Browse free open source DDoS Attack tools and projects for Windows below. Use the toggles on the left to filter open source DDoS Attack tools by OS, license, language, programming language, and project status.
-
Quant offers a wide range of solutions for retail. Within one integrated software system, it allows you to efficiently combine the management of retail space, shelf labels and marketing materials with task management, reporting and automatic replenishment.
-
Accolader focuses on employee awards, not rewards. Peer recognition for a job well done is more meaningful than a small monetary reward. Accolader surfaces these achievements in a fun, easy to use lightweight tool that is easy to integrate and free to use.
-
1
LOIC
A network stress testing application
Low Orbit Ion Cannon.
The project only keeps and maintains (bug fixing) the code written by the original author — Praetox, but is not associated or related to it.
DISCLAIMER: USE ON YOUR OWN RISK. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER OR CONTRIBUTORS «AS IS» AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES.Downloads:
4,113 This WeekLast Update:
See Project
-
2
Downloads:
748 This WeekLast Update:
See Project
-
3
LOIC-0
A NETWORK STRESS TOOL BASED ON PRAETOX LOIC
Low Orbit Ion Cannon — 0 (LOIC-0)
The original Low Orbit Ion Cannon with interface improvements.
ALSO NOTED VERSION 1.0 OF LOIC-0 IS VERSION 1.2 OF LOIC AND SO ON.
DISCLAIMER: USE ON YOUR OWN RISK. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER OR CONTRIBUTORS «AS IS» AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
THIS TOOL IS RELEASED WITH NO WARRANTY AT ALL.
TAGS: LOIC,Low Orbit Ion Cannon, network, stress test, security software, network tool, Windows,Linux,
LOWC, Low Orbit Web Cannon, network, stress testing, load testing, server load testing, server testing.Downloads:
81 This WeekLast Update:
See Project
-
4
One of the most overpowered DDOS weapon on the internet. This software is mainly for pen testing websites or servers.
Slava Ukraine!Downloads:
102 This WeekLast Update:
See Project
-
The AdaptiveGRC solution is a comprehensive suite designed to fully coordinate governance, risk and compliance activities, and information for all levels in any organization. AdaptiveGRC uses a unique ‘data fabric’ to help bind and connect information and functionality.
-
5
DDOSER
Machine that can DDOS servers
This machine can DDOS any IP.
Takes from 2 — 5 Hours to working properly.
Good luck!
====SUBMIT ERRORS HERE====
https://forms.gle/9ubmBmhivBBYGgmg7
==========================
[1 April 2020 Patch]
The «This program was made with an unlicensed compiler (…)» error will be repaired today! Stay tuned.
Thanks to _FoZa_ for reporting me that error!
Congrats!
LOG 1:
That won`t fixed anything so i needed to make another version
LOG 2:
Fixed That made my program which converts files. Now it`s ok.
[2 April Patch]
New Features:
— Better Color! Black and Yellow!
— Select how much packets you want to send
— File is 3.6kB Larger…Downloads:
181 This WeekLast Update:
See Project
-
6
DDoS/DoS Attack Simulator is powerful Python-based software used for attacking servers, hosts, and websites using traffic. It disrupts the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. A server that does not have protection against it can experience extremely slow performance due to all of the traffic it sends.
Extensive features will be added!
Mega Feature — > DoS Tool.
[ 1 ] Bugs Fixes.
[ 2 ] Increase in Optimization.
[ 3 ] DoS Attacks.
Note: The following program is intended for educational purposes only. I ( Muhammad Sami Furqan ) am not responsible for any damage you do by utilizing this software. Read the License Agreement for more info about the Redistribution and Copyright of this Open-Source Program. Additionally, I strongly advise that you read the documentation thoroughly before attempting to use this program. Use this program at your own risk.Downloads:
178 This WeekLast Update:
See Project
-
7
Please note that the source is in the zip.
(note we’re working on getting the complete source code.)
DISCLAIMER: USE ON YOUR OWN RISK. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER OR CONTRIBUTORS «AS IS» AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
THIS TOOL IS RELEASED WITH NO WARRANTY AT ALL.
we’re going to make this version of HOIC with a full source code release so that it may be ported to other platforms and codes.
Also we’re working on making it more professional.
