https://github.com/1birdo/goflood
A FullC2 Framework TUI + Web UI That Focuses On Network Stressing
https://github.com/1birdo/goflood
api botnet c2 client cnc dashboard ddos ddos-attacks dos go golang malware malware-analysis malware-development mirai server stress stress-test stress-testing ternimal
Last synced: 6 days ago
JSON representation
A FullC2 Framework TUI + Web UI That Focuses On Network Stressing
- Host: GitHub
- URL: https://github.com/1birdo/goflood
- Owner: 1Birdo
- License: mit
- Created: 2025-05-27T23:29:00.000Z (11 months ago)
- Default Branch: main
- Last Pushed: 2026-03-27T00:17:21.000Z (13 days ago)
- Last Synced: 2026-03-27T12:28:55.781Z (12 days ago)
- Topics: api, botnet, c2, client, cnc, dashboard, ddos, ddos-attacks, dos, go, golang, malware, malware-analysis, malware-development, mirai, server, stress, stress-test, stress-testing, ternimal
- Language: HTML
- Homepage: https://birdo.uk
- Size: 28.5 MB
- Stars: 14
- Watchers: 1
- Forks: 4
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- License: LICENSE
- Code of conduct: CODE_OF_CONDUCT.md
- Security: SECURITY.md
Awesome Lists containing this project
README
# GoFlood
(Deprecated Project)
Network stress testing tool written in go. distributed architecture with a controller, lightweight agents, and an optional relay proxy.
been working on this for a lil bit, figured i'd clean it up and release it properly.
## whats in here
```
server/ controller - web dashboard, cli, manages all the agents
agent/ connects back to the server, runs the actual tasks
relay/ tls proxy that sits in front (optional, has its own dashboard)
scripts/ cert generation + build scripts
```
## setup
easiest way:
```bash
chmod +x scripts/setup.sh
./scripts/setup.sh
```
or manually:
1. gen your TLS certs (the setup script does this for you)
2. `cp server/config.example.json server/config.json` and edit it
3. build + run:
```bash
cd server && go build -o goflood . && ./goflood
cd agent && go build -o agent . && ./agent
cd relay && go build -o relay . && ./relay # optional
```
## server
- web ui on 443 (https), cli on 7001, agents connect on 7002
- role system: Owner > Admin > Pro > Basic
- rate limiting per-ip and per-user
- session management, audit log, the usual
## agent
- auto-reconnect with backoff
- challenge-response auth (hmac)
- reports system info (cpu, ram, arch)
- cross-compiled to linux/windows/darwin (arm, mips, x86, x64)
## relay
- tls 1.3 proxy, sits between agents and server
- has its own web dashboard with live traffic graphs
- jwt auth, csrf, websocket stats
## building agents for multiple platforms
```bash
cd agent
chmod +x ../scripts/build_agent.sh
../scripts/build_agent.sh
```
builds for linux (x86, arm, mips), windows, and macos. uses upx if available.
## requirements
- go 1.21+
- openssl (cert gen)
- linux/macos recommended, works on windows too
## license
MIT