All Projects → Hyperclaw79 → HULK-v3

Hyperclaw79 / HULK-v3

Licence: GPL-3.0 license
Asynchronous HTTP Botnet for Distributed Denial of Service (DDoS)

Programming Languages

python
139335 projects - #7 most used programming language
typescript
32286 projects
CSS
56736 projects

Projects that are alternatives of or similar to HULK-v3

awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (-50.66%)
Mutual labels:  ddos, ddos-attack, ddos-script
overload
📡 Overload DoS Tool (Layer 7)
Stars: ✭ 167 (+9.87%)
Mutual labels:  ddos, ddos-attack, ddos-script
Microwebsrv2
The last Micro Web Server for IoTs (MicroPython) or large servers (CPython), that supports WebSockets, routes, template engine and with really optimized architecture (mem allocations, async I/Os). Ready for ESP32, STM32 on Pyboard, Pycom's chipsets (WiPy, LoPy, ...). Robust, efficient and documented!
Stars: ✭ 295 (+94.08%)
Mutual labels:  asynchronous, https
Netty Http Client
An asynchronous http client in Java, with a clean, callback-based API, using Netty 4.x
Stars: ✭ 295 (+94.08%)
Mutual labels:  asynchronous, https
Esa Restlight
ESA Restlight is a lightweight and rest-oriented web framework.
Stars: ✭ 67 (-55.92%)
Mutual labels:  asynchronous, https
esa-httpclient
An asynchronous event-driven HTTP client based on netty.
Stars: ✭ 82 (-46.05%)
Mutual labels:  asynchronous, https
Halive
A fast http and https prober, to check which URLs are alive
Stars: ✭ 47 (-69.08%)
Mutual labels:  asynchronous, https
Raven-Storm
Raven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many connections using several exotic and classic protocols.
Stars: ✭ 235 (+54.61%)
Mutual labels:  ddos, ddos-script
dheater
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (-6.58%)
Mutual labels:  ddos, ddos-attack
Lear
Linux Engine for Asset Retrieval - speed-profiled C HTTP server
Stars: ✭ 165 (+8.55%)
Mutual labels:  asynchronous, https
Aoyama
A New version of Python3 botnet, old version: http://github.com/Leeon123/Python3-botnet
Stars: ✭ 161 (+5.92%)
Mutual labels:  ddos, ddos-attack
relaks
Asynchrounous React component
Stars: ✭ 49 (-67.76%)
Mutual labels:  asynchronous
BaaSDelphiSamples
💾 Code samples for BaaS and PaaS using Delphi
Stars: ✭ 30 (-80.26%)
Mutual labels:  https
get LibSeat
利昂图书馆预约系统自动预约&签到程序。支持包括中国人民大学、北京师范大学、济南大学、哈尔滨工业大学等在内的38所高校的图书馆系统
Stars: ✭ 39 (-74.34%)
Mutual labels:  https
one-scan
多合一网站指纹扫描器,轻松获取网站的 IP / DNS 服务商 / 子域名 / HTTPS 证书 / WHOIS / 开发框架 / WAF 等信息
Stars: ✭ 44 (-71.05%)
Mutual labels:  https
Polyel-Framework
⚡️ Voltis Core: A PHP framework based on Swoole from the ground up
Stars: ✭ 22 (-85.53%)
Mutual labels:  asynchronous
Disqord
An asynchronous Discord API wrapper for .NET.
Stars: ✭ 155 (+1.97%)
Mutual labels:  asynchronous
code-delphi-async
Code examples from Delphi Event-based and Asynchronous Programming Book
Stars: ✭ 32 (-78.95%)
Mutual labels:  asynchronous
3dub
www dev server with livereload, file watching, http2, https, self signed cert generation
Stars: ✭ 28 (-81.58%)
Mutual labels:  https
socketwrapper
Async/Sync networking library including UDP, TCP and TLS/TCP socket classes written in C++ 17.
Stars: ✭ 33 (-78.29%)
Mutual labels:  asynchronous

Hulk_Banner

Python Version License Build and Package Codacy branch grade

⚠️ Disclaimer

Hulk is meant for educational and research purposes only.
Any malicious usage of this tool is prohibited.
The authors must not to be held responsible for any consequences from the usage of this tool.

Introducing HULK-v3 🤖

ℹ️ Hulk is a Distributed Denial of Service tool that can put heavy load on HTTPS servers, in order to bring them to their knees, by exhausting the resource pool.

Check out Hulk in Action

GUI 🖥️ Hulk_demo

Server 💻 Hulk_server Client/Bot 👾 Hulk_client

🟢 To get started, expand the sections below to read about them.

