- Programming Language - Python 3
- Proxy List Updated
⚠️ The use of this tool to attack targets without prior mutual consent is illegal.⚠️ It is the responsibility of the end user to comply with all applicable local, state, and federal laws.- 💢 The developers assume no responsibility and are not responsible for any abuse or damage caused by this program.
DOS/DDOS attacks are the first officially recognized class of attacks and were first used in the mid-1970s.
- This type of attack directly targets applications.
- The goal is not to "shut down" the network, but the service itself, flooding it with requests.
- These tools target layer 7 of the OSI model, where Internet requests such as HTTP are established.
- By using an HTTP flood type of attack to overwhelm a target with HTTP GET and POST requests.
- An attacker can launch attack traffic that is difficult to distinguish from harmless requests from regular visitors.
- This category includes all those attacks that, for example, use malformed packets (tcp, syn and ack).
- Further down the protocol stack, these tools use protocols such as UDP to send large volumes of traffic to a designated server, such as during a UDP flood event.
- While often ineffective individually, these attacks typically take the form of DDoS attacks where the effect is enhanced by additional attacking machines.
- git clone https://github.com/xPloits3c/AnonSecIta-DDoS.git
- cd AnonSecIta-DDoS
- python3 anonsecita-ddos.py