This project is a simple HTTP GET flood tool written in Go.
It continuously sends randomized HTTP GET requests to a specified target within a defined duration.
The tool uses random query parameters, rotating user-agents, and spoofed referers to simulate multiple client requests.
- Concurrent HTTP GET requests using goroutines
- Random query parameter generation (cache bypass)
- Randomized
User-Agentheader - Randomized
Refererheader - Custom duration control
- Graceful stop with
CTRL+C - Lightweight and fast execution
- Go 1.18+
- Dependencies:
- github.com/corpix/uarand
- github.com/gookit/color
Install dependencies:
go mod init
go get github.com/corpix/uarand
go get github.com/gookit/colorgo run socket.go --host https://example.com --time 30s--host Target URL (e.g., https://example.com)
--time Duration of attack (e.g., 10s, 30s, 1m)
Example:
go run socket.go --host https://target.com --time 1m- Generates random query strings to avoid caching
- Rotates user agents using
uarand - Sends concurrent HTTP GET requests
- Tracks total requests sent using atomic counter
- Stops after specified duration or manual interrupt
This tool is provided for:
- Security research
- Educational purposes
- Authorized stress testing
The author is not responsible for misuse, illegal activity, or any damage caused by this software.
Always obtain proper authorization before testing any system.