The HTTP Flood is a type of distributed denial of service (DDoS) attack where the attacker sends a large number of HTTP requests to a web server in an attempt to overwhelm it and make it unavailable to legitimate users.
The UDP Flood is a type of DDoS attack where the attacker sends a large number of UDP packets to a server in an attempt to overwhelm it and make it unavailable to legitimate users.
The TCP Flood feature swamps a chosen IP address and port with TCP traffic, adjustable with threads and timeout settings. By forging numerous TCP connections with the target server, it burdens its resources, leading to a possible Denial of Service (DoS) condition. Personalize IP addresses, ports, threads, and timeouts for targeted control and maximized impact.
The SYN Flood feature exploits the TCP three-way handshake mechanism by dispatching a multitude of SYN packets to the target server. By consuming server resources with pending connections, it might cause a Denial of Service (DoS) situation. Customize IP addresses, ports, threads, and timeouts for optimal flooding and elusion.
The ICMP Flood feature unleashes an IP address with ICMP traffic, configurable with threads and timeout settings. Inundating the target server with massive ping packets exhausts its resources, leading to a potential Denial of Service (DoS) situation. Adjust IP addresses, threads, and timeouts for optimal flooding and elusion.
The DNS Flood feature exploits the DNS resolution process by unleashing a torrent of DNS requests on the target server. Overwhelmed, the server consumes resources, potentially causing a Denial of Service (DoS) condition. Customize target IP addresses, threads, and timeouts for optimal flooding and evasion.
The NTP Flood feature takes advantage of the Network Time Protocol (NTP) by bombarding the target server with a significant number of NTP requests. This exhausts its resources, potentially leading to a Denial of Service (DoS) situation. Customize IP addresses, threads, and timeouts for optimal flooding and elusion.
The SSDP Flood feature abuses the Simple Service Discovery Protocol (SSDP) by unleashing a vast number of SSDP requests on the target server. This strain exhausts its resources, potentially leading to a Denial of Service (DoS) condition. Customize IP addresses, threads, and timeouts for optimal flooding and evasion.
The ARME Flood feature targets the Apple Remote Management (ARME) protocol, flooding the target server with numerous ARME requests. This strain depletes resources, potentially triggering a Denial of Service (DoS) condition. Customize IP addresses, threads, and timeouts for optimal flooding and evasion.
The CHARGEN Flood feature exploits the Character Generator (CHARGEN) protocol, sending a deluge of CHARGEN responses to the target server. This resource-intensive activity can potentially cause a Denial of Service (DoS) condition. Customize IP addresses, threads, and timeouts for optimal flooding and elusion.
The documentation is not finished yet.
To install the software, simply download the latest release from our website and open the exe file.
Your Antivirus might flag this file as a virus. For windows defender click on allow device or just turn it off for the time using it.