GoldenEye v1.2.0 – Layer 7 (KeepAlive+NoCache) DoS Test Tool

GoldenEye is an python app for SECURITY TESTING PURPOSES ONLY!GoldenEye is a HTTP DoS Test Tool.Attack Vector exploited: HTTP Keep Alive + NoCacheUsage USAGE: ./goldeneye.py [OPTIONS] OPTIONS: Flag Description Default -u, –useragents File with user-agents to use (default: randomly generated) -w, –workers Number of concurrent workers (default: 50) -s, –sockets Number of concurrent sockets (default: 30) -m, –method HTTP Method to use ‘get’ or ‘post’ or ‘random’ (default: get) -d, –debug Enable Debug Mode [more verbose output] (default: False) -n, –nosslcheck Do not verify SSL Certificate (default: True) -h, –help Shows this helpUtilitiesutil/getuas.py – Fetchs user-agent lists from http://www.useragentstring.com/pages/useragentstring.php subpages (ex: ./getuas.py http://www.useragentstring.com/pages/Browserlist/) REQUIRES BEAUTIFULSOUP4res/lists/useragents – Text lists (one per line) of User-Agent strings (from http://www.useragentstring.com)Changelog2016-02-06 Added support for not verifying SSL Certificates2014-02-20 Added randomly created user agents (still RFC compliant).2014-02-19 Removed silly referers and user agents. Improved randomness of referers. Added external user-agent list support.2013-03-26 Changed from threading to multiprocessing. Still has some bugs to resolve like I still don’t know how to propperly shutdown the manager.2012-12-09 Initial releaseTo-doChange from getopt to argparseChange from string.format() to printf-likeLEGAL NOTICETHIS SOFTWARE IS PROVIDED FOR EDUCATIONAL USE ONLY! IF YOU ENGAGE IN ANY ILLEGAL ACTIVITY THE AUTHOR DOES NOT TAKE ANY RESPONSIBILITY FOR IT. BY USING THIS SOFTWARE YOU AGREE WITH THESE TERMS.Download GoldenEye

Link: http://feedproxy.google.com/~r/PentestTools/~3/40P1bnGqBqs/goldeneye-v120-layer-7-keepalivenocache.html

LOIC Download – Low Orbit Ion Cannon DDoS Booter

LOIC Download below – Low Orbit Ion Cannon is an Open Source Stress Testing and Denial of Service (DoS or DDoS) attack application written in C#.

What is LOIC Low Orbit Ion Cannon
LOIC was first developed by Praetox Technologies and later released into the public domain, the source code is now freely available and you can download LOIC below as it’s now hosted on several open source platforms.
The Low Orbin Ion Cannon performs a fairly basic TCP, UDP or HTTP DoS attack and when used by multiple individuals as it normally is, a DDoS attack.
Read the rest of LOIC Download – Low Orbit Ion Cannon DDoS Booter now! Only available at Darknet.

Link: https://www.darknet.org.uk/2017/10/loic-download-low-orbit-ion-cannon-ddos-booter/

WarChild – Denial of Service Testing Suite

Warchild is a denial of service testing suite made for analysing the strength of your website against different kinds of denial of service attacks you will be facing which are mainly organised by crooks to cause damage to your website.InstallationFor Installing the required modules just run the following command in your terminal 🙂 pip install -r requirements.txtUsepython warchild.pyOverviewThis Denial Of Service suite comprises of the following features : CloudBust :- Cloudbust a.k.a AETHON is a cloudflare resolver that looks into the cloudflare protected website for misconfigured DNS configuration basically uses dnsdumpster.com as its resolver :)and identifies the backend IP of the website. We will add more updates in upcoming time. HTTP Flood :- HTTP Flood is a type of Denial of Service attack in which the attacker manipulates HTTP and POST unwanted requests in order to attack a web server or application. In an HTTP flood, the HTTP clients such as web browser interact with an applicationor server to send HTTP requests. The aim of the attack is when to compel the server to allocate as many resources as possible to serving the attack thus denying legitimate users access to the server’s resources. ALISA is a http d.o.s tool written in such a way to suck all of the website’s resources and is a layer 7 D.O.S tool. TCP SYN Flood :- A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target’s system inan attempt to consume enough server resources to make the system unresponsive to legitimate traffic. UDP Flood :- A UDP flood attack is a denial-of-service (DoS) attack using the User Datagram Protocol (UDP), a sessionless/connectionless computer networking protocol.AuthorSouhardya Sardar is an independent security analyst and programmer who loves to break things in order to secure them. Github :- github.com/SouhardyaDownload WarChild

Link: http://feedproxy.google.com/~r/PentestTools/~3/W9v5-XPRYmI/warchild-denial-of-service-testing-suite.html