Usage Guide

Basic Usage

Basic Usage

Getting started with basic attack commands and examples.

ddos -u http://example.com
ddos -u 192.168.1.1 -a syn-flood
More Examples
Advanced Usage

Advanced Usage

Custom configurations for more sophisticated testing scenarios.

ddos -u http://example.com --proxies file.txt
ddos -u http://example.com --rate-limit 500
View Details
Extensions

Extensions

Additional modules for network scanning, anonymization, and more.

  • ddos -u 192.168.1.165 -s
  • ddos --wifi-deauth
  • ddos --anonymizer start
Learn More

Command Reference

All available options

Argument Description Default Example
-u, --url Target URL/IP Required -u http://example.com
-t, --threads Number of threads 10 -t 50
-d, --duration Duration (seconds) 1500 -d 300
-a, --attack-mode Attack type http-flood -a syn-flood
--proxies Proxy list file None --proxies proxies.txt
--rate-limit Requests per second 100 --rate-limit 500
--results Save results to JSON None --results output.json

Attack Modes

The DDoS Toolkit supports multiple attack modes for comprehensive network testing:

Mode Command Description
HTTP Flood --attack-mode http-flood Standard web request flood
SYN Flood --attack-mode syn-flood TCP half-open connections
UDP Flood --attack-mode udp-flood Connectionless packet flood
Slowloris --attack-mode slowloris Slow HTTP headers attack
Attack Modes

Extension Modules

Network Scanner

Advanced network analysis and vulnerability assessment.

ddos -u 192.168.1.165 -s
Details

Wi-Fi Deauth

Wi-Fi network management and attack functionalities.

ddos --wifi-deauth
Details

Anonymizer

Tor-based traffic anonymization for testing.

ddos --anonymizer start
Details

About the Developer

Mehdi Hajhouj (LIONMAD) is a passionate developer with expertise in ethical cybersecurity, open-source tools, and system automation.
Creator of innovative frameworks like Ghost Framework, DDoS Toolkit, LinSpector, Anonymizer, And many more.

Disclaimer

This software is strictly for authorized security testing and research. Unauthorized use may violate international laws. Use responsibly.

View on GitHub