Saddam

by OffensivePython

OffensivePython /Saddam

DDoS Amplification Tool

471 Stars 258 Forks Last release: Not found Apache License 2.0 8 Commits 0 Releases

Available items

No Items, yet!

The developer of this repository has not created any items for sale yet. Need a bug fixed? Help with integration? A different license? Create a request here:

Saddam

DDoS Tool that supports: * DNS Amplification (Domain Name System) * NTP Amplification (Network Time Protocol) * SNMP Amplification (Simple Network Management Protocol) * SSDP Amplification (Simple Service Discovery Protocol)

Read more about DDoS Amplification Attacks here

Donation would be much appreciated: 1Gi5Rpz5RBEUpGknSwyRgqzk7b5bQ7Abp2

Requierments

  • OS Supports raw sockets
  • Python 2.7
  • Pinject

Usage

       _____           __    __              
      / ___/____ _____/ /___/ /___ _____ ___ 
      \__ \/ __ `/ __  / __  / __ `/ __ `__ \
     ___/ / /_/ / /_/ / /_/ / /_/ / / / / / /
    /____/\__,_/\__,_/\__,_/\__,_/_/ /_/ /_/ 
    https://github.com/OffensivePython/Saddam
       https://twitter.com/OffensivePython

Usage: Saddam.py target.com [options] # DDoS Saddam.py benchmark [options] # Calculate AMPLIFICATION factor

Options: -h, --help show this help message and exit -d FILE:FILE|DOMAIN, --dns=FILE:FILE|DOMAIN DNS Amplification File and Domains to Resolve (e.g: dns.txt:[evildomain.com|domains_file.txt] -n FILE, --ntp=FILE NTP Amplification file -s FILE, --snmp=FILE SNMP Amplification file -p FILE, --ssdp=FILE SSDP Amplification file -t N, --threads=N Number of threads (default=1)

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.