High Orbit Ion Cannon is released into Public Domain.Downloads:
91 This WeekLast Update:
See Project
-
8
DDOSIM simulates several zombie hosts (having random IP addresses) which create full TCP connections to the target server. After completing the connection, DDOSIM starts the conversation with the listening application (e.g. HTTP server).
Downloads:
161 This WeekLast Update:
See Project
-
9
Hyenae is a highly flexible platform independent network packet generator. It allows you to reproduce several MITM, DoS and DDoS attack scenarios, comes with a clusterable remote daemon and an interactive attack assistant.
*** Hyenae is back ***
Hyenae will be continued here: https://sourceforge.net/p/hyenae-ngDownloads:
107 This WeekLast Update:
See Project
-
MobileServe’s mobile and web apps make it easy for individuals to track and verify their service work, while providing institutions with valuable data about their volunteers. Administrators have access to a dashboard that shows real-time aggregate and individual data about volunteers, their service activities, and economic impact. The dashboard offers robust reporting, event management and goal tracking.
-
10
https://www.python.org/download/releases/2.7/
A tool designed by members of PentagonCrew to help
you easily take down websites. -Ethical uses only-Downloads:
27 This WeekLast Update:
See Project
-
11
Command Line is an Open-Source Software for Pentesters and Ethical Hackers it contains many Functionalities which helps Ethical Hackers. It is CLI Based Application use for checking Networks and IP’s it also supports functionalities like downloading Packages from Internet Including YouTube.It is also used for Port scanning, IP-Finding it is also useful for checking ping and net speed with the functionality of scanning the net speed by selecting the best server. It also has Host IP finding capability by Host it can also have commands used in Normal Terminals.
TAGS: IP Resolver, IP sniffer, IP grabber, IP puffer, lanc v2, playstation, network sniffer, ip psn resolver, ddos tool for ps4, ps4 ip grabber, lanc, ip xbox resolver, stresser, xboxone ip sniffer, ip finder, leak ip, lanc tool, lanc remastered, lanc download, ocnosniff, ps4 ip, xbox ip, ps4 ddos, xbox ddos, ps4 ip, boot people, xbox ip, pull ips
lanc-remastered-ip-snifferDownloads:
42 This WeekLast Update:
See Project
-
12
ANTI-VIRUS MUST BE TURNED OFF TO WORK!
Downloads:
71 This WeekLast Update:
See Project
-
13
Hive Mind LOIC is a version of the Low Ordbit Ion Cannon made by Praetox, which was adapted for centralized control by NewEraCracker, when the project was then taken on by me. The amongst a few fixes I added RSS control (Such as via Twitter).
Downloads:
15 This WeekLast Update:
See Project
-
14
NEMESIS is tool like torshammer or pyloic, used to Distributed Denial of Service attacks, writen in C#
See blog, for more detailsDownloads:
34 This WeekLast Update:
See Project
-
15
AnnonCannon [Optimized Attack]
Based Java [Loic]Downloads:
32 This WeekLast Update:
See Project
-
16
DDoS Subsystem Optimized Attack
Downloads:
17 This WeekLast Update:
See Project
-
17
Downloads:
26 This WeekLast Update:
See Project
-
18
ufonet
UFONet — Denial of Service Toolkit
UFONet — Is a set of hacktivist tools that allow launching coordinated DDoS and DoS attacks and combine both in a single offensive.
It also works as an encrypted DarkNET to publish and receive content by creating a global client/server network based on a direct-connect P2P architecture.
+ FAQ: https://ufonet.03c8.net/FAQ.html
———————————————
-> UFONet-v1.8 [DPh] «DarK-PhAnT0m!» (.zip) -> md5 = [ c8ab016f6370c8391e2e6f9a7cbe990a ]
-> UFONet-v1.8 [DPh] «DarK-PhAnT0m!» (.tar.gz) -> md5 = [ 8a4cd86c21db2ad657eb75e6ac0e52d5 ]
———————————————Downloads:
26 This WeekLast Update:
See Project
-
19
French DDOS v.1.0 est un logiciel qui pourra servir a tester si un serveur ne cède pas sous de petite requête. Je vous conseille L.O.I.C qui est bien plus puissant et mieux développé, mais si vous voulez tester ce logiciel allez-y.
