π‘ DoS Tool (Layer 7)
π» Preview
Download Python 3.10 here, open the installer and click on add python to PATH
. Next, download overload
here and open CMD or PowerShell in its directory. If you'd rather run the application without a Virtual Enviroment, execute:
python3 -m pip install -r requirements.txt
python3 overload.py
Although you can run it without a Virtual Enviroment, we highly recommend you to create one for your application. If you have make
utility on your system just execute:
make setup
make run
If you don't have make
, then execute:
curl -sSL https://install.python-poetry.org | python3
poetry install --without dev
poetry run python3 overload.py
sudo apt update
sudo apt install python3 python3-pip git -y
git clone https://github.com/7zx/overload
cd overload/
# With a Virtual Enviroment
make setup
make run
# Without a Virtual Enviroment
python3 -m pip install -r requirements.txt
python3 overload.py
pkg update
pkg install python3 python3-pip git -y
git clone https://github.com/7zx/overload
cd overload/
pip3 install -r requirements.txt
python3 overload.py
β How To Use
Once the application has been opened, choose the attack method (HTTP or Slowloris), for how long the attack will take over (in seconds), how many threads (or sockets) will attack the target, if the attack will use public global proxies (HTTP only) for IP spoofing, the sleep time of the sockets (Slowloris only), and the target URL itself.
HTTP GET Attack Example:
ββββDOS TOOL LAYER 7
β ββββMETHOD (HTTP or Slowloris): HTTP
β ββββTIME: 600
β ββββTHREADS: 800
β ββββUSE PROXY: 0 (False)
β ββββURL:https://github.com/7zx/overload
Slowloris Attack Example:
ββββDOS TOOL LAYER 7
β ββββMETHOD (HTTP or Slowloris): Slowloris
β ββββTIME: 300
β ββββSOCKETS: 200
β ββββSLEEP TIME: 15
β ββββURL:https://github.com/7zx/overload
If the case, the threads will initialize and connect to elite-anonymity public proxies, and if not, your IP will be used on the requests. We do not own the proxy servers and do not respond for anything that they may do (like leaking your actual IP); they are hosted by volunteers and their addresses are retrieved through the Proxy Scrape API.
β Disclaimer
This application is intended to be used as a testing tool against your own servers. DO NOT USE IT TO ATTACK OTHER PEOPLE, we don't take responsability for anything that may come up if you attack someone else.