From e878dc347ba1a6d6f7485f41660fb1d26d0fc2a5 Mon Sep 17 00:00:00 2001 From: rmellis <41447552+rmellis@users.noreply.github.com> Date: Tue, 21 Nov 2023 22:47:02 +0000 Subject: [PATCH] Added Day 636 - Targets and Days (TL) Eng+Ukr MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Simply run this for as long as you can to help flood Russia in the most legal, yet effective way possible New targets imported from db1000n: To keep up with targets we're going to use the db1000n targets direct from their GitHub repository. These updates will be daily, so if the db1000n changes, it will probably take a few hours longer for the change to make it here. Message posted by the IT Army of Ukraine: This time, we successfully disconnected the major internet provider Trinity in Donetsk, which is also used by the enemy for military purposes. This is the result of our consistent strategy aimed at complicating the enemy's use of any infrastructure. For those who still doubt how significant a contribution the IT ARMY is making to the enemy's cyberspace - read the Kommersant article, where telecom providers have become the most popular targets in the Runet in the third quarter. A coincidence? Definitely not. / *** / Просто запускайте це стільки, скільки зможете, щоб допомогти наповнити Росію найбільш законним, але ефективним способом Нові цілі, імпортовані з db1000n: Щоб не відставати від цілей, ми збираємося використовувати цілі db1000n безпосередньо з їхнього сховища GitHub. Ці оновлення відбуватимуться щодня, тож якщо db1000n зміниться, ймовірно, знадобиться кілька годин більше, перш ніж зміни з’являться тут. Інформація про цілі: Цього разу, нам вдалося відключити великого інтернет-провайдера Trinity у Донецьку, який також використовується ворогом у військових цілях. Це результат нашої послідовної стратегії спрямованої на ускладнення використання ворогом будь-якої інфраструктури. Для тих хто досі сумнівається наскільки великий внесок робить IT ARMY у ворожий кібернетичний простір - читайте статтю Комерсант, де телеком провайдери стали найпопулярнішими цілями в рунеті в третьому кварталі. Збіг? Ось точно ніт. --- auto.htm | 6 +- day636.htm | 541 ++++++++++++++++++++++++++++++++++++++++++ days.htm | 218 ++++++++--------- flood-via-browser.htm | 20 +- 4 files changed, 663 insertions(+), 122 deletions(-) create mode 100644 day636.htm diff --git a/auto.htm b/auto.htm index dac8911a..9c74ff22 100644 --- a/auto.htm +++ b/auto.htm @@ -156,9 +156,9 @@

You'll be redirected any second...

- +



- You are about to be directed to Day 635 in 10 Seconds

+ You are about to be directed to Day 636 in 10 Seconds

-

Not Working? Click Here


+

Not Working? Click Here


*

diff --git a/day636.htm b/day636.htm new file mode 100644 index 00000000..a87a6c91 --- /dev/null +++ b/day636.htm @@ -0,0 +1,541 @@ + + + + + + Day 636 flood + + + + + + + + + + + + + + + + + + + + + + +
+ + + + +
+ + + + + + + +
Info: Your Public IP Address is:
Loading..
For privacy, download the Tor Browser: https://www.torproject.org/download/  
+

Propaganda http(s) flood for Day 636 using targets from the IT Army of Ukraine.

+
+

Information about this tool.

+
+ + + +

This tool is hosted via GitHub Page, You can download it for local use and customization here. A new page will be added for each day, with a new set of targets from the Ukrainian IT Army's telegram servers.

+

All of the news in the Russian federation is fake and need to be shut down, we need as many people as possible to help. Just a tiny 1kbps of data could be the edge needed to take down a server hosting propaganda.
+
Just open this page and leave it running on your devices as long as possible, it will flood targets selected specifically for that day.
+ Targets are chosen by an intelligence team who are always looking at what services are aiding Russia’s war,together we can pose a huge load on their infrastructure.

