Shape
Exotic Booter Also Offers API Access

API is useful if you wish to resell Exotic Booter or implement it into your own software without logging in through the web panel, all that is needed is a simple HTTP GET request to launch/stop attacks, you will need to purchase a plan that includes API access to use this.


Here you can find a list of some popular methods used by Exotic Booter and description for those methods.

Layer 4 Methods:


CLDAP - Layer 4 (UDP AMP)

A CLDAP Reflection Attack is a UDP based Layer 4 attack that exploits the Connectionless Lightweight Directory Access Protocol (CLDAP), which is an efficient alternative to LDAP queries over UDP. Where the Attacker sends an CLDAP request thousands of servers to generate a large amount of UDP traffic.


DNS - Layer 4 (UDP AMP)

With a DNS attack, the attacker takes advantage of a DNS server that permits lookups and uses recursion to spread his attack to other DNS servers. This generate a large amount of UDP traffic.


UDP BYPASS - Layer 4 (UDP BYPASS)

UDP-BYPASS Is a Advanced method created to bypass the firewalls and ddos protection of servers to be able to flood protected servers.


PUBG BYPASS - Layer 4 (BYPASS)

PUBG BYPASS Is a method created to bypass the firewalls and ddos protection of PUBG servers to be able to flood and take down protected PUBG game servers.


FIVEM BYPASS - Layer 4 (BYPASS)

FIVEM BYPASS Is a method created to drop bypass fivem servers,it is able to flood and take down protected FIVEM game servers.


SSYN - Layer 4 (TCP)

SSYN Is a spoofed version of SYN, In a SYN flood attack, the attacker sends repeated SYN packets to the port on the targeted server, using a fake IP address. This causes the server to go offline.


TCP-AMP - Layer 4 (TCP AMP)

TCP-AMP is a tcp AMP method where the attacker sends requests to vulnerable servers to create large amount of TCP traffic.


TCP BYPASS - Layer 4 (TCP BYPASS)

TCP-BYPASS Is a Advanced TCP method created to bypass the firewalls and ddos protection of servers to be able to flood protected servers.


Layer 7 Methods:

ROSETTA - Layer 7 (BYPASS)

ROSETTA is a bypass method that provides a better bypass for JS Challenges (especially Cloudflare UAM) This method is aimed at bypassing ratelimits and strictly follows the specified Rate.


STORM BYPASS - Layer 7 (BYPASS)

STORM BYPASS is a bypass method that generates lots of GET requests to take a protected website offline.


STORM CAPTCHA - Layer 7 (BYPASS)

STORM CAPTCHA is a captcha bypass aka a "im not a robot" bypass method that generates lots of requests to take a website offline.


HTTP REQ - Layer 7 (HIGH R/S)

HTTP REQ is a simple method that is able to generate lots of GET requests to take websites offline.


STORM HTTP - Layer 7 (HIGH R/S)

STORM HTTP is a method that bypasses some simple firewalls and is able to generate lots of requests to take websites offline.


HTTP BURST - Layer 7 (HIGH R/S) (OLD)

HTTP BURST is a unique method that bypasses some simple firewalls and is able to generate lots of requests to take websites offline.


X EMULATOR - Layer 7 (BYPASS) (OLD)

XEMULATOR Is a advanced layer 7 flood method that emulates the chromium browser and is able to bypass advanced protections like the catcha aka "im not a robot" protection but often takes about 60-120 seconds to take effect.


SOCKET - Layer 7 (HIGH R/S) (OLD)

SOCKET method is able to generate lots of requests to take websites offline.