Comprehensive guide to using all features of the DDoS Toolkit
for ethical security testing with 20+ attack vectors.
Getting started with basic attack commands and examples.
ddos -u http://example.com ddos -u 192.168.1.1 -a syn-floodMore Examples
Custom configurations for more sophisticated testing scenarios.
ddos -u http://example.com --proxies file.txt ddos -u http://example.com --rate-limit 500View Details
Additional modules for network scanning, anonymization, and more.
ddos -u 192.168.1.165 -s
ddos --wifi-deauth
ddos --anonymizer start
Argument | Description | Default | Example |
---|---|---|---|
-u, --url |
Target URL/IP | Required | -u http://example.com |
-t, --threads |
Number of threads | 10 | -t 50 |
-d, --duration |
Duration (seconds) | 1500 | -d 300 |
-a, --attack-mode |
Attack type | http-flood | -a syn-flood |
--proxies |
Proxy list file | None | --proxies proxies.txt |
--rate-limit |
Requests per second | 100 | --rate-limit 500 |
--results |
Save results to JSON | None | --results output.json |
The DDoS Toolkit supports multiple attack modes for comprehensive network testing:
Mode | Command | Description |
---|---|---|
HTTP Flood | --attack-mode http-flood |
Standard web request flood |
SYN Flood | --attack-mode syn-flood |
TCP half-open connections |
UDP Flood | --attack-mode udp-flood |
Connectionless packet flood |
Slowloris | --attack-mode slowloris |
Slow HTTP headers attack |
Mehdi Hajhouj (LIONMAD) is a passionate developer with expertise in ethical cybersecurity, open-source tools, and system automation.
Creator of innovative frameworks like Ghost Framework, DDoS Toolkit, LinSpector, Anonymizer, And many more.
This software is strictly for authorized security testing and research. Unauthorized use may violate international laws. Use responsibly.
View on GitHub