Downloads:
25 This WeekLast Update:
See Project
-
20
DISCLAIMER: USE ON YOUR OWN RISK. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER OR CONTRIBUTORS «AS IS» AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
!!! ONLY FOR PENTESTING PURPOSES !!!Downloads:
12 This WeekLast Update:
See Project
-
21
LOIC-SLOW
LOIC-0 WITH SOME LOWBANDWITH NETWORK STRESSING TOOLS ADDED
LOIC-SLOW
Low Orbit Ion Cannon-
Special Lowbandwith Operating Weapon
LOIC-SLOW stands for
LOIC — Low Orbit Ion Cannon
SLOW — Special Lowbandwith Operating Weapon
THE NEXT GENERATION OF LOIC-0
DISCLAIMER: USE ON YOUR OWN RISK. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER OR CONTRIBUTORS «AS IS» AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES.
THIS TOOL IS RELEASED WITH NO WARRANTY AT ALL.
TAGS: LOIC, Low Orbit Ion Cannon, network, stress testing, load testing, server load testing, server testing.Downloads:
12 This WeekLast Update:
See Project
-
22
LOIC
LOIC TCP/IP Stresser v1.1.0.1 By LifeOwner
LOIC
TCP/IP Stresser Tool
History
I was downloaded the original LOIC within version 1.0.8.0 and changed it to be better without changing the other functions which were worked nice. The grey skin i hope you like it! Reworked by LifeOwner.
New Features Work
• The UDPV2 work like charm with low builded connections you might get timeout in your internet connection might cause you’re too slow. (I tested it with 25MB’s Downstream/ 2MB’s Upstream). • The status checker function will be slowly when the ip->port will be offline, so do not worry the program still running and working on it, just the timeout is bigger than usually to make sure it will works for slower connections.
Have fun with it i hope you will like it!
New build by LifeOwner 2016.Downloads:
19 This WeekLast Update:
See Project
-
23
Shoot down any site with DDoS Atack
Y!M:andrei.killer84
Password : «andrei.killer84»Downloads:
8 This WeekLast Update:
See Project
-
24
Syn Flooder is ip disturbing testing tool , you can test this tool over your servers and check for there protection , This is a beta version .
Downloads:
8 This WeekLast Update:
See Project
-
25
AnDDoS
Stealth Anonymous Kill-The-Server
The classic DDoS! Overload the server.
It is simple but harmful. Watch out your server.Downloads:
14 This WeekLast Update:
See Project
Skip to content
Sign up
Search code, repositories, users, issues, pull requests…
Provide feedback
We read every piece of feedback, and take your input very seriously.
Include my email address so I can be contacted
Saved searches
Use saved searches to filter your results more quickly
Sign in
Sign up
RCode777
/
Windows-DDoS-Tools
Public
- Notifications
-
Fork
1 -
Star
5
DDoS Attack Tool for windows using Batchfile
5
stars
1
fork
Activity
Star
Notifications
main
{{ refName }}
default
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
1
branch
0
tags
Code
-
Clone
Use Git or checkout with SVN using the web URL.
-
Open with GitHub Desktop
-
Download ZIP
Latest commit
Git stats
-
7
commits
Files
Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
DDoS-Tools.bat
Add files via upload
March 17, 2022 11:45
README.md
Update README.md
March 17, 2022 12:39
Unknown Doser.rar
Add files via upload
March 22, 2022 17:31
Windows-DDoS-Tools
Feature :
DDoS Attack
How To Install
Screenshot
README.md
Windows-DDoS-Tools
DDoS Attack Tool for windows using Batchfile
Feature :
Check Target Connection
Shortcut to ip tracker provider website
Download nmap / zenmap
NSLookup Target
Shortcut to kali linux website
Shortcut to wireshark website
Shortcut to Virtual Box website
Login System
DDoS Attack
Distributed Denial of Service or DDoS attack is a cyber attack that occurs due to flooding of the internet network by fake traffic (internet traffic) on servers, systems, or the network itself.
How To Install
git clone https://github.com/RCode777/Windows-DDoS-Tools
| Or, you can download it directlycd Windows-DDoS-Tools
| Or, you can directly open the folder
Type Command DDoS-Tools.bat
| Or you can open it directly by double-clicking on the file.
Screenshot
About
DDoS Attack Tool for windows using Batchfile
Resources
Readme
Activity
Stars
5
stars
Watchers
2
watching
Forks
1
fork
Report repository
Releases
No releases published
Packages
No packages published
Languages
-
Batchfile
100.0%
Are you searching for the Best DDoS Attack Tools and are tired of searching for them? If yes, then don’t worry because you have ended up in the right place.
This article will give you a list of such best DDoS Attack Tools, and will also answer some of the most common questions about it.
So, let’s get started.
What is DDoS?
DoS stands for Denial of Service and Distributed Denial of Service. DoS is an attack used to deny legitimate users access to a resource and Denial of Service (DDoS) is a type of DoS attack that is performed by multiple systems that all target the same victim. Generally, bots are used to attack at the same time in DDoS.
Most Popular DDoS Attack Tools
- LOIC (Low Orbit ION cannon)
- DDoS Attacks or Solarwinds
- PyLoris
- DDoSIM
- RUDY
- HTTP Unbearable Load King
- HOIC
- GoldenEye
- OWASP HTTP POST
Following is the list of the best DDoS attack tools with their popular features:
1. LOIC (Low Orbit ION cannon)
LOIC (Low Orbit ION cannon) is an easy-to-use and open-source DDOS tool software that is widely used for network stress testing and DDoS attack.
Features:
These are the following features of the LOIC (Low Orbit ION cannon).
- It allows the users to perform stress testing to verify the stability of the system.
- It never hides IP addresses.
- With the help of basic network traffic monitors and firewalls, small-scale attacks can be detected and blocked easily.
- It uses a unique client classification engine that analyzes incoming HTTP/S traffic.
Note: It has only one supporting platform i.e., Windows.
To Download LOIC (Low Orbit ION cannon), click here.
2. DDoS Attacks or Solarwinds
Solarwinds is a DDOS tool that can be used to perform a DDoS attack. It is an easy-to-use APT software that detects threats across environments for cohesive defense-in-depth security.
Features:
These are the following features of Solarwinds
- It monitors user activity, network security, and file integrity.
- It performs different analyses such as Microsoft IIS Log and Firewall Log.
- It provides different network security and SIEM tools.
- It provides automatic compliance risk management.
- It keeps track of login and logs off with a centralized login audit events monitor.
- It detects malicious activity.
Note: It supports the following platforms: Windows, and Linux.
To Download Solarwinds, click here.
3. PyLoris
PyLoris is DDOS tool software that helps users to manage DDoS online and control poorly managed concurrent connections.
Features:
These are the following features of PyLoris.
- It provides a fully rewritten codebase.
- It provides a better graphical user interface(GUI).
- It can run PyLoris using Python script.
- It provides a scripting API that allows prepackaged attacks.
- It enables the users to attack using HTTP request headers.
Note: It supports the following platforms: Windows, Mac OS, and Linux.
To Download PyLoris, click here.
4. DDoSIM (DDoS Simulator)
DDoSIM (DDoS Simulator) is a tool written in C++ that is primarily used to create a distributed denial-of-service attack against a target server.
Features:
These are the following features of the DDoSIM (DDoS Simulator)T.
- It creates full TCP connections to the target server.
- It provides random source IP addresses.
- It provides several zombie simulations.
- TCP connections can be flooded on a random network port.
Note: It supports the following platforms: Windows, and Linux.
To Download DDoSIM (DDoS Simulator), click here.
5. RUDY
RUDY is short for R-U-Dead-Yet and is one of the free DDoS attack tools that implement the generic HTTP DoS attack via long-form field submissions.
Features:
These are the following features of the RUDY.
- It targets web applications by starvation of available sessions on the web server.
- It performs load testing.
- It provides an interactive console menu.
- It keeps sessions at a halt using never-ending POST transmissions and sending an arbitrarily large content-length header value.
- It is a simple and easy-to-use tool.
To Download RUDY, click here.
6. HTTP Unbearable Load King (HULK)
HTTP Unbearable Load King (HULK) is a web server DDoS tool that is specially designed for research purposes.
Features:
These are the following features of the HTTP Unbearable Load King (HULK).
- It is used to generate unique and obfuscated network traffic.
- It has the capability to bypass the cache server.
- It is a free DDoS attack tool.
Note: It has only one supporting platform i.e., Windows.
To Download HTTP Unbearable Load King (HULK), click here.
7. HOIC (High Orbit ION cannon)
HOIC (High Orbit ION cannon) is a free denial-of-service DDOS tool that has the capability to attack more than one URL at the same time.
Features:
These are the following features of HOIC (High Orbit ION cannon).
- It provides a high-speed multi-threaded HTTP Flood.
- It simultaneously floods up to 256 websites at once.
- It provides an easy-to-use interface.
