https://github.com/nomadsdev/proleak-ddos-mirai
Pro Leak DDOS Mirai is a Python toolkit for simulating various DoS attacks, inspired by Mirai. It includes scripts for ACK Flood, SYN Flood, GRE IP Flood, and UDP Flood. This project
https://github.com/nomadsdev/proleak-ddos-mirai
attack-simulation cybersecurity-education denial-of-service distributed-denial-of-service network-protocols network-security packet-crafting proeleak-ddos proleak proleak-ddos-mirai python
Last synced: 8 months ago
JSON representation
Pro Leak DDOS Mirai is a Python toolkit for simulating various DoS attacks, inspired by Mirai. It includes scripts for ACK Flood, SYN Flood, GRE IP Flood, and UDP Flood. This project
- Host: GitHub
- URL: https://github.com/nomadsdev/proleak-ddos-mirai
- Owner: nomadsdev
- Created: 2024-09-02T15:20:25.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2024-09-07T06:03:23.000Z (about 1 year ago)
- Last Synced: 2025-01-02T04:28:53.644Z (9 months ago)
- Topics: attack-simulation, cybersecurity-education, denial-of-service, distributed-denial-of-service, network-protocols, network-security, packet-crafting, proeleak-ddos, proleak, proleak-ddos-mirai, python
- Language: Python
- Homepage:
- Size: 36.1 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Pro Leak DDOS Mirai
Pro Leak DDOS Mirai is a collection of Python scripts inspired by the Mirai botnet, designed for educational purposes to demonstrate various types of Denial of Service (DoS) attacks. These scripts emulate different techniques used in large-scale botnets by sending floods of packets to a target IP to disrupt and overload services.
## Disclaimer
**This project is for educational purposes only.** Unauthorized use of these scripts against systems without permission is illegal and unethical. The author is not responsible for any misuse or damage caused by the use of this code.
## Features
- **Raw UDP Flood**: Floods the target with UDP packets using raw sockets to bypass certain network defenses.
- **SYN Flood**: Sends TCP SYN packets to initiate fake connections, overwhelming the target's resources.
- **ACK Flood**: Floods the target with TCP packets with the ACK flag set, which can bypass certain firewalls.
- **GRE IP Flood**: Sends GRE-encapsulated IP packets with random UDP payloads, targeting multiple IPs.
- **Configurable Attack Script**: Uses `all.py` with a configuration file (`attack_config.ini`) to easily manage and launch multiple attacks simultaneously.## Installation
1. Clone the repository:
```bash
git clone https://github.com/nomadsdev/proleak-ddos-mirai.git
cd proleak-ddos-mirai
```2. Install the required dependencies:
```bash
pip install -r requirements.txt
```3. Some scripts may require elevated privileges to run (e.g., using `sudo` on Linux).
## Usage
### 1. Raw UDP Flood
The `raw_udp_flood` function sends UDP packets using raw sockets to the specified target.
### 2. SYN Flood
The `syn_flood` function sends TCP SYN packets to a specified target, aiming to exhaust the target's ability to manage incoming connections.
### 3. ACK Flood
The `ack_flood` function sends TCP packets with the ACK flag set, which may pass through firewalls that only inspect connection initiation (SYN packets).
### 4. GRE IP Flood
The `send_gre_ip_packets` function sends GRE-encapsulated IP packets to multiple target IPs, with random payloads to obscure the attack signature.
### 5. Configurable Attack with `all.py`
The `all.py` script allows you to configure and execute multiple types of attacks simultaneously using a configuration file (`attack_config.ini`).
#### Configuration
Create or edit the `attack_config.ini` file to specify the target details and which attacks to run. Below is an example configuration:
```ini
[Target]
ip = 192.168.1.1
port = 80[Attacks]
raw_udp_flood = True
syn_flood = False
ack_flood = True
send_gre_ip_packets = False
```- **Target Section**: Specify the target IP and port.
- **Attacks Section**: Enable or disable specific attack methods by setting their value to `True` or `False`.#### Running the Configurable Attack Script
```bash
python3 all.py
```This will execute the enabled attacks from the configuration file against the specified target.
## Code Overview
- **raw_udp_flood**: Implements a UDP flood attack using raw sockets.
- **syn_flood**: Executes a SYN flood attack to overwhelm TCP connections.
- **ack_flood**: Performs an ACK flood attack, typically bypassing basic firewall defenses.
- **send_gre_ip_packets**: Launches a GRE IP flood with encapsulated UDP payloads to multiple targets.
- **all.py**: Manages multiple attacks through a configuration file (`attack_config.ini`).## Contributing
Contributions are welcome! If you have suggestions, improvements, or want to report issues, please submit a pull request or open an issue on the repository.