Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/h3xduck/tcpcannon
Offensive Linux tool for network attacks. Built from the ground with only C.
https://github.com/h3xduck/tcpcannon
Last synced: about 1 month ago
JSON representation
Offensive Linux tool for network attacks. Built from the ground with only C.
- Host: GitHub
- URL: https://github.com/h3xduck/tcpcannon
- Owner: h3xduck
- License: mit
- Created: 2021-03-31T09:47:24.000Z (almost 4 years ago)
- Default Branch: master
- Last Pushed: 2021-05-01T22:58:12.000Z (over 3 years ago)
- Last Synced: 2023-03-10T07:52:53.184Z (almost 2 years ago)
- Language: C
- Homepage:
- Size: 43 KB
- Stars: 9
- Watchers: 1
- Forks: 5
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
![GitHub release (latest by date)](https://img.shields.io/github/v/release/h3xduck/RawTCP_Lib)
![Maintainability](https://img.shields.io/static/v1?label=maintainability&message=B&color=green)
![GitHub code size in bytes](https://img.shields.io/github/languages/code-size/h3xduck/RawTCP_Lib)
![GitHub last commit](https://img.shields.io/github/last-commit/h3xduck/RawTCP_Lib)# TCPcannon
TCPcannon is a Linux tool for launching network attacks. It is built on top of [RawTCP](https://github.com/h3xduck/RawTCP_Lib.git), my library to manage network packets and raw sockets.
The purpose of this development is to reproduce real network attacks using only the C language and with minimal dependencies.
Currently it only incorporates a SYN flooding module with and without spoofing, but more attacking modules and modes will come in later updates.
The name is a reference to the [LOIC](https://en.wikipedia.org/wiki/Low_Orbit_Ion_Cannon).
## Installation
You can download the binary file for TCPcannon [here](https://github.com/h3xduck/TCPcannon/releases/tag/v0.1.0).## Usage
Run ./TCPcannon -h to get tool usage:
## Examples
Note: As stated in the library [RawTCP](https://github.com/h3xduck/RawTCP_Lib.git), raw sockets require root proviliges to be used, so you will need them before running any of these examples.### SYN flood attack against 192.168.1.1 at port 8080
```sh
./TCPcannon -S -m direct -d 192.168.1.1:8000
```### SYN flooding against 192.168.1.1 at port 8080 randomly with spoofing
Source IP changes randomly between each sent packet.
```sh
./TCPcannon -S -m spoof -d 192.168.1.1:8000
```### Benchmark for packets/minute sent with SYN flooding spoofing mode
You will get the number of packets sent and packets/minute.
```sh
./TCPcannon -S -m benchmark -d 192.168.1.1:8000
```## Issues?
Whether it is a bug, question or suggestion, please [open a ticket](https://github.com/h3xduck/TCPcannon/issues/new) and I will have a look at it as fast as I possibly can.
## LICENSE
This software is licensed under the MIT license. See [LICENSE](https://github.com/h3xduck/TCPcannon/blob/master/LICENSE)