hoho_ddos2
Features
- Multiple Attack Types: Supports various common DDOS attack types, including flood attacks, server attacks, slow attacks, protocol-specific attacks, etc.
- Beyond the First Generation: Compared to hoho_ddos, it has richer functionality and is more powerful.
- Simple and Easy to Use: The program is designed to be simple, allowing users to quickly conduct tests by selecting attack types and setting relevant parameters as prompted.
Installation of Required Pip Libraries:
colorama, scapy, requests, sippy libraries
pip install colorama
pip install scapy
pip install requests
pip install sippy
Linux
Download the Code: Clone this repository to your local machine:
git clone https://github.com/sansjtw/hoho_ddos2.git
Run the Program: Navigate to the project directory and execute the main program:
cd hoho_ddos2.0 python main.py
Windows
Download the Code: Clone this repository to your local machine:
git clone https://github.com/sansjtw/hoho_ddos2.git
Download Python 3.11.8: Install Python 3.11.8 from the official website python3.11.8.
Run the Program: After installing Python, navigate to the project directory, and double-click
main.py
to run the program.
Supported Languages
- English
main.py
- Chinese
main_cn.py
Categories of Attack Programs
Flood Attacks
- ACK_Flood.py
- Connection_Flood.py
- DNS_Query_Flood.py
- HTTP_Flood.py
- ICMP_Flood.py
- IP_Flood.py
- Ntp_Request_Flood.py
- SYN_Flood.py
- UDP_Reflection_Flood.py
Slow Attacks
- Slow_Read_attack.py
- Slowloris_attack.py
Protocol-Specific Attacks
- Minecraft_Protocol_Attacks.py
- SSDP_attack.py
Server Attacks
- Cache_Server_Attack.py
- Minecraft_server_DDoS.py
- translation_server_ddos.py
Other Types of Attacks
- DNS_Amplification.py
- RUDY_Attack.py
- Smurf_attack.py
- Sip_Register_Flood.py
- Sip_Invite_Flood.py
- Sip_lnvite_Flood.py
Instructions for Use
- Upon running the program, the main menu will be displayed, prompting the user to select the type of attack to simulate.
- Choose the appropriate attack type as prompted and set relevant parameters as needed, then the program will automatically start simulating the attack.
- During the attack, the program will display the progress and related information of the attack, and the user can terminate the attack at any time.
Notes
- Do not use this program for illegal purposes. It is only for legitimate security testing and educational purposes.
- The use of this program may cause disruption or downtime to the target system, so use it with caution.
- This program does not provide any form of guarantee or support, and users use it at their own risk.
License
This project is licensed under the MIT License. See the LICENSE file for details.
Author Information
- Author: sansjtw
- Email: sansjtw@163.com
- Blog: sansjtw.xyz