Skip to content

petangZi/dripcorn

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

7 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ¦„ DripCorn V2 - Professional Security Testing Framework

Version License Node Python

Python-Node.js Fusion Framework with 30+ attack vectors, 15+ bypass techniques, and professional security testing capabilities.


⚠️ LEGAL DISCLAIMER

READ CAREFULLY BEFORE USE

This framework is designed EXCLUSIVELY for:

  • βœ… Legal Penetration Testing (with written authorization)
  • βœ… Security Research (in authorized environments)
  • βœ… Authorized Stress Testing (own infrastructure only)

STRICTLY PROHIBITED:

  • ❌ Unauthorized system access
  • ❌ Attacks without explicit permission
  • ❌ Any illegal activities
  • ❌ Script kiddie behavior

YOU ARE SOLELY RESPONSIBLE for your actions. Unauthorized use is illegal and punishable by law under:

  • Computer Fraud and Abuse Act (USA)
  • Computer Misuse Act (UK)
  • EU Cybersecurity Directives
  • Your local jurisdiction laws

πŸš€ Quick Start

Installation

# Clone repository
git clone https://github.com/petangZi/dripcorn.git
cd dripcorn

# Install dependencies
npm run setup

# Or manual installation:
npm install
pip install -r requirements.txt --break-system-packages

First Run

# Start framework
npm start

# Or directly
node index.js

2FA Setup

On first run, you'll be prompted to:

  1. Scan QR code with authenticator app
  2. Enter 6-digit verification code
  3. Save your secret key securely

🎯 Features

30+ Attack Vectors

Layer 7 (HTTP/HTTPS)

  • 🌊 HTTP Flood (GET/POST/PUT)
  • 🐌 Slowloris (Connection Exhaustion)
  • 🐒 Slow POST (R.U.D.Y)
  • πŸ“– Slow Read
  • πŸ’₯ Cache Buster
  • πŸͺ Cookie Bomb
  • πŸ”„ Redirect Loop

Layer 4 (TCP/UDP)

  • 🎯 SYN Flood (requires root)
  • πŸ“‘ UDP Flood
  • βœ… ACK Flood
  • πŸ›‘ RST Flood
  • πŸ“ ICMP Flood

Modern Protocols

  • ⚑ HTTP/2 Rapid Reset (CVE-2023-44487)
  • πŸ”Œ WebSocket Flood
  • πŸ“‘ Server-Sent Events

Application DoS

  • πŸ’£ XML Bomb (Billion Laughs)
  • πŸ’₯ JSON Bomb
  • #️⃣ Hash Collision
  • πŸ” ReDoS (Regex DoS)
  • πŸ”₯ CPU Exhaustion

SSL/TLS Attacks

  • πŸ” SSL Renegotiation
  • πŸ”’ SSL Exhaustion
  • πŸ›‘οΈ TLS Flood

15+ Bypass Techniques

  • πŸ”„ IP Rotation
  • πŸ”— Proxy Chain (HTTP/SOCKS5)
  • 🎭 User-Agent Rotation
  • πŸ“ Header Randomization
  • πŸ” TLS Fingerprint Spoofing
  • ⏰ Timing Randomization
  • 🌐 Browser Emulation
  • πŸͺ Cookie Management
  • ☁️ CloudFlare Bypass
  • πŸ›‘οΈ WAF Evasion

πŸ“š Usage Examples

Basic HTTP Flood

# Launch framework
npm start

# Select: Attack Vectors > Layer 7 > HTTP Flood
# Enter target: http://localhost:3000
# Configure: duration=30, rps=100
# Confirm disclaimers and launch

SYN Flood (Advanced)

# Requires sudo privileges
sudo npm start

# Select: Attack Vectors > Layer 4 > SYN Flood
# Enter target: 192.168.1.100
# Port: 80
# Packets/sec: 1000
# Duration: 30

