Skip to content

CPScript/DDoS-ToolKit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

52 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Denial-of-service ToolKit

scroll down to learn more...

32791

🎁 HOW 2 USE:

  • Windows:

    • Download Python 3.8 from here
    • Launch installer, click add python to PATH
    • Download Impulse
    • Open cmd or powershell in Impulse directory
    • Run this command: pip install -r requirements.txt
    • And this: python impulse.py --help
  • Linux:

    • sudo apt update
    • sudo apt install python3 python3-pip git -y
    • git clone https://github.com/CPScript/ToolKit
    • cd Impulse/
    • pip3 install -r requirements.txt
    • python3 impulse.py --help
  • Termux:

    • pkg update
    • pkg install python3 python3-pip git -y
    • git clone https://github.com/CPScript/ToolKit
    • cd Impulse/
    • pip3 install -r requirements.txt
    • python3 impulse.py --help

--------- other languages ----------

SPANISH/español

  • Cómo utilizar

  • Abra este proyecto en codespace.

  • Luego paiste lo siguiente en la terminal

    • sudo apt update
    • sudo apt install python3 python3-pip git -y
    • git clone https://github.com/CPScript/ToolKit
    • cd Impulse/
    • pip3 install -r requirements.txt
    • python3 impulse.py --help

Chinese/中国人

  • 如何运行

  • 请在 Codespace 上打开此代码

  • 接下来将此代码复制并粘贴到终端中

    • sudo apt update
    • sudo apt install python3 python3-pip git -y
    • git clone https://github.com/CPScript/ToolKit
    • cd Impulse/
    • pip3 install -r requirements.txt
    • python3 impulse.py --help

Hindi/हिन्दी

  • कैसे दौड़ें

  • कृपया इस कोड को कोडस्पेस में चलाएं

  • इसे कॉपी करके टर्मिनल में पेस्ट करें

    • sudo apt update
    • sudo apt install python3 python3-pip git -y
    • git clone https://github.com/CPScript/ToolKit
    • cd Impulse/
    • pip3 install -r requirements.txt
    • python3 impulse.py --help

Example

python3 impulse.py --method --time --threads --target

What is a ddos attack?

Well first of all as you probibly know its a WIFI spoofer or a Internet booter... well YES thats right but how does it work?

Most DDoS attacks are done with botnets – groups of computers all acting together. These computers will all attempt to access a website simultaneously, overwhelming the server and bringing it down.

How do they get these botnets? By hijacking other machines. Often, a hacker will use malware or take advantage of an unpatched vulnerability on someone else’s server to gain access to it via Command and Control (C2) software. By leveraging these exploits, hackers are able to amass large numbers of computers in a relatively cheap and easy way, which they can then deploy for their own nefarious purposes.

Once they have control over enough machines, the hackers can then issue a command to the entire botnet, which then attempts to access the target server. When too many computers are trying to access a server all at once, service outages are common. The end result is an interruption in service and lost productivity.

This can be anything from a childish prank to revenge against a business. And while it sounds harmless at first, it’s important to know that the average cost of a DDoS attack to even small business operations can be as much as $120,000 – enough to bring many small businesses to their knees. Large corporations can lose millions.

Stachledraht_DDos_Attack svg

📡 Methods:

Method Target Description
SMS PHONE Sends a massive amount of SMS messages and calls to a single target
EMAIL EMAIL Sends a massive amount of Email messages to a target
NTP IP:PORT NTP amplification is a type of Distributed Denial of Service (DDoS) attack in which the attacker exploits publically-accessible Network Time Protocol (NTP) servers to overwhelm the targeted with User Datagram Protocol (UDP) traffic.
SYN IP:PORT A SYN flood (half-open attack) is a type of denial-of-service (DDoS) attack which aims to make a server unavailable to legitimate traffic by consuming all available server resources.
UDP IP:PORT A UDP flood is a type of denial-of-service attack in which a large number of User Datagram Protocol (UDP) packets are sent to a targeted server with the aim of overwhelming that device’s ability to process and respond. The firewall protecting the targeted server can also become exhausted as a result of UDP flooding, resulting in a denial-of-service to legitimate traffic.
POD (Ping of Death) IP Ping of Death (a.k.a. PoD) is a type of Denial of Service (DoS) attack in which an attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command.
ICMP IP:PORT Ping flood, also known as ICMP flood, is a common Denial of Service (DoS) attack in which an attacker takes down a victim's computer by overwhelming it with ICMP echo requests, also known as pings.
HTTP URL HTTP Flood is a type of Distributed Denial of Service (DDoS) attack in which the attacker manipulates HTTP and POST unwanted requests in order to attack a web server or application. These attacks often use interconnected computers that have been taken over with the aid of malware such as Trojan Horses.
Slowloris IP:PORT Slowloris is a denial-of-service attack program which allows an attacker to overwhelm a targeted server by opening and maintaining many simultaneous HTTP connections between the attacker and the target.
Memcached IP:PORT A memcached distributed denial-of-service (DDoS) attack is a type of cyber attack in which an attacker attempts to overload a targeted victim with internet traffic. The attacker spoofs requests to a vulnerable UDP memcached* server, which then floods a targeted victim with internet traffic, potentially overwhelming the victim’s resources. While the target’s internet infrastructure is overloaded, new requests cannot be processed and regular traffic is unable to access the internet resource, resulting in denial-of-service.

images of tool

Screenshot 2022-12-08 11 11 41 AM

Screenshot 2022-12-08 11 11 25 AM

Releases

No releases published

Packages

No packages published

Languages