From 407260460aab97e76ab050cd29983c713108ef7b Mon Sep 17 00:00:00 2001 From: rmellis <41447552+rmellis@users.noreply.github.com> Date: Wed, 8 Nov 2023 22:24:30 +0000 Subject: [PATCH] Added Day 623 - Targets and Days (TL) Eng+Ukr MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Simply run this for as long as you can to help flood Russia in the most legal, yet effective way possible New targets imported from db1000n: To keep up with targets we're going to use the db1000n targets direct from their GitHub repository. These updates will be daily, so if the db1000n changes, it will probably take a few hours longer for the change to make it here. Message posted by the IT Army of Ukraine: ⚠️ Danger: Phishing! ATTENTION: Fake accounts are posing as IT ARMY, sending out dangerous links in private messages. We NEVER reach out privately for recruitment or to discuss sensitive issues. 👉 Trust only official channel posts and carefully check the account name for correctness. Phishing accounts usually differ by only one symbol. 🔍 Suspect a fake? Inform us in the chat, and be sure to take a screenshot. Join our chat! Stay alert! / *** / Просто запускайте це стільки, скільки зможете, щоб допомогти наповнити Росію найбільш законним, але ефективним способом Нові цілі, імпортовані з db1000n: Щоб не відставати від цілей, ми збираємося використовувати цілі db1000n безпосередньо з їхнього сховища GitHub. Ці оновлення відбуватимуться щодня, тож якщо db1000n зміниться, ймовірно, знадобиться кілька годин більше, перш ніж зміни з’являться тут. Інформація про цілі: 🤫 Увага: Новий вид атак через Google Календар виявляє тривожну тенденцію у сфері шкідливих програм. Хакери маскують сигнали командного управління у подіях календаря, використовуючи доступ до довірених інструментів для обходу систем безпеки. ✨ Будьте обачні: Уважно перевіряйте запрошення у календарі — в описі легітимних подій не має бути виконавчих посилань чи невластивих для запрошення інструкцій. 🔗 Більше інформації у PC Mag. Попереджений — значить озброєний, тримайте кібер-варту! --- auto.htm | 6 +- day623.htm | 1759 +++++++++++++++++++++++++++++++++++++++++ days.htm | 218 ++--- flood-via-browser.htm | 22 +- 4 files changed, 1882 insertions(+), 123 deletions(-) create mode 100644 day623.htm diff --git a/auto.htm b/auto.htm index 389071fb..4c52b450 100644 --- a/auto.htm +++ b/auto.htm @@ -156,9 +156,9 @@

You'll be redirected any second...

- +



- You are about to be directed to Day 622 in 10 Seconds

+ You are about to be directed to Day 623 in 10 Seconds

-

Not Working? Click Here


+

Not Working? Click Here


*

diff --git a/day623.htm b/day623.htm new file mode 100644 index 00000000..2b0de3cc --- /dev/null +++ b/day623.htm @@ -0,0 +1,1759 @@ + + + + + + Day 623 flood + + + + + + + + + + + + + + + + + + + + + + +
+ + + + +
+ + + + + + + +
Info: Your Public IP Address is:
Loading..
For privacy, download the Tor Browser: https://www.torproject.org/download/  
+

Propaganda http(s) flood for Day 623 using targets from the IT Army of Ukraine.

+
+

Information about this tool.

+
+ + + +

This tool is hosted via GitHub Page, You can download it for local use and customization here. A new page will be added for each day, with a new set of targets from the Ukrainian IT Army's telegram servers.

+

All of the news in the Russian federation is fake and need to be shut down, we need as many people as possible to help. Just a tiny 1kbps of data could be the edge needed to take down a server hosting propaganda.
+
Just open this page and leave it running on your devices as long as possible, it will flood targets selected specifically for that day.
+ Targets are chosen by an intelligence team who are always looking at what services are aiding Russia’s war,together we can pose a huge load on their infrastructure.

