Skip to content

Hyperclaw79/HULK-v3

Repository files navigation

Hulk_Banner

Python Version License Build and Package Codacy branch grade

⚠️ Disclaimer

Hulk is meant for educational and research purposes only.
Any malicious usage of this tool is prohibited.
The authors must not to be held responsible for any consequences from the usage of this tool.

Introducing HULK-v3 🤖

ℹ️ Hulk is a Distributed Denial of Service tool that can put heavy load on HTTPS servers, in order to bring them to their knees, by exhausting the resource pool.

Check out Hulk in Action

GUI 🖥️ Hulk_demo

Server 💻 Hulk_server Client/Bot 👾 Hulk_client

🟢 To get started, expand the sections below to read about them.

Changelog 📃

You can refer the Changelog here.

Usage 📖

  1. Run pip install -r requirements_(linux/win).txt before starting this script.

    Ex: On Windows: pip install -r requirements_win.txt Ex: On Linux: pip install -r requirements_linux.txt

  2. Launch the hulk_launcher.py server with the target website as arg.

    Ex: python hulk_launcher.py server https://testdummysite.com

    Append --persistent False to kill the botnet after a succesfull DDoS.

    Append --gui if you are running the GUI in parallel.

  3. Launch the hulk_launcher.py client to spawn multiple processes of hulk - one per CPU Core.

    Ex: python hulk_launcher.py client [localhost]

    If the server is running remotely, replace localhost with the server's IP.

  4. To run the GUI, you need to:

    • Install NodeJS, change to gui directory and use npm install.
    • Launch the GUI with npm run dev.
  5. Sit back and sip your coffee while the carnage unleashes! 😈

(P.S. Do not run the binaries (except hulk_gui) directly, use them from command line like shown above without using python.)

Syntax Help 📜

Server 💻

usage: hulk_launcher.py server [-h] [-p PORT] [-m MAX_MISSILES] [--persistent] [--gui] target

The Hulk Server Launcher

positional arguments:
target                the target url.

options:
-h, --help            show this help message
-p PORT, --port PORT  the Port to bind the server to.
-m MAX_MISSILES, --max_missiles MAX_MISSILES
                        the maximum number of missiles to connect to.
--persistent          keep attacking even after target goes down.
--gui                 run on the GUI mode.

Client 👾

usage: hulk_launcher.py client [-h] [-r ROOT_IP] [-p ROOT_PORT] [-n NUM_PROCESSES] [-s]

The Hulk Bot Launcher

options:
-h, --help            show this help message
-r ROOT_IP, --root_ip ROOT_IP
                        IPv4 Address where Hulk Server is running.
-p ROOT_PORT, --root_port ROOT_PORT
                        Port where Hulk Server is running.
-n NUM_PROCESSES, --num_processes NUM_PROCESSES
                        Number of Processes to launch.
-s, --stealth         Stealth mode.

Architecture ⚙️

⚠️ The intention of Hulk is to demonstrate the damage that a DDoS attack can do to a server if unprotected.
💡 Please go through the code for full details. I'm keeping it well documented and request the contributors to do so too.

Hulk consists of 2 major and 1 optional components:

  • Server
  • Client
  • [Gui]

Hulk_architecture

Client 👾

The core part of Hulk is the Hulk client aka Hulk.py.
This client\bot launches a barrage of asynchronous HTTP requests to the target server.
These incoming requests, put a burden on the target and makes it slow to respond.
With the launcher script, we can launch multiple instances of Hulk using multi-threading.
The target will be hit with so many requests that it will ultimately break into a 500 error.
Usually, the client completes 500 attacks and sends back the list of status messages.
In case of special events, the client will immediately send an Interrupt message to the server.
Example Special Events: Successful DDoS, 404 Target Not Found, etc.

Server 💻

Hulk was originally a single instanced DoS script. However, it has been modified to be run as multiple instances.
The cluster of many such instances is called a botnet. And this botnet can be controlled and monitored by the Server.
The Server and Client communicate with each other through TCP WebSockets. Based on the settings, this is usally a persistent bidirectional channel.
In case the server receives Interrupts from a client, it will send out a broadcast message to all the clients, asking them to stop the attacks.
The clients go to Standby mode and await further instructions from the server.

The server can also send information to the GUI to keep a track of the botnet.
This information is sent via Unix\Windows Named Pipes for low latency IPC.

GUI 🖥️

The GUI is a NextJS web application that is used to monitor the botnet via Named Pipes.
When run as a binary, GUI makes use of Electron which exposes the information directly to the Frontend.
When run as a Node process, a node server listens to the Named Pipe and passes on the information to a HTTP Streaming API.
Then the frontend will pick it up from the API using EventSource.

Acknowledgements 👥

Authors ✍️

Name Version
Hyperclaw79 2.0+
Barry Shteiman 1.0

Contributors 🤝

Thanks for contributing to the repo. Follow the Contribution Guide and open a PR.

Contributor Contribution
Nexuzzzz Fixed typo in the code

License 📄

HULK v3 is a Python 3 compatible Asynchronous Distributed Denial of Service Script.
Original script was created by Barry Shteiman. You can use that one if you have Python 2.

Using a GNU license cause there was no mention about any license used by Barry. Feel free to modify and share it, but leave some credits to us both and don't hold us liable.