Skip to content

Latest commit

 

History

History
28 lines (23 loc) · 2.08 KB

File metadata and controls

28 lines (23 loc) · 2.08 KB

Description

Tool fully developed by me. This tool allows you to carry out denial of service attacks with a wide range of methods. There are many methods of spoofing and amplification (like DNS, NTP amplification). It's a tool with a cool interface with colors and easy to use. This tool is developed with the Scapy module. I am therefore in no way responsible for your actions, this tool is for educational purposes and for the safety test on an infrastructure that belongs to you.

installation

  • You need to git clone the repository: git clone https://github.com/SwordLoveDev/DenialPacketTool.git
  • then run the requirement.sh file to install the dependencies (Scapy Module): ./requirements.sh
  • Then use python3 for the used: python3 DenialPacketTool.py

Methods

  • UDP Flood with spoofed request (We can specify a specific source, or with wordlist, or random source)
  • SYN Flood with spoofed request (We can specify a specific source, or with wordlist, or random source)
  • ICMP Flood with spoofed request (We can specify a specific source, or with wordlist, or random source)
  • Smurf Attack (ICMP spoof to broadcast address)
  • Ping of Death with spoofed request (We can specify a specific source, or with wordlist, or random source)
  • DNS Amplification (We can use a specific DNS resolver, or your wordlist, or a commun list in the tool)
  • NTP Amplification (We can use a specific NTP server, or your wordlist, or a commun list in the tool)
  • SNMP Amplification (Soon ...)

Exemple and proof

  • UDP flood with spoofed random source request on 192.168.1.11 :

- SYN flood with spoofed 1.1.1.1 source request on 192.168.1.11 :

- DNS amplification :