hoho_ddos2.0 is a program designed to simulate various types of DDoS (Distributed Denial of Service) attacks. It aims to help cybersecurity professionals understand and test different types of network attacks. The program features colorful ASCII art and a user-friendly interface, making it easy to use.
- Various Attack Types: Supports various common DDoS attack types, including flood attacks, server attacks, slow attacks, protocol-specific attacks, and more.
- Enhanced Functionality: Compared to hoho_ddos, this version is more feature-rich and powerful.
- Simple and Easy to Use: The program is designed with simplicity in mind, allowing users to quickly perform tests by following the prompts to select an attack type and set relevant parameters.
- Multiple Interfaces: The program uses multiple CLUIs, including CLI and TUI.
colorama, scapy, requests, sippy
pip install colorama
pip install scapy
pip install requests
pip install sippy
- Download the code: Clone the repository to your local machine and navigate to the program directory to gain access:
git clone https://github.com/sansjtw/hoho_ddos2.git cd hoho_ddos2 chmod +x *
- Install required third-party libraries:
pip install -r requirements.txt
-
Download the installer: Install the latest version of the program on your computer: https://github.com/sansjtw/hoho_ddos2/tags
-
Complete the installation: Follow the installer instructions to finish installing the program.
-
Download Python 3.11.8: Install Python 3.11.8 from the official website python3.11.8 and set the system path variable.
Android users can use the program via the Hoho ddos2 app
, details:
The program uses multiple UI startup menu programs, with the current menus including:
English | main.py | hoho_ddos2.exe |
---|---|---|
中文 | main_cn.py | hoho_ddos2_cn.exe |
Enter the following commands in the terminal emulator for Linux, or run from the desktop or cmd for Windows:
Linux | Windows 10 and Above |
---|---|
python3 main.py | Double-click hoho_ddos2.exe |
python main_cn.py | Double-click hoho_ddos2_cn.exe |
python main.py | |
python main_cn.py |
English | 中文 |
---|---|
main.sh | main_cn.sh |
Enter the following commands in the terminal emulator for Linux:
Linux | Windows 10 and Above |
---|---|
./main.sh | Not supported |
./main.sh | Not supported |
You can use the hohos2
tool to start attack scripts with CLI parameters. Once hoho_ddos2 is added to your PATH variable, you can use the help parameter to view tool help:
hohos2 -h
//./hohos2 -h
Command Usage: hohos2 [parameter options]
English | 中文 |
---|---|
hohos2 | Not supported |
hohos2.py | Not supported |
Enter the following commands in the terminal emulator for Linux:
Linux | Windows 10 and Above |
---|---|
./hohos2 | Not supported |
python hohos2.py | python hohos2.py |
- ACK Flood
- Connection Flood
- DNS Query Flood
- HTTP Flood
- ICMP Flood
- IP Flood
- Ntp Request Flood
- SYN Flood
- UDP Reflection Flood
- HTTP Flood Attack on Multiple Targets
- UDP Flood Attack on Multiple Targets
- Advanced IP Flooding
- Advanced HTTP Flooding
- Advanced ICMP Flooding
- Advanced DNS Query Flood
- Advanced UDP Reflection Flood
- Advanced SYN Flood
- Slow Read Attack
- Slowloris Attack
- Slow POST Attack
- Slow GET Attack
- Slow DNS Attack
- Slow Write Attack
- Slow SSL Attack
- Minecraft Protocol Attacks
- SSDP Attack
- Cache Server Attack
- Minecraft Server DDoS
- Translation Server DDoS
- ICMPv6 Flood
- IPv6 Replay Attack
- IPv6 Flood Attack
- IPv6 SLAAC Flood
- IPv6 Fragmentation Attack
- Neighbor Cache Exhaustion
- IPv6 ND
- DNS Amplification
- RUDY Attack
- Smurf Attack
- SIP Register Flood
- SIP Invite Flood
- Replay Attack
- After running the program, the main menu will be displayed, prompting the user to select the type of attack to simulate.
- Follow the prompts to select the corresponding attack type and set relevant parameters as needed, and the program will automatically start simulating the attack.
- During the attack, the program will display the progress and related information. Users can terminate the attack at any time.
- Do not use this program for illegal purposes. It is intended solely for legitimate security testing and educational purposes.
- Use of this program may cause interference or downtime on the target system; use with caution.
- This program does not provide any form of warranty or support; users assume all risks.
This project is licensed under the MIT License. For more information, see the LICENSE file.
- Author: Sansjtw
- Email: sansjtw@163.com
- Blog: sansjtw.xyz