Skip to content

kimjunseoo/dos-attacker

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

UDP Flooding DoS Attacker

Python

A simple GUI tool for UDP-based dos attacks using Python and Tkinter, which periodically sends packets to the specified target and records whether a response has been received within the timeout period.

title

Description

The tool provides a simple visualization of UDP-based stress tests on servers or services and their results and progress. It records real-time connection attempts and their results.

Features

  • Graphical User Interface: Easy-to-use interface built with Python's standard Tkinter library.
  • Configurable Target: Specify the target IP address, port, and check interval.
  • Real-time Logging: View the status of each check (Success or Timeout) in the log window.
  • Status Dashboard: At-a-glance view of the total number of requests and successful responses.
  • Cross-Platform: Runs on any operating system with Python installed.

Requirements

  • Python 3.x

No external libraries are needed. The script uses only Python's standard libraries (tkinter, socket, threading, queue).

How to Run

  1. Clone or download the repository:

    git clone https://github.com/kimjunseoo/dos-attacker.git
    cd your-repo
  2. Run the script from your terminal:

    python app.py

Usage Guide

  1. Target IP: Enter the IP address of the server you want to check.
  2. Target Port: Enter the UDP port number of the service on the server.
  3. Interval (sec): Set the time in seconds between each health check packet. For example, 1 means one check per second.
  4. Start Checking: Click this button to begin sending UDP packets. The button will be disabled, and the "Stop Checking" button will be enabled.
  5. Stop Checking: Click this button to stop the health checks.

The log window will display the result of each attempt, and the status labels will update in real-time.

⚠️ Warning / Ethical Use Notice

  • This tool is intended for educational purposes and for network diagnostics only.
  • Do not use this tool to send an excessive amount of traffic to servers you do not own or have explicit permission to test. Sending a high volume of packets can be interpreted as a malicious act.
  • The user assumes all responsibility for their actions when using this tool. The author is not responsible for any misuse or damage.

License

This project is licensed under the MIT License.