by The Hacking Protocol // Powered by KHORA Cyberstrike
⛓️ Tactical Flooding • AI Fire Control • WAF Evasion • GenZ CLI Ops
“Where saturation becomes precision. And flooding becomes legend.” 🚀
THE BLACKOUT ENGINE is a full-scale, military-grade DDoS simulation and saturation testing platform. It combines tactical precision with a stylized GenZ interface, TLS deception, WAF evasion, adaptive fire rates, and real-time analytics. This isn't just a stress test; this is a flood engine built for the next era of cyber offense. 💥
- Download as ZIP: Get the project archive.
- Download Python: Install Python on your system.
- Add Python to Path: Ensure Python is accessible from your command line.
- Execute the following commands in your terminal:
pip install -r requirements.txt python blackoutengine.py
- Run the following commands in your terminal:
sudo apt update sudo apt install iptables macchanger python3 git git clone [https://github.com/yourname/blackout-engine](https://github.com/yourname/blackout-engine) cd blackout-engine pip install -r requirements.txt python blackoutengine.py
- 🔫 Enter primary target domain or IP: Specify your target.
- ➕ Add more targets? Option to include multiple targets.
- ⏱️ Set attack duration: Define how long the attack should run.
- 🔁 Set threads: Configure the number of concurrent threads.
- 💥 Firepower rate per thread: Adjust the intensity per thread.
- 📡 Choose method: GET / POST / HEAD: Select your HTTP method.
- 🔬 Enable payload expansions? Option to use expanded payloads.
- 📡 Enable HTTP/2 spoofing? Activate HTTP/2 protocol spoofing.
- 🧠 Enable auto-fire tuning? Allow the engine to dynamically adjust fire rates.
- 🛡️ Run WAF fingerprint scan? Perform a Web Application Firewall detection.
- 👻 Anonymize host before launch? Mask your origin.
- 🎯 Target OS? windows / linux / generic: Specify the target's operating system for optimized attacks.
https://github.com/thehackingprotocol/Dead-Signal
While BLACKOUT attacks are running, Dead Signals allows you to monitor real-time ping and signal loss on the target.
- 📡 Dead Signals sends a ping every second.
- 📉 Detects when the server dies or recovers mid-strike.
- 🔗 Run it in a second terminal for live visual confirmation.
- ⚡ Max Saturation Engine: Fully multi-threaded with up to 250 RPS × 100+ threads for extreme performance.
- 🧠 Auto-Fire Tuning: Dynamically adjusts attack rate based on 403/429 responses.
- ☁️ WAF Bypass: Fingerprints and sidesteps common Web Application Firewalls like Cloudflare, AWS, Azure, etc.
- 🧬 TLS Fingerprint Spoofing: Randomizes JA3 and User-Agent headers to evade detection.
- 🍪 Payload Mutation Engine: Rotates cookies, headers, and referrers for persistent attacks.
- 🛡️ Anonymity Layer: Includes MAC spoofing, IP reset, and history wiping.
- 📊 Live Graph Telemetry: Provides real-time success/failure/time metrics in the terminal.
- 💣 Modular OS Flooding: Offers separate modes for Windows, Linux, and generic stack-specific attacks.
- 👁️ Interactive CLI: Features rainbow prompts, figlet headers, and a stylish user interface.
- 🔥 Self-deletion Mode: Destroys traces after execution for stealth operations.
blackoutengine.py
— Main launcher script.visuals.py
— Handles banner, CLI styling, and colored prompts.target_rotator.py
— Manages multi-target loading.anonymizer.py
— System cloak for Linux environments.auto_waf.py
— CDN/WAF detection capabilities.expansion_engine.py
— Generates payload bombs.tls_fingerprint.py
— Manages randomized TLS headers.graph_report.py
— Provides terminal live metrics.linuxflood.py
/windowsflood.py
— Contains stack-specific attack logic.
This project is provided for educational, academic, and red team simulation purposes only. You may use this tool only in environments you control or have explicit permission to test.
- ❌ No illegal use.
- ❌ No commercial sale.
- ❌ No redistribution or reskinning.