Migrated and renamed to the netbytes organization
-
The application is currently being completely redesigned with a system of plug-ins, saving scan results
-
The documentation is not up to date
-
Use this branch at your own risk
-
More information Here
This script can scan ip's or retrieve them from shodan and then scan them for vulnerabilities and use them to carry out large ddos attacks. This script uses the amplification technologies of:
I am NOT responsible for damages caused or crimes committed by the use of this tool.
You need to run this script with root privileges and run this tool on machine with public ip for attack (spoffing)
git clone https://github.com/msterhuj/TouDoum-DDoS-Exploit
cd TouDoum-DDoS-Exploit
pip3 install -r requirements.txt
The disadvantage that the scanner only works with a core for a faster scan use option 2
python3 TouDoum.py
▄▄▄█████▓ ▒█████ █ ██ ▓█████▄ ▒█████ █ ██ ███▄ ▄███▓ ▐██▌
▓ ██▒ ▓▒▒██▒ ██▒ ██ ▓██▒ ▒██▀ ██▌▒██▒ ██▒ ██ ▓██▒▓██▒▀█▀ ██▒ ▐██▌
▒ ▓██░ ▒░▒██░ ██▒▓██ ▒██░ ░██ █▌▒██░ ██▒▓██ ▒██░▓██ ▓██░ ▐██▌
░ ▓██▓ ░ ▒██ ██░▓▓█ ░██░ ░▓█▄ ▌▒██ ██░▓▓█ ░██░▒██ ▒██ ▓██▒
▒██▒ ░ ░ ████▓▒░▒▒█████▓ ░▒████▓ ░ ████▓▒░▒▒█████▓ ▒██▒ ░██▒ ▒▄▄
▒ ░░ ░ ▒░▒░▒░ ░▒▓▒ ▒ ▒ ▒▒▓ ▒ ░ ▒░▒░▒░ ░▒▓▒ ▒ ▒ ░ ▒░ ░ ░ ░▀▀▒
░ ░ ▒ ▒░ ░░▒░ ░ ░ ░ ▒ ▒ ░ ▒ ▒░ ░░▒░ ░ ░ ░ ░ ░ ░ ░
░ ░ ░ ░ ▒ ░░░ ░ ░ ░ ░ ░ ░ ░ ░ ▒ ░░░ ░ ░ ░ ░ ░
░ ░ ░ ░ ░ ░ ░ ░ ░
░
---===[Author: @MsterHuj]===---
--==[Ver : X.X]==--
Usage: TouDoum.py [OPTIONS] COMMAND [ARGS]...
Options:
--help Show this message and exit.
Commands:
attack Attack server with spoofed udp packed
scanner Scanner for detect udp port on memcached, dns and ntp
For a more efficient scan you can use the compose docker at the root of this repo. Edit var environments in docker-compose.yml, build, and run compose
docker-compose build
docker-compose up # add -d for run this compose in background
You can scale the client for more efficiency
docker-compose --scale client=X # X is number of client for scan you want to run
One web ui is available for show all data from this scan on http://:8081
- scan range of ip with cli or docker stack
- get ip from shodan.io (only cli)
- import ip from file (one ip per line and only cli)
- scan by service type (memcache, ntp, dns) with udp protocol
- attack with multi thread and multiple service type scanned before (only cli)
- rewrite function for get ip on shodan.io
- build a REST API with flask
- full implementation of mongodb
- plugin system for add more scanner function
- add a drive for storage ip system (mongo, .json file)