All Projects → Taguar258 → Raven-Storm

Taguar258 / Raven-Storm

Licence: other
Raven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many connections using several exotic and classic protocols.

Programming Languages

python
139335 projects - #7 most used programming language
shell
77523 projects

Projects that are alternatives of or similar to Raven-Storm

awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (-68.09%)
Mutual labels:  ddos, dos, ddos-attacks, ddos-tool, ddos-attack-tools, ddos-script
overload
📡 Overload DoS Tool (Layer 7)
Stars: ✭ 167 (-28.94%)
Mutual labels:  ddos, ddos-attacks, termux, ddos-tool, ddos-script
Aoyama
A New version of Python3 botnet, old version: http://github.com/Leeon123/Python3-botnet
Stars: ✭ 161 (-31.49%)
Mutual labels:  ddos, botnet, ddos-attacks, ddos-tool
ZBOT-Botnet
IRC based botnet developed in C
Stars: ✭ 25 (-89.36%)
Mutual labels:  ddos, dos, botnet, ddos-tool
websploit
Websploit is an advanced MITM framework.
Stars: ✭ 105 (-55.32%)
Mutual labels:  ddos, mitm, ddos-attacks
Ufonet
UFONet - Denial of Service Toolkit
Stars: ✭ 963 (+309.79%)
Mutual labels:  ddos, dos, botnet
Pummel
Socks5 Proxy HTTP/HTTPS-Flooding (cc) attack
Stars: ✭ 53 (-77.45%)
Mutual labels:  ddos, ddos-attacks, ddos-tool
dheater
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (-39.57%)
Mutual labels:  ddos, denial-of-service, ddos-tool
DDos-Attack-OVH-
Powerful DDoS Attack
Stars: ✭ 155 (-34.04%)
Mutual labels:  dos, ddos-attacks, ddos-attack-tools
Nginx Lua Anti Ddos
A Anti-DDoS script to protect Nginx web servers using Lua with a HTML Javascript based authentication puzzle inspired by Cloudflare I am under attack mode an Anti-DDoS authentication page protect yourself from every attack type All Layer 7 Attacks Mitigating Historic Attacks DoS DoS Implications DDoS All Brute Force Attacks Zero day exploits Social Engineering Rainbow Tables Password Cracking Tools Password Lists Dictionary Attacks Time Delay Any Hosting Provider Any CMS or Custom Website Unlimited Attempt Frequency Search Attacks HTTP Basic Authentication HTTP Digest Authentication HTML Form Based Authentication Mask Attacks Rule-Based Search Attacks Combinator Attacks Botnet Attacks Unauthorized IPs IP Whitelisting Bruter THC Hydra John the Ripper Brutus Ophcrack unauthorized logins Injection Broken Authentication and Session Management Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Security Misconfiguration Cross-Site Scripting (XSS) Insecure Deserialization Using Components with Known Vulnerabilities Insufficient Logging & Monitoring Drupal WordPress Joomla Flash Magento PHP Plone WHMCS Atlassian Products malicious traffic Adult video script avs KVS Kernel Video Sharing Clip Bucket Tube sites Content Management Systems Social networks scripts backends proxy proxies PHP Python Porn sites xxx adult gaming networks servers sites forums vbulletin phpbb mybb smf simple machines forum xenforo web hosting video streaming buffering ldap upstream downstream download upload rtmp vod video over dl hls dash hds mss livestream drm mp4 mp3 swf css js html php python sex m3u zip rar archive compressed mitigation code source sourcecode chan 4chan 4chan.org 8chan.net 8ch 8ch.net infinite chan 8kun 8kun.net anonymous anon tor services .onion torproject.org nginx.org nginx.com openresty.org darknet dark net deepweb deep web darkweb dark web mirror vpn reddit reddit.com adobe flash hackthissite.org dreamhack hack hacked hacking hacker hackers hackerz hackz hacks code coding script scripting scripter source leaks leaked leaking cve vulnerability great firewall china america japan russia .gov government http1 http2 http3 quic q3 litespeedtech litespeed apache torrents torrent torrenting webtorrent bittorrent bitorrent bit-torrent cyberlocker cyberlockers cyber locker cyberbunker warez keygen key generator free irc internet relay chat peer-to-peer p2p cryptocurrency crypto bitcoin miner browser xmr monero coinhive coin hive coin-hive litecoin ethereum cpu cycles popads pop-ads advert advertisement networks banner ads protect ovh blazingfast.io amazon steampowered valve store.steampowered.com steamcommunity thepiratebay lulzsec antisec xhamster pornhub porn.com pornhub.com xhamster.com xvideos xvdideos.com xnxx xnxx.com popads popcash cpm ppc
Stars: ✭ 295 (+25.53%)
Mutual labels:  protection, ddos, dos
Ddos Rootsec
DDOS Archive by RootSec (Scanners, BotNets (Mirai and QBot Premium & Normal and more), Exploits, Methods, Sniffers)
Stars: ✭ 108 (-54.04%)
Mutual labels:  ddos, dos, botnet
ddos
Simple dos attack utility
Stars: ✭ 36 (-84.68%)
Mutual labels:  ddos, ddos-attacks, denial-of-service
Docker-Swarm-DDOS
How to create a Denial of Service Attack through Docker Swarm.
Stars: ✭ 36 (-84.68%)
Mutual labels:  dos, ddos-attacks, ddos-attack-tools
Python-Botnet
This is a simple DDoS python botnet script with remote monitoring & management for education purposes.
Stars: ✭ 119 (-49.36%)
Mutual labels:  ddos, dos, botnet
ddos-mitigation
Tips to mitigate and secure your large-scale server against DDoS attacks.
Stars: ✭ 58 (-75.32%)
Mutual labels:  ddos, ddos-attacks
HULK-v3
Asynchronous HTTP Botnet for Distributed Denial of Service (DDoS)
Stars: ✭ 152 (-35.32%)
Mutual labels:  ddos, ddos-script
Anti-DDOS-Script
Anti DDOS Protection that will stop DDOS from taking down your Linux Server
Stars: ✭ 51 (-78.3%)
Mutual labels:  protection, ddos
Python3-Botnet
Project moved to -> https://github.com/Leeon123/Aoyama
Stars: ✭ 24 (-89.79%)
Mutual labels:  ddos, botnet
NTPDoser
NTP Doser is a NTP Amplification DoS/DDoS attack tool for penttesting
Stars: ✭ 96 (-59.15%)
Mutual labels:  ddos, dos
DDOS Detection
ddos attack detector using ML Algorithms
Stars: ✭ 38 (-83.83%)
Mutual labels:  ddos, ddos-attacks