Proxy Rotation Test

npm start

# Select: Bypass Techniques > Proxy Rotation
# Framework will test all proxies
# Shows working vs failed proxies

πŸ›‘οΈ Security Features

Triple Disclaimer System

  1. Startup Disclaimer - Legal terms before framework access
  2. Pre-Attack Disclaimer - Authorization confirmation before each attack
  3. Audit Logging - All actions logged with timestamps

2FA Authentication

  • TOTP-based two-factor authentication
  • Required before framework access
  • QR code setup with authenticator apps
  • Encrypted secret storage

Comprehensive Logging

All actions logged to: ~/.dripcorn/logs/audit.log

Log includes:

  • Timestamp
  • User information
  • System details
  • Attack parameters
  • Target information

πŸ”§ Configuration

Environment Variables

Create .env file:

# Proxy Configuration
HTTP_PROXY=http://proxy.example.com:8080
SOCKS_PROXY=socks5://proxy.example.com:1080

# 2Captcha API (for CAPTCHA bypass)
CAPTCHA_API_KEY=your_api_key_here

# Monitoring
MONITOR_PORT=8080

Custom Proxy List

Create proxies.txt:

http://proxy1.example.com:8080
http://proxy2.example.com:8080
socks5://proxy3.example.com:1080

πŸ“Š Statistics & Reporting

View attack statistics:

  • Total attacks launched
  • Success/failure rates
  • Attack duration and metrics
  • Target information
  • Timestamp logs

Access via: Main Menu > Statistics


πŸ› Troubleshooting

Python Not Found

# Install Python 3.9+
# macOS
brew install python3

# Ubuntu/Debian
sudo apt install python3 python3-pip

# Windows
# Download from python.org

Scapy Permission Denied

# SYN Flood requires root
sudo python3 attacks/syn_flood.py <args>

# Or run framework with sudo
sudo npm start

Dependencies Issues

# Clean install
rm -rf node_modules package-lock.json
npm install

# Python deps
pip install -r requirements.txt --break-system-packages

🀝 Use Cases

1. Legal Penetration Testing

Scenario: Testing client web application security

1. Obtain written authorization
2. Launch DripCorn V2
3. Test various attack vectors
4. Document vulnerabilities
5. Generate report for client

2. Security Research

Scenario: Researching new DoS mitigation techniques

1. Set up isolated lab environment
2. Deploy test infrastructure
3. Launch controlled attacks
4. Measure mitigation effectiveness
5. Publish findings

3. Authorized Stress Testing

Scenario: Testing own infrastructure resilience

1. Deploy target on own servers
2. Configure monitoring
3. Launch graduated attacks
4. Identify bottlenecks
5. Implement improvements

πŸ“– Documentation

Full documentation available in docs/ directory:

  • ATTACKS.md - Detailed attack vector documentation
  • BYPASS.md - Bypass technique guides
  • API.md - Framework API reference
  • LEGAL.md - Legal compliance guide

πŸ› οΈ Development

Project Structure

dripcorn-v2/
β”œβ”€β”€ index.js              # Main framework
β”œβ”€β”€ package.json          # Node dependencies
β”œβ”€β”€ requirements.txt      # Python dependencies
β”œβ”€β”€ attacks/
β”‚   β”œβ”€β”€ syn_flood.py     # SYN flood script
β”‚   └── dns_amp.py       # DNS amplification
β”œβ”€β”€ docs/                # Documentation
└── logs/                # Audit logs

Contributing

Contributions welcome! Please:

  1. Fork repository
  2. Create feature branch
  3. Commit changes
  4. Push to branch
  5. Open pull request

πŸ“„ License

MIT License - see LICENSE file


πŸ™ Credits

Developed by RedOps Security Lab

Special thanks to the security research community.


⚑ Support


πŸ”’ Responsible Disclosure

Found a vulnerability? Please report responsibly:

  1. Do NOT publicly disclose
  2. Email: security@redops.lab
  3. Include detailed POC
  4. Allow time for patch

We appreciate responsible security researchers.


Remember: Stay legal. Stay ethical. Stay safe. πŸ¦„βœ¨

About

a ddos framework for educational

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published