Skip to content

ScienceCon/free-ip-stresser

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 

Repository files navigation

#1 Free IP Stresser / IP Booter V10 — Ultimate Network Stress Testing Suite 🚀

Made by https://returnstress.st/ 🌙

🚀 Introduction

Welcome to Free IP Stresser Booter V10—a cutting-edge Python IP Stresser and Free IP Booter built for network enthusiasts, researchers, and professionals who need to test their own infrastructure.

  • 🎮 14 game-specific attack methods, 9 UDP, 9 TCP, and 8 HTTP/HTTPS methods to rigorously test network resilience.
  • 🔍 CheckHost diagnostics, proxy list downloader, and 20 API-powered tools for advanced network analysis and reconnaissance.
  • ⚠️ Warning: This Free IP Stresser is for educational and legal testing only! Use it only on servers you own or have explicit permission to test. Unauthorized use is strictly prohibited! 🚨

✨ Features

🌟 Attack Methods

🎮 Game Methods (14 Total)

  • Minecraft Handshake: Floods Minecraft servers with fake handshake packets (0x00) to overwhelm connection handling.
  • Minecraft Login: Sends repeated fake login attempts (0x02) with dummy usernames to stress authentication systems.
  • PUBG Packet: Spams UDP packets tagged with "PUBG" to disrupt PUBG server traffic.
  • PUBG Connect: Opens and closes TCP connections rapidly to exhaust PUBG server slots.
  • Black Ops 6 Spam: Floods UDP packets with "BO6" tags to target Black Ops 6 servers.
  • Call of Duty Connect: Overloads Call of Duty servers with TCP connection attempts.
  • CS:GO Query: Bombards CS:GO servers with Source Engine query packets (\xFF\xFF\xFF\xFF\x54) to overload query handling.
  • Rust Connect: Spams TCP connections to Rust servers, filling connection queues.
  • ARK Spam: Sends UDP packets tagged "ARK" to stress ARK server resources.
  • Fortnite Packet: Floods Fortnite servers with UDP packets marked "FORT".
  • Apex Legends Connect: Barrages Apex Legends servers with TCP connection requests.
  • Valorant Spam: Overloads Valorant servers with UDP packets tagged "VALO".
  • GTA Online Connect: Spams TCP connections to GTA Online servers, targeting session limits.
  • Roblox Query: Floods Roblox servers with UDP packets marked "RBX" to test query responses.

🌊 Layer 4 UDP (9+ Methods)

  • 📦 StdHex: Sends UDP packets starting with hex "DEADBEEF" followed by random bytes for a consistent flood.
  • 📜 Plain: Floods with simple UDP packets filled with "A" bytes, ideal for basic stress testing.
  • 🔄 Bypass: Uses randomized payloads to evade simple packet filters.
  • 💥 Burst: Launches high-intensity UDP bursts via multiple threads for sudden load spikes.
  • 🌩️ Storm: Sustained UDP flood with "STORM" prefix for prolonged stress.
  • 🏃 Rush: Rapid UDP packet bursts across 10 threads to simulate distributed traffic.
  • 💣 Blast: Continuous flood with "BLAST" prefix and random data for sustained pressure.
  • 🔊 Amplification: Exploits UDP amplification (e.g. game server queries like \xFF\xFF\xFF\xFFgetstatus) to amplify traffic.
  • 🪞 Reflection: Simulates a reflection attack with spoofed-source UDP packets (simplified; full spoofing needs raw sockets).
  • Pulse: Periodic burst-style UDP for load spikes (CAFEBABE prefix).
  • 🎲 Vandal: Random junk payloads to evade pattern-based filters.

⚡ Layer 4 TCP (9+ Methods)

  • 🔗 Bypass: Floods with randomized TCP payloads to bypass basic filters.
  • 🚪 SYN: Spams SYN packets to exhaust server connection tables.
  • 🔑 ACK: Sends ACK packets post-connection to overwhelm TCP stacks.
  • 🌐 Connect: Repeatedly opens and closes TCP connections to fill server slots.
  • 🌊 Wave: Sustained TCP flood with "WAVE" payload for consistent pressure.
  • Surge: Rapid TCP connection spam to spike server load.
  • 💥 Crush: Long-term TCP flood with "CRUSH" payload to test endurance.
  • 🔄 Rapid Reset: HTTP/2-style rapid reset—quickly opens and closes connections to evade rate limits.
  • 🎭 Spoofed SYN: Simulates a SYN flood with spoofed IPs (simplified; requires raw sockets for true spoofing).
  • 🔥 Rampage: Aggressive multi-thread TCP connect flood.
  • 📦 Flood-X: Mixed TCP payload flood with alternating signatures.

🌐 Layer 7 HTTP/HTTPS (8+ Methods)

  • 📊 Slowloris: Maintains many open connections with "keep-alive" headers to drain server resources slowly.
  • 🔎 HTTP Spam: Rapid GET requests to overload HTTP servers.
  • 🔒 HTTPS Bypass: Uses proxies and rotating User-Agents to flood HTTPS endpoints, bypassing basic protections.
  • 🔥 HTTP Fury: Targets /fury with rapid GET requests for focused stress.
  • HTTPS Strike: Floods HTTPS endpoints with a custom User-Agent for sustained load.
  • 📦 HTTP Overload: Sends POST requests with random 1KB data to stress server processing.
  • ☁️ Cloudflare Bypass: Mimics legitimate traffic with forged headers (e.g. CF-Connecting-IP) to evade Cloudflare protections.
  • 🤖 Bot Emulation: Emulates search engine bots (e.g. Googlebot) with proxy support to bypass bot detection.
  • 📋 Header Flood: Floods with requests that carry many random headers to stress HTTP parsing.
  • 🔨 HTTPS Hammer: Rapid mix of GET/HEAD requests on HTTPS for sustained load.