+
+ Click Here for FAQ (Questions & Answers) +

+ + + + +

FAQ:
+ Q) How can I use this in the tor browser if HTTPS overrides HTTP no matter what i try?
+ A) Download the page for local use, it won't use any http/https protocols because those are used to request files from a web server, but using it locally (directly from your computer) bypasses the need and allows you to flood both HTTP and HTTPS from your TOR Browser's IP.

+

Q) How can I see what's happening in more detail?
+ A) Redacted for security.

+

Q) After so much time has passed, my browser/computer become very laggy and unresponsive or my browser crashes, how can I fix this?
+ A) Redacted for security.

+

Q) Why are some of the requests having the same number error after a while?
+ A) This is likely caused by the IP of the VPN you're using has been blocked on their side, but it could also mean the site's just totally overloaded and cannot respond to any requests.
Also if you’re are using https:// in the address bar that would cause the http:// addresses to do the same

+
+
+ + + + +

Session Status

+

Below is a log of sites that ether responded with errors or failed to respond at all.
+ It’s normal for this number to count up slow or fast and can often change.
+ If a lot of services are overloaded the numbers will go fast, else they’ll go slower.
+ If all requests are the same as all errors on some sites, it most likely means that the
+ site operator has banned the IP you’re using.
+

+
+
+

Total number of requests: 0

+

So far zero sites have responded with errors

+
+
+
+
+
+
+
Estimate: data requested from servers via GET: 0MB (MegaBytes)
+ + + + \ No newline at end of file diff --git a/days.htm b/days.htm index a93fb331..32163968 100644 --- a/days.htm +++ b/days.htm @@ -68,190 +68,190 @@ - - + - - - -

 Day 622
-  

 Day 623
+  
  
-  День 622 +">  
+  День 623

Day 621
Day 622
  
+">  
+День 622
Day 621
+    
День 621
Day 620
-  Day 620
  
+">  
День 620
Day 619
Day 619
  
+">  
День 619
Day 618
  
+">  
День 618
Day 617
  
+">  
День 617
Day 616
  
+">  
День 616
Day 615
  
+">  
День 615
Day 614
Day 614
  
+">   
День 614
Day 613
   
-День 613
- - + - + - + - + - + - + - + - + - + +"> - - + - + - + - + - + - + - + - + - + +"> - - + - + - + - + - + - + - + - + - + +"> - - + - + - + - + - + - + - + - + - + +">
  612  613  611   612   610   611   609   610   608   609   607  608  606   607  605  606  604  605  603  604 
  602   603    601   602  600  601  599   600   598  599  597  598  596   597  595 596 594  595  593  594 
   592    593    591   592  590   591   589   590   588   589   587  588   586    587  585  586  584  585  583  584 
   582    583     581     582   580   581   579   580   578   579   577   578   576   577  575  576  574  575  573  574
diff --git a/flood-via-browser.htm b/flood-via-browser.htm index 11134818..12d63f09 100644 --- a/flood-via-browser.htm +++ b/flood-via-browser.htm @@ -249,9 +249,9 @@

Flood pre-targeted Russian propaganda & infrastructure by day via our flood tool - Day 622 - Day 621 - Day 620 + Day 623 + Day 622 + Day 621

as you'll already know, the IT Army of Ukraine puts out a list of targets every day.
These targets are chosen by an intelligence team who look into everything going on in Russia and with the war to determine what would be the most effective place to strike and when.
It's thanks to organised and coordinated attacks like this that we were able to not only take down, but cause permanent damage to the Russian streaming service RuTube, banks funding the invasion and more..
@@ -260,32 +260,32 @@

+ Day 620 Day 619 Day 618 - Day 617 + Day 617 Day 616 Day 615 - Day 614 + Day 614 Day 613 Day 612 - Day 611 + Day 611 Day 610 - Day 609 - Day 608 + Day 609 - Day 607 + Day 608 + Day 607 Day 606 - Day 605 - --> Today's Script <-- + --> Today's Script <--