+
+ Click Here for FAQ (Questions & Answers) +

+ + + + +

FAQ:
+ Q) How can I use this in the tor browser if HTTPS overrides HTTP no matter what i try?
+ A) Download the page for local use, it won't use any http/https protocols because those are used to request files from a web server, but using it locally (directly from your computer) bypasses the need and allows you to flood both HTTP and HTTPS from your TOR Browser's IP.

+

Q) How can I see what's happening in more detail?
+ A) Redacted for security.

+

Q) After so much time has passed, my browser/computer become very laggy and unresponsive or my browser crashes, how can I fix this?
+ A) Redacted for security.

+

Q) Why are some of the requests having the same number error after a while?
+ A) This is likely caused by the IP of the VPN you're using has been blocked on their side, but it could also mean the site's just totally overloaded and cannot respond to any requests.
Also if you’re are using https:// in the address bar that would cause the http:// addresses to do the same

+
+
+ + + + +

Session Status

+

Below is a log of sites that ether responded with errors or failed to respond at all.
+ It’s normal for this number to count up slow or fast and can often change.
+ If a lot of services are overloaded the numbers will go fast, else they’ll go slower.
+ If all requests are the same as all errors on some sites, it most likely means that the
+ site operator has banned the IP you’re using.
+

+
+
+

Total number of requests: 0

+

So far zero sites have responded with errors

+
+
+
+
+
+
+
Estimate: data requested from servers via GET: 0MB (MegaBytes)
+ + + + \ No newline at end of file diff --git a/days.htm b/days.htm index 7947b295..ebcf26e4 100644 --- a/days.htm +++ b/days.htm @@ -68,190 +68,190 @@ - - + - - - -

 Day 635
-  

 Day 636
+  
  
-  День 635 +">  
+  День 636

Day 634
Day 635
  
+">  
+День 635
Day 634
+    
День 634
Day 633
-  Day 633
  
+">  
День 633
Day 632
Day 632
  
+">  
День 632
Day 631
  
+">  
День 631
Day 630
  
+">  
День 630
Day 629
  
+">  
День 629
Day 628
  
+">  
День 628
Day 627
Day 627
  
+">   
День 627
Day 626
   
-День 626
- - + - + - + - + - + - + - + - + - + +"> - - + - + - + - + - + - + - + - + - + +"> - - + - + - + - + - + - + - + - + - + +"> - - + - + - + - + - + - + - + - + - + +">
  625  626  624   625   623   624   622   623   621   622   620  621  619   620  618  619  617  618  616  617 
  615   616    614   615  613  614  612   613   611  612  610  611  609   610  608 609 607  608  606  607 
   605    606    604   605  603   604   602   603   601   602   600  601   599    600  598  599  597  598  596  597 
   595    596     594     595   593   594   592   593   591   592   590   591   589   590  588  589  587  588  586  587
diff --git a/flood-via-browser.htm b/flood-via-browser.htm index 49f4b8b5..309ba9b5 100644 --- a/flood-via-browser.htm +++ b/flood-via-browser.htm @@ -249,9 +249,9 @@

Flood pre-targeted Russian propaganda & infrastructure by day via our flood tool + Day 636 Day 635 - Day 634 - Day 633 + Day 634

as you'll already know, the IT Army of Ukraine puts out a list of targets every day.
These targets are chosen by an intelligence team who look into everything going on in Russia and with the war to determine what would be the most effective place to strike and when.
It's thanks to organised and coordinated attacks like this that we were able to not only take down, but cause permanent damage to the Russian streaming service RuTube, banks funding the invasion and more..
@@ -260,32 +260,32 @@

+ Day 633 Day 632 Day 631 - Day 630 + Day 630 Day 629 Day 628 - Day 627 + Day 627 Day 626 Day 625 - Day 624 + Day 624 Day 623 - Day 622 - Day 621 + Day 622 - Day 620 + Day 621 + Day 620 Day 619 - Day 618 - --> Today's Script <-- + --> Today's Script <--