Python
Need help with Saddam?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.
OffensivePython

Description

DDoS Amplification Tool

496 Stars 263 Forks Apache License 2.0 8 Commits 18 Opened issues

Services available

Need anything else?

Saddam

DDoS Tool that supports: * DNS Amplification (Domain Name System) * NTP Amplification (Network Time Protocol) * SNMP Amplification (Simple Network Management Protocol) * SSDP Amplification (Simple Service Discovery Protocol)

Read more about DDoS Amplification Attacks here

Donation would be much appreciated: 1Gi5Rpz5RBEUpGknSwyRgqzk7b5bQ7Abp2

Requierments

  • OS Supports raw sockets
  • Python 2.7
  • Pinject

Usage

       _____           __    __              
      / ___/____ _____/ /___/ /___ _____ ___ 
      \__ \/ __ `/ __  / __  / __ `/ __ `__ \
     ___/ / /_/ / /_/ / /_/ / /_/ / / / / / /
    /____/\__,_/\__,_/\__,_/\__,_/_/ /_/ /_/ 
    https://github.com/OffensivePython/Saddam
       https://twitter.com/OffensivePython

Usage: Saddam.py target.com [options] # DDoS Saddam.py benchmark [options] # Calculate AMPLIFICATION factor

Options: -h, --help show this help message and exit -d FILE:FILE|DOMAIN, --dns=FILE:FILE|DOMAIN DNS Amplification File and Domains to Resolve (e.g: dns.txt:[evildomain.com|domains_file.txt] -n FILE, --ntp=FILE NTP Amplification file -s FILE, --snmp=FILE SNMP Amplification file -p FILE, --ssdp=FILE SSDP Amplification file -t N, --threads=N Number of threads (default=1)

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.