Changelog 📃

You can refer the Changelog here.

Usage 📖

  1. Run pip install -r requirements_(linux/win).txt before starting this script.

    Ex: On Windows: pip install -r requirements_win.txt Ex: On Linux: pip install -r requirements_linux.txt

  2. Launch the hulk_launcher.py server with the target website as arg.

    Ex: python hulk_launcher.py server https://testdummysite.com

    Append --persistent False to kill the botnet after a succesfull DDoS.

    Append --gui if you are running the GUI in parallel.

  3. Launch the hulk_launcher.py client to spawn multiple processes of hulk - one per CPU Core.

    Ex: python hulk_launcher.py client [localhost]

    If the server is running remotely, replace localhost with the server's IP.

  4. To run the GUI, you need to:

    • Install NodeJS, change to gui directory and use npm install.
    • Launch the GUI with npm run dev.
  5. Sit back and sip your coffee while the carnage unleashes! 😈

(P.S. Do not run the binaries (except hulk_gui) directly, use them from command line like shown above without using python.)

Syntax Help 📜

Server 💻

usage: hulk_launcher.py server [-h] [-p PORT] [-m MAX_MISSILES] [--persistent] [--gui] target

The Hulk Server Launcher

positional arguments:
target                the target url.

options:
-h, --help            show this help message
-p PORT, --port PORT  the Port to bind the server to.
-m MAX_MISSILES, --max_missiles MAX_MISSILES
                        the maximum number of missiles to connect to.
--persistent          keep attacking even after target goes down.
--gui                 run on the GUI mode.

Client 👾

usage: hulk_launcher.py client [-h] [-r ROOT_IP] [-p ROOT_PORT] [-n NUM_PROCESSES] [-s]

The Hulk Bot Launcher

options:
-h, --help            show this help message
-r ROOT_IP, --root_ip ROOT_IP
                        IPv4 Address where Hulk Server is running.
-p ROOT_PORT, --root_port ROOT_PORT
                        Port where Hulk Server is running.
-n NUM_PROCESSES, --num_processes NUM_PROCESSES
                        Number of Processes to launch.
-s, --stealth         Stealth mode.

Architecture ⚙️

⚠️ The intention of Hulk is to demonstrate the damage that a DDoS attack can do to a server if unprotected.
💡 Please go through the code for full details. I'm keeping it well documented and request the contributors to do so too.

Hulk consists of 2 major and 1 optional components:

  • Server
  • Client
  • [Gui]

Hulk_architecture

Client 👾

The core part of Hulk is the Hulk client aka Hulk.py.
This client\bot launches a barrage of asynchronous HTTP requests to the target server.
These incoming requests, put a burden on the target and makes it slow to respond.
With the launcher script, we can launch multiple instances of Hulk using multi-threading.
The target will be hit with so many requests that it will ultimately break into a 500 error.
Usually, the client completes 500 attacks and sends back the list of status messages.
In case of special events, the client will immediately send an Interrupt message to the server.
Example Special Events: Successful DDoS, 404 Target Not Found, etc.

Server 💻

Hulk was originally a single instanced DoS script. However, it has been modified to be run as multiple instances.
The cluster of many such instances is called a botnet. And this botnet can be controlled and monitored by the Server.
The Server and Client communicate with each other through TCP WebSockets. Based on the settings, this is usally a persistent bidirectional channel.
In case the server receives Interrupts from a client, it will send out a broadcast message to all the clients, asking them to stop the attacks.
The clients go to Standby mode and await further instructions from the server.

The server can also send information to the GUI to keep a track of the botnet.
This information is sent via Unix\Windows Named Pipes for low latency IPC.

GUI 🖥️

The GUI is a NextJS web application that is used to monitor the botnet via Named Pipes.
When run as a binary, GUI makes use of Electron which exposes the information directly to the Frontend.
When run as a Node process, a node server listens to the Named Pipe and passes on the information to a HTTP Streaming API.
Then the frontend will pick it up from the API using EventSource.

Acknowledgements 👥

Authors ✍️

Name Version
Hyperclaw79 2.0+
Barry Shteiman 1.0

Contributors 🤝

Thanks for contributing to the repo. Follow the Contribution Guide and open a PR.

Contributor Contribution
Nexuzzzz Fixed typo in the code

License 📄

HULK v3 is a Python 3 compatible Asynchronous Distributed Denial of Service Script.
Original script was created by Barry Shteiman. You can use that one if you have Python 2.

Using a GNU license cause there was no mention about any license used by Barry. Feel free to modify and share it, but leave some credits to us both and don't hold us liable.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].