API is useful if you wish to resell Nightmarestresser or implement it into your own software without logging in through the web panel, all that is needed is a simple HTTP GET request to launch/stop attacks, you will need to purchase a plan that includes API access to use this.
Cloudflare, Cloudflare Captcha (hcaptcha and recaptcha), Sucuri, Stormwall, Amazon CDN Cloudfront, Imperva Incapsula, Akamai, Fastly, Blazingfast, DDoS-Guard, Nooder, React.su, Qrator, Arvan Cloud Digital Ocean, Hetzner, Amazon AWS, Google Cloud, Linode, Maxihost, Some OVH servers and many More!
UDP-MIX is a unique method that scans all known udp amps and filters only the best reflectors in each to create a mix attack using up to 15 different udp amplification techniques with only the best reflectors from each.
An NTP amplification attack is a reflection-based flood in which the hacker exploits a Network Time Protocol (NTP) server functionality in order to overwhelm a targeted network or server with an amplified amount of UDP traffic, rendering the target and its surrounding infrastructure inaccessible to regular traffic.
With a DNS attack, the attacker takes advantage of a DNS server that permits lookups and uses recursion to spread his attack to other DNS servers. This generate a large amount of UDP traffic.
UDP-BYPASS Is a Advanced method created to bypass the firewalls and ddos protection of servers to be able to flood protected servers.
GAME-FIVEM BYPASS Is a method created to bypass fivem servers,it is able to flood and take down protected FIVEM game servers.
UDPFLASEREPORT is a very advanced method that exploits mass reports to try and get the server banned or shutdown until they file an appeal.
TCP/UDP AMP MIX is another very advanced method that uses the best udp and tcp reflectors to create a attack that uses both reflections in a single attack.
MINECRAFT Is a bypasss method created to bypass protection firewall of mc servers,it is able to flood and take down some protected minecraft game servers.
TCP-AMP is a tcp AMP method where the attacker sends requests to vulnerable servers to create large amount of TCP traffic.
TCP-BYPASS Is a Advanced TCP method created to bypass the firewalls and ddos protection of servers to be able to flood protected servers.
GEO-BYPASS Is a unique method that will only use local ips to the target to attack the target, bypassing any geo blocks in place.
TCP SYN Is a spoofed version of SYN, In a SYN flood attack, the attacker sends repeated SYN packets to the port on the targeted server, using a fake IP address. This causes the server to go offline.
SYN ACK responce from real dns server around the world.
TCP-RAND uses random tcp presets to create a very random tcp attack that is hard to preditct very useful on some bad ddos protection services.
TCP-WEBSERVERS uses real webservers from around the world to reflect data from HTTP & HTTPS
TCP-OVH is a very advanced layer 4 tcp bypass that can bypass and take down some ovh servers and even works on other ddos protection services.
AUTO-BYPASS is a bypass method that aims to bypass challenges automatically works on many forms of protected web targets.
Bypass v2 was made to bypass and take down as many protected websites as possible this is a very good method for ranom HTTP/HTTPS ddos protection services and even works on cloudflare.
SOCKET-SPAM is a NON bypass method that aims to spam many requests to the target with the socket method, this is good for non protected layer 7 targets aka websites.
AUTO-BYPASSV2 is a edited version of v1 made only to bypass cloudflare challenges but is also known to work on some other non cloudflare targets.
HTTP-SPAMMER is a NON bypass method that aims to spam many requests to the http or https target, this is good for non protected layer 7 targets aka websites.
Tor method is simple, was created to attack .onion sites and bypass some basic ddos protections that are used on tor sites.
ROSETTA is a bypass method that provides a better bypass for JS Challenges (especially Cloudflare UAM) This method is aimed at bypassing ratelimits and strictly follows the specified Rate.
STORM BYPASS is a bypass method that generates lots of GET requests to take a protected website offline.
STORM CAPTCHA is a captcha bypass aka a "im not a robot" bypass method that generates lots of requests to take a website offline.
HTTP REQ is a simple method that is able to generate lots of GET requests to take websites offline.
STORM HTTP is a method that bypasses some simple firewalls and is able to generate lots of requests to take websites offline.
HTTP BURST is a unique method that bypasses some simple firewalls and is able to generate lots of requests to take websites offline.
XEMULATOR Is a advanced layer 7 flood method that emulates the chromium browser and is able to bypass advanced protections like the catcha aka "im not a robot" protection but often takes about 60-120 seconds to take effect.
SOCKET method is able to generate lots of requests to take websites offline.
An SNMP reflection is a type of Distributed Denial of Service (DDoS) attack that is reminiscent of earlier generations of DNS amplification attacks. Instead of Domain Name Servers (DNS), SNMP reflection attacks use the Simple Network Management Protocol (SNMP) – a common network management protocol used for configuring and collecting information from network devices like servers, hubs, switches, routers and printers.
A Simple Service Discovery Protocol (SSDP) attack is a reflection-based distributed denial-of-service (DDoS) attack that exploits Universal Plug and Play (UPnP) networking protocols in order to send an amplified amount of traffic to a targeted victim, overwhelming the target’s infrastructure and taking their web resource offline.
The CHARGEN protocol, also known as the Character Generator Protocol, is a network service defined in 1983. Its specifications are laid out in RFC 864. CHARGEN flood attacks were developed to simplify testing, troubleshooting and evaluating networks and applications. The Character Generator Protocol is based on the simple idea of providing a service that can be accessed both by TCP and UDP protocol (via port 19). If the service is accessed, it will use that connection to send a random number of random characters (data).
A CLDAP Reflection Attack is a UDP based Layer 4 attack that exploits the Connectionless Lightweight Directory Access Protocol (CLDAP), which is an efficient alternative to LDAP queries over UDP. Where the Attacker sends an CLDAP request thousands of servers to generate a large amount of UDP traffic.
This method leveraged the Apple Remote Desktop (ARD) or Apple Remote Management Service (ARMS) services, which provides Remote Desktop and management services on MacOSX devices using UDP Port 3283.
DDoS vector that leverages a UDP Amplification technique known as WS-Discovery (WSD). The situation surrounding WSD was recently made public, but multiple threat actors have begun to leverage this DDoS method to ramp up their attacks.
PUBG BYPASS Is a method created to bypass the firewalls and ddos protection of PUBG servers to be able to flood and take down protected PUBG game servers.