forked from logonmy/Stinger-Tor
-
Notifications
You must be signed in to change notification settings - Fork 1
Slow Loris Attack Using Stinger-Tor Framework
License
Liam0110101/Stinger-Tor
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
Coded by @WhitePacket ~ whitepacket.com
Utilizes multi-threading with 256 threads default, and a thread capacity of 376.
Waits 5-20 seconds between each HTTP header in slow-GET mode to consume all web-server sockets, possibly crashing or over-loading it. Stinger sends HTTP requests as fast as possible with the flood option; This ends up being a battle of application-layer server power, or bandwidth.
The payload is an exact replica of the latest version of the Tor Browser Bundle sending a GET request. This way if they end up filtering the traffic, almost all users can't visit the website anyways. All requests under Tor come from 127.0.0.1 so our DoS tool is completely identical to a Tor Browser Bundle user looking to visit your homepage.
Hopefully this is used for good, not bad. Maybe a few unmentionable, illegal Tor servers go down.
Donate BTC: 1JiyTFYsubsRzwj8uCtzxRirnr33wGS5YB
About
Slow Loris Attack Using Stinger-Tor Framework
Resources
License
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published
Languages
- Python 100.0%