Skip to content

hoho_ddos2.0 is a program designed to simulate various types of DDoS (Distributed Denial of Service) attacks. It aims to help cybersecurity professionals understand and test different types of network attacks. The program features colorful ASCII art and a user-friendly interface, making it easy to use.

License

Notifications You must be signed in to change notification settings

sansjtw/hoho_ddos2

Repository files navigation

hoho_ddos2.0

hoho_ddos2.0 is a program designed to simulate various types of DDoS (Distributed Denial of Service) attacks. It aims to help cybersecurity professionals understand and test different types of network attacks. The program features colorful ASCII art and a user-friendly interface, making it easy to use.

hoho_ddos2.0 中文 | English
Static Badge

Features

  • Various Attack Types: Supports various common DDoS attack types, including flood attacks, server attacks, slow attacks, protocol-specific attacks, and more.
  • Enhanced Functionality: Compared to hoho_ddos, this version is more feature-rich and powerful.
  • Simple and Easy to Use: The program is designed with simplicity in mind, allowing users to quickly perform tests by following the prompts to select an attack type and set relevant parameters.
  • Multiple Interfaces: The program uses multiple CLUIs, including CLI and TUI.

Installation

Install necessary pip libraries:

colorama, scapy, requests, sippy

pip install colorama
pip install scapy
pip install requests
pip install sippy

Linux

  1. Download the code: Clone the repository to your local machine and navigate to the program directory to gain access:
    git clone https://github.com/sansjtw/hoho_ddos2.git
    cd hoho_ddos2
    chmod +x *
  2. Install required third-party libraries:
    pip install -r requirements.txt

Windows

  1. Download the installer: Install the latest version of the program on your computer: https://github.com/sansjtw/hoho_ddos2/tags

  2. Complete the installation: Follow the installer instructions to finish installing the program.

  3. Download Python 3.11.8: Install Python 3.11.8 from the official website python3.11.8 and set the system path variable.

Android

Android users can use the program via the Hoho ddos2 app, details:

Program Interface and Usage

The program uses multiple UI startup menu programs, with the current menus including:

CLI Command Line Interface

Interface Screenshot:

main

Program Filenames and Supported Languages:

English main.py hoho_ddos2.exe
中文 main_cn.py hoho_ddos2_cn.exe

Usage

Enter the following commands in the terminal emulator for Linux, or run from the desktop or cmd for Windows:

Linux Windows 10 and Above
python3 main.py Double-click hoho_ddos2.exe
python main_cn.py Double-click hoho_ddos2_cn.exe
python main.py
python main_cn.py

TUI Text User Interface

Interface Screenshot:

main_tui

Program Filenames and Supported Languages:

English 中文
main.sh main_cn.sh

Usage

Enter the following commands in the terminal emulator for Linux:

Linux Windows 10 and Above
./main.sh Not supported
./main.sh Not supported

Command Line CLI Parameters

You can use the hohos2 tool to start attack scripts with CLI parameters. Once hoho_ddos2 is added to your PATH variable, you can use the help parameter to view tool help:

hohos2 -h
//./hohos2 -h

Command Usage: hohos2 [parameter options]

Interface Screenshot:

hohos2

Program Filenames and Supported Languages:

English 中文
hohos2 Not supported
hohos2.py Not supported

Usage

Enter the following commands in the terminal emulator for Linux:

Linux Windows 10 and Above
./hohos2 Not supported
python hohos2.py python hohos2.py

Attack Program Categories

Flood Attacks

  1. ACK Flood
  2. Connection Flood
  3. DNS Query Flood
  4. HTTP Flood
  5. ICMP Flood
  6. IP Flood
  7. Ntp Request Flood
  8. SYN Flood
  9. UDP Reflection Flood
  10. HTTP Flood Attack on Multiple Targets
  11. UDP Flood Attack on Multiple Targets
  12. Advanced IP Flooding
  13. Advanced HTTP Flooding
  14. Advanced ICMP Flooding
  15. Advanced DNS Query Flood
  16. Advanced UDP Reflection Flood
  17. Advanced SYN Flood

Slow Attacks

  1. Slow Read Attack
  2. Slowloris Attack
  3. Slow POST Attack
  4. Slow GET Attack
  5. Slow DNS Attack
  6. Slow Write Attack
  7. Slow SSL Attack

Protocol-Specific Attacks

  1. Minecraft Protocol Attacks
  2. SSDP Attack

Server Attacks

  1. Cache Server Attack
  2. Minecraft Server DDoS
  3. Translation Server DDoS

IPv6 Flood Attacks

  1. ICMPv6 Flood
  2. IPv6 Replay Attack
  3. IPv6 Flood Attack
  4. IPv6 SLAAC Flood
  5. IPv6 Fragmentation Attack
  6. Neighbor Cache Exhaustion
  7. IPv6 ND

Other Attack Types

  1. DNS Amplification
  2. RUDY Attack
  3. Smurf Attack
  4. SIP Register Flood
  5. SIP Invite Flood
  6. Replay Attack

Usage Instructions

  • After running the program, the main menu will be displayed, prompting the user to select the type of attack to simulate.
  • Follow the prompts to select the corresponding attack type and set relevant parameters as needed, and the program will automatically start simulating the attack.
  • During the attack, the program will display the progress and related information. Users can terminate the attack at any time.

Notes

  • Do not use this program for illegal purposes. It is intended solely for legitimate security testing and educational purposes.
  • Use of this program may cause interference or downtime on the target system; use with caution.
  • This program does not provide any form of warranty or support; users assume all risks.

License

This project is licensed under the MIT License. For more information, see the LICENSE file.

Author Information

About

hoho_ddos2.0 is a program designed to simulate various types of DDoS (Distributed Denial of Service) attacks. It aims to help cybersecurity professionals understand and test different types of network attacks. The program features colorful ASCII art and a user-friendly interface, making it easy to use.

Resources

License

Stars

Watchers

Forks

Packages

No packages published