All Projects β†’ abriginets β†’ Wreckuests

abriginets / Wreckuests

Licence: mit
Yet another one hard-hitting tool to run HTTP stress tests 🌌

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Wreckuests

Camerattack
An attack tool designed to remotely disable CCTV camera streams (like in spy movies)
Stars: ✭ 192 (+40.15%)
Mutual labels:  attack, ddos
CCATK
高度θ‡ͺεŠ¨εŒ–CCθ„šζœ¬
Stars: ✭ 107 (-21.9%)
Mutual labels:  ddos, attack
Cc Attack
Using Socks4/5 proxy to make a multithreading Http-flood/Https-flood (cc) attack.
Stars: ✭ 145 (+5.84%)
Mutual labels:  attack, ddos
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (-45.26%)
Mutual labels:  ddos, attack
Python-Botnet
This is a simple DDoS python botnet script with remote monitoring & management for education purposes.
Stars: ✭ 119 (-13.14%)
Mutual labels:  ddos, attack
Impulse
πŸ’£ Impulse Denial-of-service ToolKit
Stars: ✭ 538 (+292.7%)
Mutual labels:  attack, ddos
dheater
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (+3.65%)
Mutual labels:  ddos, attack
Pummel
Socks5 Proxy HTTP/HTTPS-Flooding (cc) attack
Stars: ✭ 53 (-61.31%)
Mutual labels:  ddos, attack
ddos
DDoS Attack & Protection Tools for Windows, Linux & Android
Stars: ✭ 84 (-38.69%)
Mutual labels:  ddos, attack
Mr.sip
SIP-Based Audit and Attack Tool
Stars: ✭ 266 (+94.16%)
Mutual labels:  attack, ddos
Mhddos
Best DDoS Attack Script Python3, Cyber Attack With 36 Method
Stars: ✭ 55 (-59.85%)
Mutual labels:  attack, ddos
Free adv train
Official TensorFlow Implementation of Adversarial Training for Free! which trains robust models at no extra cost compared to natural training.
Stars: ✭ 127 (-7.3%)
Mutual labels:  attack
Nailgun
Nailgun attack on ARM devices.
Stars: ✭ 114 (-16.79%)
Mutual labels:  attack
Misp Maltego
Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
Stars: ✭ 112 (-18.25%)
Mutual labels:  attack
Http request randomizer
Proxying Python Requests
Stars: ✭ 110 (-19.71%)
Mutual labels:  proxies
Lambdaattack
Minecraft bot for servers. Currently supports stress testing. More features are planned
Stars: ✭ 133 (-2.92%)
Mutual labels:  proxies
Proxy
A simple tool for fetching usable proxies from several websites.
Stars: ✭ 124 (-9.49%)
Mutual labels:  proxies
Ddos Rootsec
DDOS Archive by RootSec (Scanners, BotNets (Mirai and QBot Premium & Normal and more), Exploits, Methods, Sniffers)
Stars: ✭ 108 (-21.17%)
Mutual labels:  ddos
Wifiphisher
Wifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+7442.34%)
Mutual labels:  attack
Edge
A set of useful libraries for Edge Apps. Run locally, write tests, and integrate it into your deployment process. Move fast and maybe don't break things? Because, gosh darnit, you're an adult.
Stars: ✭ 105 (-23.36%)
Mutual labels:  proxies

logo

What is this?

Wreckuests is a script, which allows you to run DDoS attacks with HTTP-flood(GET/POST). It's written in pure Python and uses proxy-servers as "bots". OF COURSE, this script is not universal and you can't just drop Pentagon/NSA/whatever website with just a single mouse click. Each attack is unique, and for each website you'd need to search for vulnerabilities and exult them.

Warning: This script is published for educational purposes only! Author will accept no responsibility for any consequences, damage or loss which might result from use.

Features

  • Cache bypass with URL parameters randomization
  • CloudFlare detection and notification of
  • Automatic gzip/deflate toggling
  • HTTP Authentication bypass
  • UserAgent substitution
  • Referers randomizer
  • HTTP proxy support

...and everything else that kennethreitz/requests can do

Todo

TODO tasks are given in Projects section.

Dependencies

Installation

Just clone repository in the disired directory and run the installation script:

chmod +x install.sh
./install.sh

Usage

Type under sudo mode:

python3 wreckuests.py -v <target url> -a <login:pass> -t <timeout>

Possible parameters:

-h or --help:

Prints a message with possible parameters.

-v or --victim:

Specifies a link to the victim's site page. It could be the website's main page, someone's profile, .php-file or even image. Everything that has a lot of weight or is hard for server to give. The choice is yours.

-a or --auth:

Parameter for bypassing authentication. You'r victim could enable basic HTTP authentication and his website will ask you to enter login and password in popup window. Victim may previously publish login and password data for his users in VK/FB/Twitter and whatever social network.

-t or --timeout(defalut: 10):

Parameter to control connection'n'read timeout. This option also controls terminating time. Note: if you set timeout=1 or somewhere about 2-3 seconds, the slow(but still working) proxies will not have any time to even connect to your victim's website and will not even hit it. If you still do not understand how it works - do not change this option. Also, this parameter regulates the intensiveness of requests you sending. So, if you sure your proxies are fast enough - you can reduce this value. Use this accordingly.

Important

A separate thread is created for each proxy address. The more proxies you use - the more threads you create. So, please, do not use way too much proxies. Otherwise, the script may exit abnormaly by meeting segmentation fault.

✨ *Feel free to contribute* ✨

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].