{"id":27933172,"url":"https://github.com/threadlinee/proxy-ddos","last_synced_at":"2025-05-07T04:27:42.193Z","repository":{"id":291743495,"uuid":"978629178","full_name":"Threadlinee/Proxy-DDoS","owner":"Threadlinee","description":"Proxy DDoS","archived":false,"fork":false,"pushed_at":"2025-05-06T09:39:46.000Z","size":10,"stargazers_count":1,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-05-06T10:46:00.244Z","etag":null,"topics":["ddos","ddos-attack-tools","ddos-attacks","ddos-tool","hacking","linux","termux","windows"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/Threadlinee.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null}},"created_at":"2025-05-06T09:25:28.000Z","updated_at":"2025-05-06T09:39:49.000Z","dependencies_parsed_at":"2025-05-06T10:46:10.680Z","dependency_job_id":"9840907b-a356-4e5c-8a47-77c5606a030c","html_url":"https://github.com/Threadlinee/Proxy-DDoS","commit_stats":null,"previous_names":["threadlinee/ddos"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Threadlinee%2FProxy-DDoS","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Threadlinee%2FProxy-DDoS/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Threadlinee%2FProxy-DDoS/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Threadlinee%2FProxy-DDoS/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/Threadlinee","download_url":"https://codeload.github.com/Threadlinee/Proxy-DDoS/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":252812637,"owners_count":21808175,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["ddos","ddos-attack-tools","ddos-attacks","ddos-tool","hacking","linux","termux","windows"],"created_at":"2025-05-07T04:27:41.522Z","updated_at":"2025-05-07T04:27:42.178Z","avatar_url":"https://github.com/Threadlinee.png","language":"Python","funding_links":["https://ko-fi.com/G2G114SBVV"],"categories":[],"sub_categories":[],"readme":"# ProxyDDoS Tool\n\nProxyDDoS is an educational tool designed for stress-testing and simulating real-world DDoS attacks using proxies. It leverages HTTP GET floods routed through SOCKS/HTTP proxies to test server resilience, load balancing, and firewall protection.\n\n\u003e ❗ **DISCLAIMER:** This tool is strictly for **educational**, **research**, and **authorized testing** purposes. Do not use this against servers you do not own or have explicit permission to test.\n\n---\n\n## 🚀 Features\n\n- 🔁 Infinite request flooding via proxy rotation\n- 🔗 HTTP GET flood using raw sockets\n- 🌐 Full proxy support (HTTP, HTTPS, SOCKS4/5)\n- 🔍 Real-time request logging\n- 🧠 Multi-threaded high-speed requests\n- 🎨 Stylish terminal UI with animated startup\n\n---\n\n## 📸 Screenshot\n\n![image](https://github.com/user-attachments/assets/719d424c-90ff-4314-a467-4face1397da3)\n\n![image](https://github.com/user-attachments/assets/8814bc11-a10f-4143-973f-341825a2782b)\n\n\n---\n\n## 🧠 How It Works\n\nThe tool establishes a `CONNECT` tunnel via each proxy to the target host, then sends repeated `GET` requests through that tunnel. This simulates legitimate web traffic, bypassing some weak DDoS protections.\n\n---\n\n## 📦 Requirements\n\n- Python 3.8+\n- `pystyle` (for UI effects)\n\n### Install dependencies:\n\npip install pystyle\n\n#⚙️ Usage\nClone the repo:\n\ngit clone https://github.com/Threadlinee/Proxy-DDoS.git\ncd Proxy-DDoS\nAdd your proxy list to a file named proxys.txt:\n\n192.168.1.1:8080\n51.91.123.7:3128\n203.0.113.5:8080\nRun the script:\n\npython ProxyDDoS.py\nInput the target URL (example: http://example.com)\n\n# ℹ️ The attack will run infinitely until you stop the script manually (Ctrl+C).\n\n# 🛡️ Legal \u0026 Ethical Use\nThis software is created for:\n\nPenetration testing labs\n\nLoad testing under permission\n\nCybersecurity research\n\nAcademic purposes\n\nDo not use it for:\n\nAttacking government, financial, or third-party services\n\nAny illegal or unauthorized testing\n\n# 📄 License\nThis project is licensed under the MIT License. See the LICENSE file for details.\n\n# 💬 Credits\nMade by Threadlinee\n\nStyled with pystyle\n\nEducational use only. Stay ethical.\n\n# ☕ Support\nIf you find this tool useful, drop a ⭐ or fork it. Contributions and proxy improvements are welcome.\n\n[![Buy Me a Coffee](https://ko-fi.com/img/githubbutton_sm.svg)](https://ko-fi.com/G2G114SBVV)\n","project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fthreadlinee%2Fproxy-ddos","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fthreadlinee%2Fproxy-ddos","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fthreadlinee%2Fproxy-ddos/lists"}