Flood is a tool which expolits some the most popular DDoS attacks

FLOOD

Flood is a DDoS(Destributed denail of service) tool which can exploit some of the most popular DoS/ DDoS attacks.

Features flood v0.0.1

  • It Supports HTTP GET request flood DoS attack.
  • It Supports ICMP ping request flood DDoS attack.
  • It Supports TCP SYN flood DDoS attack.
  • It Supports TCP PSH+ACK flood DDoS attack.
  • It Supports UDP flood DoS attack.
  • It uses spoofed source IP for the ICMP, SYN and PSH+ACK flood DDoS attack.
  • It Supports both IPv4 and IPv6 addresses for all the attacks excluding the HTTP GET flood.
  • It's Simple and easy to use, it allows you to use wizard if you find the commands hard remember.

Screenshots

Flood Wizard Wireshark

Disclaimer

By using this tool you agree that you'll be helt accountable for any illegal usage. Use this tool for only penetration testing and in ethical way!. Do not use it on any network you don't permission. Be White Hat Hacker 😉️ 😀️ .

Requirements

  • Python3
  • GCC compile

Installation

  • Installing flood on any unix-like OS, note that this tool will not work on windows platform.
git clone https://github.com/4anonz/Flood.git
cd Flood
chmod +x build.sh
./build.sh
./flood.py

Commands

Commands

Usage: python3 flood [OPTIONS]
flood version: 0.0.1
ATTACKS:
--get-flood                Perform the HTTP GET request flood DoS attack.
--icmp-flood               Perform the ping ICMP flood DDoS attack.
--psh-flood                Perform the TCP PSH+ACK flood DDoS attack.
--syn-flood                Perform the TCP SYN flood DDoS attack.
--udp-flood                Perform the UDP flood DDoS attack.
HTTP flood:
-u,  --url                 Specify the URL to attack.
-p,  --port                Specify the port number for the HTTP GET reuqest flood.
GENERAL OPTIONS:
-t,  --target              Specify the target IP address/hostname.
-s,  --source              Specify a file path containing any number of spoofed source 
                            IP addresses(one per line) of this option is only available for the ICMP, 
                            TCP PSH+ACK, TCP SYN flood attacks, check the generating source IP
                            section. 
-n,  --packets             Specify the number of packets to send or Number of GET
                            requests to send for the HTTP GET request flood.
GENERATING SOURCE IP(s):
-g,  --generate            Use this option to specify the IP address of the network
                            for generating spoofed source IP(s), you can specify many ip addresses 
                            with
                            comma(,) seperated without white space.
-o,  --write               Specify the name of the output file to write the IP addresses. 
MISCELLANEOUS/MISC:
These options doesn't fit any of the category
-w,  --wizard              Use a simple wizard interface to help for beginner users.
-h,  --help                Print this help massage and exit.
-v,  --version             Print program version and exit.

The --help Command

The '-h' or '--help' command just prints out the help massage and exit.

Generating spoofed source IP

Some of the attacks requires that you specify a file containing IP addresses. The Idea is to use those IP addresses to spoofed the source IP address so that the target host will be sending responses to a falsified IP address. The '-g'/'--generate' command help you to generate the IP address then use it with the '-o'/'--write' argument to write the output to the file name given.

  • Example:
./flood.py -g 127.0.0.1 -o /home/user/source_ip.txt

You can also specify more than one IP address with comma(,) seperated.(without white space)

  • Example2:
./flood -g 127.0.0.1,10.0.0.2,192.168.43.3 --write /home/user/source_ip.txt

The --wizard Command

The '-w' or '--wizard' commands can be used to launch the UI which will guide you to perform your desired task. this is useful if you find the commands quite difficult to remember!.

  • Example:
./flood.py --wizard

--get-flood command

The --get-flood command is used for performing HTTP GET flood DoS attack.

  • Arguments Use the '-u' or '--url' flag to specify the target(or website) URL. Use the '-p' or '--port' flag to specify the port number of the attack. This is optional, if not specified then flood will default to port 80. Use the '-n' or '--packets' flag to specify the number of requests to send. This argument is required for all the attacks.
  • Example:
./flood.py --url URL -n 12500 --get-flood

--icmp-flood command

The --icmp-flood command is use for exploiting the ICMP ping flood DDoS attack.

  • Arguments Use the '-t' or '--target' to specify the target's hostname or IP address. Use the '-s' or '--source' to specify a file contaning spoofed source IP addresses, This argument is required for all the attacks excluding the HTTP GET flood and UDP flood attacks.
  • Example:
./flood.py --icmp-flood -t 127.0.0.1 -s /home/user/source.txt --packets 1920000

--psh-flood command

This command is use for exploiting the TCP PSH+ACK flood DDoS attack.

  • Example:
./flood.py --psh-flood -t 127.0.0.1 --port 80 -s /home/user/source.txt -n 192000

--syn-flood command

This command is use for exploiting the TCP SYN flood DDoS attack.

  • Example:
./flood.py -n 19200 -p 80 -t 127.0.0.1 -s /home/user/source.txt --syn-flood

--udp-flood command

This command is use for flooding the target host with UDP packets. It accepts only 2 arguments.

  • Example:
./flood.py --target 127.0.0.1 --packets 192002 --udp-flood

Author

Anonymous Hacks(4anonz) - I am White Hat 😎️ .

Suggestions and Feedback

Please send me email Or facebook if you have any feedback or suggestions or any bogus you want to report. Facebook Anonymous Hacks.

