Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/marx-wrld/ddos-scripts
Repo containing penetration testing DDOS scripts.
https://github.com/marx-wrld/ddos-scripts
javascript perl5 python3
Last synced: about 1 month ago
JSON representation
Repo containing penetration testing DDOS scripts.
- Host: GitHub
- URL: https://github.com/marx-wrld/ddos-scripts
- Owner: Marx-wrld
- License: cc0-1.0
- Created: 2023-09-30T16:24:53.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2023-10-03T10:43:03.000Z (about 1 year ago)
- Last Synced: 2024-10-12T11:24:04.092Z (about 1 month ago)
- Topics: javascript, perl5, python3
- Language: Python
- Homepage:
- Size: 3.68 MB
- Stars: 2
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# DDOS-Scripts
Repo containing penetration testing DDOS scripts.In implementing a DDOS script we need to send requests to a host on a specific port over and over again. This can be done with sockets. To speed the process up and make it more effective, we will use multi-threading as well.
We need the target’s IP address, the port we want to attack, and the fake IP address that we want to use. A fake IP - address doesn't necessarily make you anonymous.
A DDoS is never performed alone but with the help of botnets. In a botnet, one hacker infects many computers and servers of ordinary people, in order to use them as zombies. He uses them for a collective attack on a server. Instead of one DDOS script, he can now run thousands of them. Sooner or later the server will be overwhelmed with the amount of requests so that it is not even able to respond to an ordinary user. For smaller and weaker servers, sometimes one attacker is enough to get it down. However, usually, such an attack can be counteracted by blocking the IP addresses of the attackers.
### Clone the Repo
- To run, do:- Example
```
python script.py
```