diff --git a/auto.htm b/auto.htm index ca8a78e0..4631b115 100644 --- a/auto.htm +++ b/auto.htm @@ -156,9 +156,9 @@

You'll be redirected any second...

- +



- You are about to be directed to Day 581 in 10 Seconds

+ You are about to be directed to Day 582 in 10 Seconds

-

Not Working? Click Here


+

Not Working? Click Here


*

diff --git a/day582.htm b/day582.htm new file mode 100644 index 00000000..787686fb --- /dev/null +++ b/day582.htm @@ -0,0 +1,528 @@ + + + + + + Day 582 flood + + + + + + + + + + + + + + + + + + + + + + +
+ + + + +
+ + + + + + + +
Info: Your Public IP Address is:
Loading..
For privacy, download the Tor Browser: https://www.torproject.org/download/  
+

Propaganda http(s) flood for Day 582 using targets from the IT Army of Ukraine.

+
+

Information about this tool.

+
+ + + +

This tool is hosted via GitHub Page, You can download it for local use and customization here. A new page will be added for each day, with a new set of targets from the Ukrainian IT Army's telegram servers.

+

All of the news in the Russian federation is fake and need to be shut down, we need as many people as possible to help. Just a tiny 1kbps of data could be the edge needed to take down a server hosting propaganda.
+
Just open this page and leave it running on your devices as long as possible, it will flood targets selected specifically for that day.
+ Targets are chosen by an intelligence team who are always looking at what services are aiding Russia’s war,together we can pose a huge load on their infrastructure.

+
+ Click Here for FAQ (Questions & Answers) +

+ + + + +

FAQ:
+ Q) How can I use this in the tor browser if HTTPS overrides HTTP no matter what i try?
+ A) Download the page for local use, it won't use any http/https protocols because those are used to request files from a web server, but using it locally (directly from your computer) bypasses the need and allows you to flood both HTTP and HTTPS from your TOR Browser's IP.

+

Q) How can I see what's happening in more detail?
+ A) Redacted for security.

+

Q) After so much time has passed, my browser/computer become very laggy and unresponsive or my browser crashes, how can I fix this?
+ A) Redacted for security.

+

Q) Why are some of the requests having the same number error after a while?
+ A) This is likely caused by the IP of the VPN you're using has been blocked on their side, but it could also mean the site's just totally overloaded and cannot respond to any requests.
Also if you’re are using https:// in the address bar that would cause the http:// addresses to do the same

+
+
+ + + + +

Session Status

+

Below is a log of sites that ether responded with errors or failed to respond at all.
+ It’s normal for this number to count up slow or fast and can often change.
+ If a lot of services are overloaded the numbers will go fast, else they’ll go slower.
+ If all requests are the same as all errors on some sites, it most likely means that the
+ site operator has banned the IP you’re using.
+

+
+
+

Total number of requests: 0

+

So far zero sites have responded with errors

+
+
+
+
+
+
+
Estimate: data requested from servers via GET: 0MB (MegaBytes)
+ + + + \ No newline at end of file diff --git a/days.htm b/days.htm index 5cbfd264..f74ef779 100644 --- a/days.htm +++ b/days.htm @@ -68,190 +68,190 @@ - - + - - - -

 Day 581
-  

 Day 582
+  
  
-  День 581 +">  
+  День 582

Day 580
Day 581
  
+">  
+День 581
Day 580
+    
День 580
Day 579
-  Day 579
  
+">  
День 579
Day 578
Day 578
  
+">  
День 578
Day 577
  
+">  
День 577
Day 576
  
+">  
День 576
Day 575
  
+">  
День 575
Day 574
  
+">  
День 574
Day 573
Day 573
  
+">   
День 573
Day 572
   
-День 572
- - + - + - + - + - + - + - + - + - + +"> - - + - + - + - + - + - + - + - + - + +"> - - + - + - + - + - + - + - + - + - + +"> - - + - + - + - + - + - + - + - + - + +">
  571  572  570   571   569   570   568   569   567   568   566  567  565   566  564  565  563  564  562  563 
  561   562    560   561  559   560   558   559   557  558  556  557  555   556  554 555 553  554  552  553 
   551    552    550   551  549   550   548   549   547   548   546  547   545    546  544  545  543  544  542  543 
   541    542     540     541   539   540   538   539   537   538   536   537   535   536  534  535  533  534  532  533
diff --git a/flood-via-browser.htm b/flood-via-browser.htm index b277d5d9..f2d85d7e 100644 --- a/flood-via-browser.htm +++ b/flood-via-browser.htm @@ -249,9 +249,9 @@

Flood pre-targeted Russian propaganda & infrastructure by day via our flood tool + Day 582 Day 581 - Day 580 - Day 579 + Day 580

as you'll already know, the IT Army of Ukraine puts out a list of targets every day.
These targets are chosen by an intelligence team who look into everything going on in Russia and with the war to determine what would be the most effective place to strike and when.
It's thanks to organised and coordinated attacks like this that we were able to not only take down, but cause permanent damage to the Russian streaming service RuTube, banks funding the invasion and more..
@@ -260,32 +260,32 @@

+ Day 579 Day 578 Day 577 - Day 576 + Day 576 Day 575 Day 574 - Day 573 + Day 573 Day 572 Day 571 - Day 570 + Day 570 Day 569 - Day 568 - Day 567 + Day 568 - Day 566 + Day 567 + Day 566 Day 565 - Day 564 - --> Today's Script <-- + --> Today's Script <--