https://github.com/prvvv/smokescreen
Flood a WAF with thousands of fake traffic and security logs
https://github.com/prvvv/smokescreen
cloudflare cloudflare-bypass ddos openproxy proxy python3 smokescreen traffic-monitoring
Last synced: 11 months ago
JSON representation
Flood a WAF with thousands of fake traffic and security logs
- Host: GitHub
- URL: https://github.com/prvvv/smokescreen
- Owner: Prvvv
- Created: 2023-09-05T18:32:22.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2025-02-09T17:16:55.000Z (11 months ago)
- Last Synced: 2025-02-09T18:26:21.887Z (11 months ago)
- Topics: cloudflare, cloudflare-bypass, ddos, openproxy, proxy, python3, smokescreen, traffic-monitoring
- Language: Python
- Homepage:
- Size: 24.4 KB
- Stars: 2
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# smokescreen
> This tool is made for ethical network testing & identification, designed to test the sensitivity and durability of any network application firewall, for further information or queries contact me at: ***prv@anche.no***

## How it works
This tool uses many frequently updated lists of open source proxies and user agent spoofing methods to flood a victims server logs or WAF with deceiving or overwhelming false traffic logs and events ***NOT*** to DDOS.
Each flagged request comes with its own unique and anonymous IP address and randomly generated user agent, allowing an attacker to ***"blend in amongs the noise"*** and obfuscate themself in the fake traffic created.

The requests sent out are purposely designed to cause red flags and be seen within a victims firewall, in order to mask and/or obfuscate potentially other malicious traffic an attacker may send, it does this by sending the HTTP/1.1 requests within irregular methods or traffic spikes, not enough to cause a DDOS- but enough to hide other activities that the firewall may be flagging at the time or current "***under the radar***" DDOS attacks.

## Purpose
This tool is useful for firewall testing and obfuscation/bypass purposes- along with the use to hide current payloads or attacks sent to a web server.
It can essentialy "***Jam***" or create noise in almost any web-facing HTTP based firewalls and words more than well against ***Cloudflare's*** WAF and "***Event***" catcher.

## Impact/Disclaimer
Although this tool is capable of sending thousands of false requests a minute from individually unique IP addresses and user agents, it is not designed for the purposes of performing a "***Denial Of Service Attack***" It still may coincidentally perform one, so be careful.

## Install
To use this tool you must have ***python3.9+*** with ***pip3+*** or similar package installer.
With the following libaries:
Colorama - (https://pypi.org/project/colorama/)
Requests - (https://pypi.org/project/requests/)
Faker - (https://pypi.org/project/Faker/)