Shop Distributed Denial of Service attack - JsBypass - Script | Access (API) - Bypass Method

Discussion in 'Other Services' started by SynxLx, Jun 30, 2019.

Thread Status:
Not open for further replies.
Welcome to MCTrades, the modern Minecraft marketplace. Why not stay a while to chat, trade, and earn by registering?
  1. SynxLx

    SynxLx New Trader
    BANNED Thread Starter

    Posts:
    1
    Ratings:
    +0
    Hi,
    Presentation :

    _ Here is a presentation of my service, attack denial of serivce (Layer 7 - L7) based on a method of attack named "JsBypass" bypassing the UAM CF (CloudFlare) this method of attack exists since about 6 - 7 Months it is able to bypass quite a lot of site having a protection of type "CloudFlare", this method is a method developed in nodejs (Framework JavaScript).

    Rules :

    - Any infrastructure can be targeted. (As well as government sites).

    Service :


    API :
    . API access * 1 Concurrents * 800 Seconds : 15 €
    . API access * 2 Concurrents * 1600 Seconds : 25 €
    . API access * 3 Concurrents * 2400 Seconds : 35 €
    . API access * 4 Concurrents * 3200 Seconds : 45 €
    . API access * 7 Concurrents * 5000 Seconds : 60 €

    Proof :

    . For proofs, come on discord.

    - https://www.israeldefense.co.il/ | https://image.noelshack.com/fichiers/2019/26/7/1561903524-oups1.png | https://check-host.net/check-report/abeaaa6k6c7
    - https://kfaction.net/ | https://image.noelshack.com/fichiers/2019/26/7/1561903527-oups2.png | https://check-host.net/check-report/abeac7fk835
    - https://www.vape.gg/ | https://image.noelshack.com/fichiers/2019/26/7/1561903534-oups3.png | https://check-host.net/check-report/abeaed7kf36
    - http://www.sudan.gov.sd/ | https://image.noelshack.com/fichiers/2019/26/7/1561903541-oups4.png | https://check-host.net/check-report/abeaf62kd04


    Payment method: BTC / ETH / PPL

    For any purchase, contact me on discord :
    SynxLx#7118
    Banned Reason: Alternative Account of #16049 (SionPrivate) Ban Ends: Never