Owner
I'm Åñôñymøüs Håcks, I usually code in C and C++ and sometimes Python and Java, I'm good at network programming usually in C, C++ and Python
null
Similar Resources

This Repo would take notes for some OCW courses which I consider it is excellent.

Excellent OCW This Repo would take notes for some OCW courses which I consider it is excellent. Course Code HomePage Assignment&Note [Done] MIT 6.S096

Apr 24, 2022

An embedded CAN bus sniffer which is able to monitor any of the vehicle internal CAN bus and perform some action by triggering new CAN messages.

An embedded CAN bus sniffer which is able to monitor any of the vehicle internal CAN bus and perform some action by triggering new CAN messages.

An embedded CAN bus sniffer which is able to monitor any of the vehicle internal CAN bus and perform some action by triggering new CAN messages. In this way certain vehicle functionality can be triggered by responding to custom steering wheel button events, or use the vehicle virtual cockpit to display OBD-PIDs values instead of relying on an external display to present new information to the user

Nov 13, 2022

Maker of special .exe, which contains additional files which are unpacked when .exe is run

exe-archivator Program that make exec-me.exe, which contains additional files which are unpacked when exec-me.exe is run. After compleating unpacking

Dec 17, 2021

taos-tools are some useful tool collections for TDengine.

taos-tools taos-tools are some useful tool collections for TDengine. How to build from source? install dependencies For Ubuntu/Debian system sudo apt

Nov 11, 2022

Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions

Table of Contents Table of Contents Introduction Named-Pipes Introduction Exploitation Spraying the non-paged pool Memory Disclosure/Arbitrary Read Co

Nov 30, 2022

One of my most recognised, old, products.

System48 This is one of my most well renowned products, it existed between 2016 and 2017 - with about four iterations, each better than the last, this

Nov 16, 2022

CAN-BUS sniffing for Volkswagen Golf MK7 (and most likely other MQB platform cars)

MQB-sniffer CAN-BUS sniffing for Volkswagen Golf MK7 (and most likely other MQB platform cars). Currently this is more a work log for future reference

Nov 7, 2022

To turn on and off the pump, most people use a manual switch.

To turn on and off the pump, most people use a manual switch.

To turn on and off the pump, most people use a manual switch. As a result, people forget to switch off the pump from time to time, resulting in water overflow. They may forget to switch on the motor at times, resulting in a water problem later on. It also wastes a lot of electricity. To solve this problem, we need a smart device to control the pump.

Aug 20, 2022

Solves a given NxN wordsearch in under 0.3 seconds at most using Rabin-Karp string algorithm.

ASSIGNMENT 2 The Information of the Creator: ASSIGNMENT 2 Author: Lukas Waschuk CCID: lwaschuk Date: 03-20-2021 The Purpose of Your Program: This prog

May 17, 2022
Related tags
Identify I2C devices from a database of the most popular I2C sensors and other devices

I2C Detective Identify I2C devices from a database of the most popular I2C sensors and other devices. For more information see http://www.technoblogy.

Oct 14, 2022
Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detections and correlation rules by Blue teams.

SysmonSimulator SysmonSimulator is an Open source Windows event simulation utility created in C language, that can be used to simulate most of the att

Nov 29, 2022
Cobalt Strike is a commercial, full-featured, remote access tool that bills itself as "adversary simulation software designed to execute targeted attacks and emulate the post-exploitation actions of advanced threat actors".
 	Cobalt Strike is a commercial, full-featured, remote access tool that bills itself as

COBALT STRIKE 4.4 Cobalt Strike is a commercial, full-featured, remote access tool that bills itself as "adversary simulation software designed to exe

Aug 21, 2022
Hidden Eye is an all in one tool that can be used to perform a variety of online attacks on user accounts

Hidden Eye is an all in one tool that can be used to perform a variety of online attacks on user accounts. It’s well loaded, therefore it can be used as keylogger (keystroke logging), phishing tool, information collector, social engineering tool, etc.

Jun 24, 2022
Libft is an individual project at 42 that requires us to re-create some standard C library functions including some additional ones that can be used later to build a library of useful functions for the rest of the program.
Libft is an individual project at 42 that requires us to re-create some standard C library functions including some additional ones that can be used later to build a library of useful functions for the rest of the program.

Libft is an individual project at 42 that requires us to re-create some standard C library functions including some additional ones that can be used later to build a library of useful functions for the rest of the program.

Apr 5, 2022
Hydrogen is a tiny GDI Malware, with some bytebeat music, many payloads and some shaders
Hydrogen is a tiny GDI Malware, with some bytebeat music, many payloads and some shaders

Hydrogen is a tiny GDI Malware, with some bytebeat music, many payloads and some shaders

Nov 12, 2022
Provide a unified trading framework and connectors to popular trading venues

Boost.connector Provide a unified trading framework and connectors to popular trading venues This is currently NOT an official Boost library. Introduc

Nov 24, 2021
Simple emulator for the extremely popular Chip-8 Virtual Machine.
Simple emulator for the extremely popular Chip-8 Virtual Machine.

C8_Emulator [System Structure Reference] #@@@@@@@@@@@. @@@@@@@@@@@@@@@@,

Nov 6, 2021
A MCBE dll mod (mainly for testing) which modifies some piston functions
A MCBE dll mod (mainly for testing) which modifies some piston functions

PistonFuckery A MCBE dll mod (mainly for testing) which modifies some piston functions. The current version modifies PistonBlockActor::_checkAttachedB

Apr 24, 2022