DDoS

Tools to create DDoS attacks

8 listed tools Last update on 2025-04-28

Up a Level Contribute

Cyber Kill Chain

Recon: Information gathering stage, where attackers gather as much information as possible about the target.

Weaponization: Crafting of tools or payloads to exploit vulnerabilities.

Delivery: The transmission of the weaponized payload to the target.

Exploitation: Exploiting a vulnerability to gain access to the target system.

Installation: Establishing a foothold on the target system.

Command & Control (C2): Setting up channels for communication with the compromised system.

Actions on Objectives: Achieving the intended goal of the attack, such as data exfiltration or system disruption.

CC-attack 

Open-source        

Socks4/5 proxy-based multithreading attack

DDOS Ripper 

Open-source          

DDOS attack server based on compromised computer systems

HOIC 

Open-source        

LOIC with countermeasure workarounds

MHDDoS 

Open-source        

Python3 DDoS attack script with 56 methods

Raven-Storm 

Open-source        

DDoS Toolkit with multiple attack protocols

SlowLoris 

Open-source        

Low bandwidth DDoS tool in Python

T50 

Open-source        

Network stress tool

UFONet 

Open-source        

Denial of service toolkit with multifunctionality