sansjtw’s blog

LOADING

Loading is too slow. Please turn on the cache browser. By default, it is turned on.

sansjtw’s blog

hoho_ddos2

2024/6/1

Features

  • Multiple Attack Types: Supports various common DDOS attack types, including flood attacks, server attacks, slow attacks, protocol-specific attacks, etc.
  • Beyond the First Generation: Compared to hoho_ddos, it has richer functionality and is more powerful.
  • Simple and Easy to Use: The program is designed to be simple, allowing users to quickly conduct tests by selecting attack types and setting relevant parameters as prompted.

Installation of Required Pip Libraries:

colorama, scapy, requests, sippy libraries

pip install colorama
pip install scapy
pip install requests
pip install sippy

Linux

  1. Download the Code: Clone this repository to your local machine:

    git clone https://github.com/sansjtw/hoho_ddos2.git
    
  2. Run the Program: Navigate to the project directory and execute the main program:

    cd hoho_ddos2.0
    python main.py
    

Windows

  1. Download the Code: Clone this repository to your local machine:

    git clone https://github.com/sansjtw/hoho_ddos2.git
    
  2. Download Python 3.11.8: Install Python 3.11.8 from the official website python3.11.8.

  3. Run the Program: After installing Python, navigate to the project directory, and double-click main.py to run the program.

Supported Languages

  • English main.py
  • Chinese main_cn.py

Categories of Attack Programs

Flood Attacks

  1. ACK_Flood.py
  2. Connection_Flood.py
  3. DNS_Query_Flood.py
  4. HTTP_Flood.py
  5. ICMP_Flood.py
  6. IP_Flood.py
  7. Ntp_Request_Flood.py
  8. SYN_Flood.py
  9. UDP_Reflection_Flood.py

Slow Attacks

  1. Slow_Read_attack.py
  2. Slowloris_attack.py

Protocol-Specific Attacks

  1. Minecraft_Protocol_Attacks.py
  2. SSDP_attack.py

Server Attacks

  1. Cache_Server_Attack.py
  2. Minecraft_server_DDoS.py
  3. translation_server_ddos.py

Other Types of Attacks

  1. DNS_Amplification.py
  2. RUDY_Attack.py
  3. Smurf_attack.py
  4. Sip_Register_Flood.py
  5. Sip_Invite_Flood.py
  6. Sip_lnvite_Flood.py

Instructions for Use

  • Upon running the program, the main menu will be displayed, prompting the user to select the type of attack to simulate.
  • Choose the appropriate attack type as prompted and set relevant parameters as needed, then the program will automatically start simulating the attack.
  • During the attack, the program will display the progress and related information of the attack, and the user can terminate the attack at any time.

Notes

  • Do not use this program for illegal purposes. It is only for legitimate security testing and educational purposes.
  • The use of this program may cause disruption or downtime to the target system, so use it with caution.
  • This program does not provide any form of guarantee or support, and users use it at their own risk.

License

This project is licensed under the MIT License. See the LICENSE file for details.

Author Information

Read the full text

Using Metasploit for Backdoor Penetration Testing

2024/5/25

Metasploit Penetration Testing Demo

Read the full text

hoho-ddos

2024/5/25

Hoho-ddos is a DDOD attack program with multiple attack methods. It can directly run out of traffic or paralyze the server. Supported attacks include HTTP Flood, IP Flood, ICMP Flood, DNS Query Flood, etc.

Read the full text

Hello World

2023/5/25

Welcome here, this will be my first article, and it will be updated continuously in the future. Welcome everyone! !

Read the full text
1