Skip to content

πŸ”₯πŸš€ Destroyer-DoS is a very powerful 🌩️ tool designed to simulate a DoS attack by flooding a specified IP 🎯 and port with TCP packets. Harnessing the capabilities of Python's asyncio ⚑ and multiprocessing πŸ”„, πŸ“˜ For educational purposes only. πŸš¨πŸ›‘οΈ Use responsibly and ensure proper authorization. πŸš«πŸ”’

License

Notifications You must be signed in to change notification settings

Destroyer-official/Destroyer-DoS

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

21 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation


🌐 Destroyer-DoS: Advanced DDoS Simulation Tool 🌐

License: MIT Python


🚨⚠️ WARNING: Educational Purposes Only! Unauthorized Use May Have Legal Consequences. Act Responsibly and Obtain Proper Authorization. ⚠️🚨


πŸ“‚ File: ddos.py - Destroyer Denial of Service Simulation


🌟 Overview

Destroyer-DoS is an educational script for simulating Distributed Denial of Service (DDoS) attacks. This tool uses Python’s async and multiprocessing capabilities to unleash high-impact network stress on specified IPs and ports. Ideal for testing network resilience in authorized environments. πŸš€


πŸ› οΈ Features

  • 🎯 Multi-Protocol Support: TCP, UDP, HTTP, HTTPS, ICMP
  • πŸš€ Asynchronous Packet Sending: Fast and non-blocking
  • πŸ”„ Multiprocessing: High-throughput operations
  • 🧩 Flexible Packet Size, Process & Thread Control
  • πŸ’» Cross-Platform Compatible with Robust Error Handling

πŸš€ Installation & Setup

  1. Clone the Repository:

    git clone https://github.com/Destroyer-official/Destroyer-DoS.git
  2. Navigate to the Directory:

    cd Destroyer-DoS
  3. Install Required Packages:

    • Standard library dependencies are generally included with Python. If you're using Python <3.4, install any missing modules listed in requirements.txt:
    pip install -r requirements.txt

🌐 Command Usage Examples

To execute the script, run:

python ddos.py -ip [Target_IP] -p [Target_Port] -pr [Processes] -t [Threads] -[Protocol]

Examples:

Single Protocol Attack 🌊

  • TCP Attack:
    python ddos.py -ip 192.168.0.1 -p 80 -pr 30 -t 20 -T
  • UDP Attack:
    python ddos.py -ip 192.168.0.1 -p 53 -pr 30 -t 20 -U
  • ICMP Ping Attack:
    python ddos.py -ip 192.168.0.1 -pr 30 -t 20 -I
  • HTTP Flood:
    python ddos.py -ip 192.168.0.1 -p 80 -pr 30 -t 20 -H
  • HTTPS Flood:
    python ddos.py -ip 192.168.0.1 -p 443 -pr 30 -t 20 -S

All Protocols Combined Attack 🌐

  • Run all protocols simultaneously:
    python ddos.py -ip 192.168.0.1 -p 80 -pr 30 -t 20 -A

Advanced Options βš™οΈ

  • Custom Port Range:
    python ddos.py -ip 192.168.0.1 -p 80-90 -pr 30 -t 20 -T
  • Multiple Ports:
    python ddos.py -ip 192.168.0.1 -p 80,443,8080 -pr 30 -t 20 -U
  • Specify Packet Size:
    python ddos.py -ip 192.168.0.1 -p 80 -pr 30 -t 20 -ps 1024 -T

πŸ’» Command-Line Arguments Guide

Argument Description
-ip Target IP address.
-p Target port (can be a single port, range, or multiple ports separated by commas).
-T Use TCP protocol for the test.
-U Use UDP protocol for the test.
-I Use ICMP protocol (ping simulation).
-H Use HTTP protocol.
-S Use HTTPS protocol.
-A Run all protocols concurrently.
-pr Number of processes to run concurrently (default: 30).
-t Number of threads per process (default: 40).
-ps Packet size in bytes (default: maximum for selected protocol).

πŸ“š How It Works

  1. Target Preparation:

    • Validates target IP and port information.
    • Establishes CPU affinity to optimize resource usage on multi-core systems.
  2. Protocol-Specific Packet Sending:

    • TCP: Creates TCP connections and sends continuous random data streams.
    • UDP: Sends random UDP packets to impact network bandwidth.
    • ICMP: Simulates ping requests using ICMP packets.
    • HTTP/HTTPS: Sends asynchronous HTTP/HTTPS requests to simulate web server load.
  3. Process and Thread Management:

    • Distributes load across multiple processes and threads, simulating distributed attacks.

⚠️ Disclaimer

Disclaimer: This script is intended for educational purposes only and should be used to test network robustness in authorized environments. Unauthorized use may have legal consequences. Always ensure proper authorization.


🀝 Contributing

Contributions are welcome! If you have ideas for improvements, feel free to submit a pull request or create an issue.


πŸ“œ License

This project is licensed under the MIT License. See the LICENSE file for more details.


Happy Testing! πŸš€πŸŒ


About

πŸ”₯πŸš€ Destroyer-DoS is a very powerful 🌩️ tool designed to simulate a DoS attack by flooding a specified IP 🎯 and port with TCP packets. Harnessing the capabilities of Python's asyncio ⚑ and multiprocessing πŸ”„, πŸ“˜ For educational purposes only. πŸš¨πŸ›‘οΈ Use responsibly and ensure proper authorization. πŸš«πŸ”’

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy