Wreckuests - yet another one hard-hitting tool to run DDoS atacks with HTTP-flood

What is this?
Wreckuests is a script, which allows you to run DDoS attacks with HTTP-flood(GET/POST). It’s written in pure Python and uses proxy-servers as “bots”.
enter image description here
⚠️ Warning: This script is published for educational purposes only! Author will accept no responsibility for any consequence, damage or loss which might result from use.
Features
  • UserAgent substitution
  • Referers randomizer
  • Cache bypass with random ?abcd=efg parameter
  • HTTP proxy support
  • Automatic gzip/deflate toggling
  • CloudFlare detection and notification of
  • HTTP Authentication bypass 
    …and everything else that kennethreitz/requests can do
Dependencies
Python 3.5+
Requests 2.10.0 or higher
netaddr (tested with 0.7.19)
Demo

Usage
Type under sudo mode:
git clone https://github.com/JamesJGoodwin/wreckuests&& cd wreckuests
python3 wreckuests.py -t https://localhost
Possible parameters:
-h or --help:
Prints a message with possible parameters.
-t or --target:
Specifies a link to the victim’s site page. It could be the website’s main page, someone’s profile, .php-file or even image. Everything that has a lot of weight or is hard for server to give. The choice is yours.
-a or --auth:
Parameter for bypassing authentication. You’r victim could enable basic HTTP authentication and his website will ask you to enter login and password in popup window. Victim may previously publish login and password data for his users in VK/FB/Twitter and whatever social network.
Important
A separate thread is created for each proxy address. The more proxies you use - the more threads you create. So, please, do not use way too much proxies. Otherwise, the script may exit abnormaly by meeting segmentation fault.

No comments

Note: Only a member of this blog may post a comment.

Powered by Blogger.