- It can be ported over to Linux/Mac with a few bug fixes.
- It provides three settings to control attacks.
- It provides a built-in scripting system to allow the deployment of ‘boosters’.
- It has the ability to select the number of threads in an ongoing attack.
Note: It has only one supporting platform i.e., Windows.
To Download HOIC (High Orbit ION cannon), click here.
8. GoldenEye
GoldenEye is a DDOS tool app that is written in Python for security purposes only. It is an HTTP DoS Test Tool.
Features:
These are the following features of the GoldenEye.
- It is fast and easy to use.
- It performs load testing.
- It randomizes GET, and POST to get mixed traffic.
To Download GoldenEye, click here.
9. Tor’s Hammer
Tor’s Hammer is a slow post dos testing tool written in Python. It allows users to create rich text markup using Markdown.
Features:
These are the following features of Tor’s Hammer.
- It kills most unprotected web servers running Apache and IIS via a single instance.
- It kills Apache 1. X and older IIS with ~128 threads, newer IIS, and Apache 2. X with ~256 threads.
- It automatically converts the URL into links.
- It allows targeting web applications and a web server.
To Download Tor’s Hammer, click here.
10. OWASP HTTP POST
OWASP stands for Open Web Application Security Project. OWASP HTTP POST is software that enables the user to test web applications for network performance.
Features:
These are the following features of the OWASP HTTP POST.
- It is totally free for commercial use.
- It offers users to conduct denial of service from a single machine.
- It allows the users to share the result under the license it provides.
- It allows users to distribute and transmit the tool to others.
To download OWASP HTTP POST, click here.
Now, let us try to answer some of the most common questions that often come to our mind while choosing the best DDoS Attack Tools.
What is the difference between DoS and DDoS?
These are the following difference between DoS and DDoS :
- DoS stands for Denial of Service and DDoS stands for Distributed Denial of Service.
- In a DoS attack, the single system targets the victim’s system whereas in DDoS multiple systems attack the victim’s system.
- DoS attack is slower as compared to DDoS.
- DoS attacks are easy to trace whereas DDoS attacks are difficult to trace.
What are some of the best apps for DDoS Attack Tools?
These are the following best apps for DDoS Attack Tools:
- LOIC (Low Orbit ION cannon)
- HOIC (High Orbit ION cannon)
- DDoS Attacks or Solarwinds
- (DDoS Simulator)
Conclusion:
I hope the above article it is clear about what DDoS Attacks are, what is the difference between DoS and DDoS, and what are some of the best apps for DDOS tool and their features.
Frequently Asked Questions(FAQs)
1. What is the most powerful DDoS tool?
It is not ethical to determine the most powerful DDoS tool or discuss it here. Such tools are designed to cause harm and disrupt legitimate online services. The use of these tools is illegal and can lead to severe legal consequences.
2. What tools are used for DDoS attacks?
Various tools can be used for DDoS attacks, including LOIC (Low Orbit Ion Cannon), HOIC (High Orbit Ion Cannon), Xerxes, and many others. These tools send a large amount of traffic or requests to a target server or website, overwhelming it and causing it to become unavailable.
3. What is the most successful DDoS attack?
I cannot provide information on the most successful DDoS attack as such attacks are illegal and can cause severe damage to the target’s online presence. It is important to note that engaging in such activities is unethical, and it is crucial to respect the laws and regulations governing online activities.
4. Are DDoS attacks profitable?
DDoS (Distributed Denial of Service) attacks are not considered profitable for the attacker as they do not directly generate any revenue.
The primary goal of DDoS attacks is to disrupt the targeted website or service and cause damage to the organization’s reputation or financial losses. In some cases, attackers may use DDoS attacks as a smokescreen to carry out other malicious activities, such as data theft, extortion, or other types of cybercrime.
5. Are DDoS attacks easy?
DDoS attacks are not considered easy to carry out. They require a significant amount of resources, technical skills, and coordination. DDoS attacks typically involve a large number of compromised devices, such as computers, smartphones, or IoT devices, that are controlled by the attacker through malware or botnets.
These attacks can be launched from anywhere in the world, making it challenging to track down the attacker’s location. Additionally, the defender may use various security measures, such as firewalls, intrusion detection systems, and content delivery networks (CDNs), to mitigate the effects of DDoS attacks.
