We recommend using amplification methods such as LDAP / NTP for the best results. We scan amp lists every week, so power from those methods will never suffer. If you find your target is hard to down with those methods, then we have TCP methods specially designed to bypass such protections on servers. TCP methods with the likes of WinSyn, bluesyn, xsyn and sudp. Other include STORM which bypasses both TCP and UDP filters. Those methods will give your target a real hard time if it is protected. If you are looking to down game servers, then UDPBYPASS is your method. We have a method called STEAM which is specially designed for steam games, all steam servers. That means it will work on OVH too. We have many, many brilliant methods that all work in different ways. If one doesn't down your target, another will! Also note, all scripts spoof IP header. Meaning, no attacks can be traced back to this booter!
Just buy the amount of credits your plan is worth. For example, if you want the $5 plan, you buy 5 Credits. Upon receiving your purchased credits, you can go ahead and activate your plan!
We accept PayPal and cryptocurrencies such as Bitcoin, Ether and Litecoin through the CoinPayments gateway. We do not recommend the likes of PayPal and other insecure processors that is deemed very risky for a booter service. We have a simple bitcoin tutorial on our site, and we highly suggest you follow it if you are looking to buy a booter service.
All logs automatically deleted every 24 hours.
Simple, you don't! And you can't. We use our own high grade spoofing servers that can spoof IP header when attacks are sent, therefore, each attack is impossible to track.
Security is a big factor here, we want our users to be safe! We use HTTPS & all our databases are hashed with bcrypt which is impossible to crack.
Targeting government websites is a big no no here. We do not allow this at all. We block attacks towards .gov websites. However, if you have found some bypass to this, please let us know!
Currently, we do not sell API's. However, we are currently developing a source that will support that! Should be ready around August.