https://github.com/5olitude/gdos
Denial Of Service attack in GO using TOR
https://github.com/5olitude/gdos
ddos go golang hacking http-server programming proxy tor
Last synced: 4 months ago
JSON representation
Denial Of Service attack in GO using TOR
- Host: GitHub
- URL: https://github.com/5olitude/gdos
- Owner: 5olitude
- License: apache-2.0
- Created: 2021-04-01T05:48:04.000Z (almost 5 years ago)
- Default Branch: main
- Last Pushed: 2021-04-01T07:01:43.000Z (almost 5 years ago)
- Last Synced: 2025-06-16T05:45:37.346Z (7 months ago)
- Topics: ddos, go, golang, hacking, http-server, programming, proxy, tor
- Language: Go
- Homepage:
- Size: 28.3 KB
- Stars: 7
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# GDDOS
Denial Of Service attack in GO using TOR
* EDUCATIONAL PURPOSE ONLY
* CODE DESCRIPTION
* ddos.go
--Its the modification Konstantin8105/DDoS attack using tor
* simpleddos.go
--Minimal code of line ddos attack not banging into a server at once
* simpletorddos.go
--Minimal code using tor connection
* testtor.go
--Simple script to check the tor connectivity
*********************************************************************************************
* ddos.go explanation
Concurrency is not parallelism
********************************
In this code section we are defining the workers
for i := 0; i < d.amountWorkers; i++ {
go func() {
}
- Upto a certain limit the no of workers decides the code result .Incresaing the no of workers may help but there is not point in increasing beyond a limit
- This same concept is applicable for time.Sleep too
* Code Execution
go run ddos.go -workers=200 -url=http://somekejfjejf4chan.kjd:80 (no of worker in default set to 100)
If you want to dive into the code just change the time.sleep(1 *time.Second) and amount of workers just play around 😊
* Did we forget something ?
consider you play around the code into someones server the situation may be worse its a good practice to establish a tor connection
first ensure that tor is running in your system and note the port number normally tor runs in 9050 and change the code
torcon, _ := url.Parse("socks5://127.0.0.1:9050")
* simpletorddos.go
This is the implementation of minimal code ddos attack logic is same as above not messing up with channels cool 😊
* tortester.go
checks the ip addr