You may also like:
- Best Word Processing Software
- 13 Best Solarmovie Alternatives
- 10 Best Wireless Keyboard and Mouse
- 21 FREE Anime Websites to Watch Online in 2021
LOIC — это программа, которая обеспечивает активацию DDoS-атаки на сайт или сервер. Этот инструмент изначально создан для проверки защиты, которая находится на нём. Программа предназначена для запуска DDOS-атак и работает как специальный инструмент, поэтому используйте его только для проведения экспериментов.
В программе есть доступ к исходному коду. При необходимости закачайте дополнительные материалы с сервиса SourceForge. В источнике программа обозначена вредоносной программой. Загружая Low Orbit Ion Cannon, помните, что вы используете её на свой страх и риск.
Принцип работы
Программа внедряется в сервер и совершает многоуровневую атаку, открывая множество подключений к серверу. После этого «LOIC» нарушает работу сервера и добивается кода ошибки, который означает «победу». Нарушение работы сервера происходит в последовательном режиме. В окне программы вы просматриваете подробную статистику о доступных ошибках на сервере и его работоспособность.
«Взламывая сервер» DDoS – атаками, вы видите данные об активных подключениях. Эти параметры изменяются постоянно в процессе атаки. Кроме того, вы видите сообщения о коде, который возвращается с сервера и пытается подключиться к нему в стандартном режиме.
Утилита работает в стандартном режиме, используя обычные инструменты и методы взлома. LOIC «забрасывает» спам в HTTP-запросы и добивается поломки устройства. LOIC распространяется в стандартной версии, а также в атакующей через новостные ленты и программы для общения. Второй вариант программы подойдёт создателям ботнетов.
Интерфейс
Все функции, которые находятся в программе LOIC, расположены на одной панели. Указав адрес сервера или айпи адрес для атаки, вы увидите список доступных подключений. Графический интерфейс простой и интуитивный, но в оболочке отсутствует русская локализация. Зачастую, такие инструменты не переводят на русский язык.
Ключевые особенности
- инструмент «взламывает» сервер, совершая атаку, и добивается отказа оборудования на нём;
- в программе простой интерфейс, который создан в однооконном режиме;
- LOIC отсылает спам в виде запросов через протокол HTTP, и другие пакеты;
- в интерфейсе есть исходный код с открытым доступом, который создан на языке программирования C#;
- «взломщик» работает на сборках OS Windows старого поколения;
- программа работает на бесплатной лицензии.
LOIC — это мощный инструмент, который позволяет осуществлять DDoS-атаки на сайты и сервера. Сразу отметим, что использовать программу по ее прямому назначению мы не рекомендуем. Вообще, если верить словам разработчика, приложение создано для проверки «надежности» хостера и используемых им систем защиты. Программа обладает открытым исходным кодом и доступна для загрузки с сервиса SourceForge. Отметим, что там она отмечена как вредоносное программное обеспечение, так что загрузка и использование Low Orbit Ion Cannon (полное название приложения) происходит исключительно на ваш страх и риск.
Принцип работы
Программа позволяет совершать распределенную атаку, одновременно открывая много подключений к серверу и, тем самым пытаясь «положить» его — добиться кода ошибки, свидетельствующего о «победе». В процессе DDoS LOIC отображает информацию о статусе активных подключений, которая изменяется в режиме реального времени. Кроме того, пользователю сообщают о коде, который был возвращен сервером при попытке осуществить стандартное подключение.
Low Orbit Ion Cannon действует вполне стандартными для подобного рода инструментов методами. В частности, программа умеет «спамить» HTTP-запросами, добиваясь отказа оборудования. Также приложение может осуществлять «флуд» UDP и TCP пакетами. Помимо стандартной версии LOIC, существует также версия, способная получать «цели» атаки по RSS-лентам и мессенджерам. Данный вариант программы может быть полезен создателям ботнетов.
Интерфейс
Все доступные в LOIC функции располагаются на единой панели. Там вы можете указать URL или IP для атаки и увидеть список открытых подключений. Графическая оболочка довольно интуитивна, но на русский язык не переведена. Впрочем, инструментам подобного рода локализация ни к чему.
Ключевые особеннности
- совершает DDoS атаки с целью добиться отказа серверного оборудования;
- имеет простой интерфейс, состоящий из единого окна;
- спамит HTTP-запросами, UDP и TCP пакетами;
- имеет открытый исходный код (написана на C#);
- совместима со старыми версиями операционной системы Windows;
- доступна бесплатно.