🔍 CheckHost Diagnostics (4 Tools)

  • 📡 Ping IP: Performs an ICMP ping to check target responsiveness (4 pings).
  • 🌐 HTTP Check: Tests HTTP status using Check-Host.net, reporting response times and codes.
  • ℹ️ Target Info: Fetches IP location, ASN, and connection stats via Check-Host.net.
  • 🔗 URL to IP: Resolves a URL to its IP address using DNS lookup.

📥 Proxy Downloader

  • 📋 Download Proxy List: Grabs a fresh HTTP proxy list from a public source and saves it as proxy_list.txt in the script directory.

🛠️ API-Powered Tools (20 Total)

  • 🌍 IP Geolocation: Detailed IP info (country, city, ISP, coords) via ip-api.com.
  • 🔍 Port Scanner: Scans open ports remotely using HackerTarget’s Nmap API.
  • 📜 WHOIS Lookup: Retrieves domain registration details from whois.vu.
  • 🌐 DNS Resolver: Fetches DNS records (A, AAAA, MX, NS) via Cloudflare’s 1.1.1.1 API.
  • 📏 Bandwidth Test: Estimates bandwidth to a target using HackerTarget’s iperf API.
  • 🔒 SSL/TLS Checker: Analyzes SSL/TLS security and grades via SSL Labs.
  • 🗺️ Traceroute: Maps network paths to a target with HackerTarget’s API.
  • 🌐 Subdomain Finder: Lists subdomains of a domain using HackerTarget.
  • 📊 IP Reputation: Placeholder for IP abuse reports (requires AbuseIPDB API key).
  • 📸 Website Screenshot: Placeholder for site captures (requires ScreenshotMachine API key).
  • 🔐 DNS Leak Test: Checks for DNS leaks using bash.ws.
  • 📋 HTTP Headers: Analyzes HTTP response headers via HackerTarget.
  • ⚠️ IP Blacklist: Placeholder for blacklist status (requires BlacklistChecker API key).
  • ⏱️ Network Latency: Measures ping latency with HackerTarget’s API.
  • 🛡️ Vulnerability Scanner: Basic vulnerability scan using HackerTarget’s Nmap API.
  • 🚨 IP Abuse Check: Reports IP abuse stats via AbuseIPDB (requires API key).
  • 🌐 Domain Reputation: Lists related IPs for a domain using ThreatMiner.
  • 🏠 IP Neighbors: Finds domains hosted on the same IP via HackerTarget.
  • 🔒 SSL Cert Info: Fetches SSL certificate details from SSL Labs.
  • 🌍 DNS Propagation: Checks DNS propagation status with HackerTarget.

🎨 Customization & Options

  • 🎯 IP & Port: Target any IP and port (e.g. 25565 for Minecraft).
  • ⏱️ Duration: Set attack duration (1–3600 seconds).
  • 📏 Packet Size: Configure packet size (1–65500 bytes) for UDP/TCP methods.
  • 🧹 Clear Screen: Type clear to reset the terminal and return to the main menu.

🖥️ Interface & Vibes

  • 🎨 ASCII art intro: Free IP Stresser Booter V10 — Powered by returnstress.st.
  • 🌈 Colors: Light blue for prompts/menu, green for success, red for errors (via logging).
  • 📊 Stats Tracking: Reports packets sent, connections made, or requests completed after each run.
  • 🏷️ Window title: Free IP Stresser Booter V10.

🛠️ Installation

  1. Download the Code

    • Clone this repository or download free-ip-stresser.py directly.
  2. Run the Free IP Stresser

    python3 free-ip-stresser.py

📋 Requirements

  • 🐍 Python 3.x (pre-installed on most Linux distros like Ubuntu, or download from python.org).
  • 📦 Dependencies: Install required libraries:
    pip3 install requests colorama
  • 💻 A terminal (e.g. Bash on Linux, Command Prompt/PowerShell on Windows).
  • 🌐 Internet access for proxy downloads and API tools.

🌟 Learn More

Want to explore the best Free IP Stresser and Free IP Booter tools in 2025? Check out this guide:
Top 5 Best Free IP Stresser and Free IP Booter Tools in 2025


🙌 Credits

  • 🌙 Made by: https://returnstress.st/
  • 🔥 Purpose: Your go-to Free IP Stresser and Free IP Booter suite for ethical server stress testing and diagnostics!

📜 License

  • ⚖️ Usage: For educational and legal testing only. No formal license—use responsibly!
  • 🚫 Disclaimer: This Free IP Stresser / IP Booter is designed for ethical testing on systems you own or have explicit permission to test. Misuse is your responsibility, and illegal activities are strictly prohibited!

Releases

No releases published

Packages

 
 
 

Languages