Results may vary A LOT when attacking! It might peak at 40k rq/s and drop down to 2k rq/s or peak at 169 requests per second, just so you know!
Current version: 4.0. This script is for volumetric layer 7 attacks, not for stealthy and powerfull attacks!
- FAST , a HTTP GET flood optimized for super fast attacks
- GET , a GET flood with randomized user agents, referers and more
- HEAD , HEAD flood with nothing special
- POST , POST flood with randomized data
- CONNECT , a HTTP CONNECT flood
- TRACE , a HTTP TRACE flood
- DYNAMIC , a GET-POST flood that bypasses caching systems more effectivly, but is also slower
- Cache bypassing
- Randomized user agents
- Randomized referers
- Rotating proxy support
- Option to choose custom user agents list
- Option to choose custom referer list
- Randomized POST payloads
- Able to attack HTTPS sites
- Timing is a bit egh, because thread 1 is already busy attacking when thread 70 just started (for example)
- Proxies get obliterated when attacking (need to fix)
- POST and HEAD are not as fast as GET
- Sometimes script gives "Fatal Python" errors, just ignore them and restart the tool if neccesary
- Implement more methods (Slowloris, PATCH, PUT etc)
- Better exception handling
- Animations?
- ....
All options:
python3 amyntas.py -h
Basic usage:
python3 amyntas.py -t https://target.com
Brute power, 700 threads hammering for 40 seconds:
python3 amyntas.py -t https://target.com -w 700 -d 40
POST flood, 700 threads and 40 seconds:
python3 amyntas.py -t https://target.com -w 700 -d 40 -m POST
Note, these are a bit old because i am too lazy to make new screenshots lmao