responded with errors

+
+
+
+
+
+
+
Estimate: data requested from servers via GET: 0MB (MegaBytes)
+ + + + \ No newline at end of file diff --git a/days.htm b/days.htm index 5d11d3ba..73d4d2bb 100644 --- a/days.htm +++ b/days.htm @@ -68,66 +68,66 @@ -

 Day 721
-    Day 724
+   
  
- День 721 + ">  
+ День 724

+ Day 723
+    
+ День 723 + + Day 722
+    
+ День 722 + + Day 721
+    
+ День 721 + Day 720
-    
+ ">  
День 720 - Day 719
-  Day 719
+  
  
+ ">  
День 719 - Day 718
-  Day 718
+  
  
- День 718 + ">  
+ День 718 Day 717
-    
+ ">  
День 717 Day 716
-    
+ ">  
День 716 - Day 715
-    
- День 715 - - Day 714
-    
- День 714 - - Day 713
-    
- День 713 - - Day 712
-  Day 715
+  
   
- День 712 + ">   
+ День 715 @@ -135,133 +135,133 @@ - - + - + - + - + - + - + - + - + - + + "> - - + - + - + - + - + - + - + - + - + + "> - - + - + - + - + - + - + - + - + - + + "> - - + - + - + - - + - - + - + - + + ">
  711  714  710   713   709   712    708   711    707   710   706  709  705   708  704 707 703  706  702  705 
  701   704    700   703  699  702  698   701   697  700  696  699  695   698  694 697 693  696  692  695 
   691    694    690   693  689   692   688   691    687   690   686  689   685   688 684  687  683 686 682  685 
   681    684     680     683   679   682   678   681   677   680   676   679   675   678  674  677   673  676   672  675 
diff --git a/flood-via-browser.htm b/flood-via-browser.htm index 4385dbbd..0d6e9f29 100644 --- a/flood-via-browser.htm +++ b/flood-via-browser.htm @@ -249,9 +249,9 @@

Flood pre-targeted Russian propaganda & infrastructure by day via our flood tool - Day 721 - Day 720 - Day 719 + Day 724 + Day 723 + Day 722

as you'll already know, the IT Army of Ukraine puts out a list of targets every day.
These targets are chosen by an intelligence team who look into everything going on in Russia and with the war to determine what would be the most effective place to strike and when.
It's thanks to organised and coordinated attacks like this that we were able to not only take down, but cause permanent damage to the Russian streaming service RuTube, banks funding the invasion and more..
@@ -259,6 +259,11 @@

+ + Day 721 + Day 720 + Day 719 + Day 718 Day 717 @@ -272,20 +277,15 @@ Day 712 Day 711 - Day 710 - - - Day 709 - Day 708 - Day 707 + Day 710 - Day 706 - Day 705 - Day 704 + Day 709 + Day 708 + Day 707 - --> Today's Script <-- + --> Today's Script <--