Raven-Storm Toolkit

Raven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python(3.8).

Takedown WiFi access points, devices in your network, servers, services, and Bluetooth devices with ease.

Raven(abbreviation) is desinged to help you to test, understand, and learn from stress-testing attacks.

Raven can deal with strong servers and can be optimized for non typical targets.

Raven will fit your purpose, even if it is jamming down wifi networks or bluetooth devices.

I archived this repository because I currently do not want to work on it.

MOSHED

What makes it different

  • Raven-Storm includes tools for creating shorcuts and working more efficiently.
  • Raven is Effective and powerful in shutting down hosts and servers.
  • Testing and understanding are the goals of Raven-Storm.
  • Raven lets you connects clients together to create a botnet.
  • Features different protocols such as UDP/TCP, ICMP, HTTP, L2CAP, ARP and IEEE.

Installation

Just enter the following line to install Raven-Storm on Linux.

curl -s https://raw.githubusercontent.com/Taguar258/Raven-Storm/master/install.sh | sudo bash -s

Click here for the more detailed installation guide.

Terms of Use

Licence

Project status/ToDo

CLIF Framework

What module to use

Method Module
ping l3
udp/tcp services l4
websites l7
local devices arp
bluetooth bl
wifi wifi
botnet server

Try using the L4 attack if L7 fails.

Preview1

Preview2

Example

Gif

How to run a DDoS attack

You probably already know the difference between DoS and DDoS: A DoS Attack is run by a single Maschine and a DDoS Attack by multiple.

But how do we perform a DDoS Attack using Raven-Storm?

To connect multiple instances of Raven-Storm, you will then need to open a host. Just execute the command server and define a custom password to prevent others from interfering. When run, you will receive a URL that you can connect to when executing the ddos command.

Info and Warning

THE CREATOR (Taguar258) OF THE RAVEN-STORM TOOLKIT DOES NOT TAKE ANY RESPONSIBILITY FOR DAMAGE CAUSED. THE USER ALONE IS RESPONSIBLE, BE IT: ABUSING RAVEN-STORM TO FIT ILLEGAL PURPOSES OR ACCIDENTAL DAMAGE CAUSED BY RAVEN-STORM. THE CREATOR DID NOT INTEND RAVEN-STORM AS A TOOL FOR ILLEGAL PURPOSES AND THEREFORE DOES NOT SUPPORT ANY ILLEGAL ABUSE OF THIS TOOL. BY USING THIS SOFTWARE, YOU MUST AGREE TO TAKE FULL RESPONSIBILITY FOR DAMAGE CAUSED BY RAVEN-STORM IN ANY WAY ON YOUR OWN. THE CREATOR DOES NOT WANT PEOPLE TO USE RAVEN-STORM IF THEY DO NOT HAVE EXPERIENCE WITH THE ATTACKS INCLUDED. EVERY ATTACK WILL CAUSE TEMPORARY DAMAGE, BUT LONG-TERM DAMAGE IS DEFFINITIFLY POSSIBLE. RAVEN-STORM SHOULD NOT SUGGEST PEOPLE TO PERFORM ILLEGAL ACTIVITIES.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

MIT Taguar258 2020

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].